Caliptra Subsystem Provisioning Guide

Goal / Disclaimer

This document aims to provide Caliptra Subsystem (SS) silicon vendors/manufacturers with guidance on how to provision devices during manufacturing. Nothing in this document is a requirement for Caliptra Trademark compliance. Note, this document focuses on the technical and operational aspects of provisioning a device with Caliptra Subsystem. Details on how to secure provisioning infrastructure to meet various certification requirements are outside the scope of this document.

Assets

There are two categories of assets that must be provisioned into a product that integrates Caliptra Subsystem before the device becomes fully operational:

  1. fuses
  2. IDevID (UDS) certificate

Fuses

Caliptra SS contains a One-Time Programmable (OTP) fuse memory bank that must be provisioned during SoC manufacturing. The fuse bank contains several logical fields organized across a set of partitions. Additionally, Caliptra SS contains a fuse-backed lifecycle FSM (known as the lifecycle controller), whose states gate debug capabilities of a device, thus requiring specific fuse fields be programmed in specific life-cycle states. The table below describes the fuse map and the lifecycle states they should be provisioned by.

Certificates

When requested, the IDevID CSR is generated by the Caliptra Core ROM after receiving the UDS Seed from the Caliptra Subsystem fuse controller. It should be endorsed by an external CA protected via an HSM on an isolated manufacturing network1.

There are two different IDevID certificates to be generated, based on the cryptographic keys they are constructed for:

  1. ECC secp384r1
  2. ML-DSA-87

The signature sizes for each are shown in the following table. These signatures should be stored in the larger SoC’s nonvolatile storage or other accessible service.

Certificate typeSignature size (Bytes)
ECC Secp384r196
ML-DSA-874627

To be able to reconstruct the IDevID certificate on boot, Caliptra also requires the original certificate attributes be stored in the SoC's fuses. The size and encoding of this data is fixed for both certificate types (ECC and ML-DSA), and detailed in the Caliptra specification.

1

Network isolation requirements are often dictated by certification requirements, while are outside the scope of this document.

Provisioning Sequence

The Caliptra Subsystem provisioning sequence is described below. The provisioning sequence is designed to suit various requirements among downstream integrators, including:

  1. providing an ATE-friendly provisioning sequence where DUT operations can be performed: a. directly over JTAG, and/or b. by loading custom MCU firmware into SRAM (via JTAG).
  2. The ability to program different fuse partitions at various lifecycle stages.

In addition to the provisioning flow description, the Caliptra project aims to provide a general reference provisioning flow, and supporting tooling / firmware, upstream. These are currently under development, and tied to a caliptra-mcu-sw GitHub milestone.

Before describing the sequence, we provide some background information on two important hardware blocks that facilitate the provisioning sequence, namely:

  1. lifecycle controller, and
  2. fuse controller.

Background: Lifecycle Controller Architecture

Caliptra Subsystem provides a hardware backed lifecycle FSM (known as the lifecycle controller) that transitions through several lifecycle states shown in the diagram below:

Caliptra Subsystem LC Architecture

States only move forward and persist across chip resets; once advanced, it cannot revert to a previous state as lifecycle states are encoded in fuses. Transitions between some states require the use of password-like tokens. All tokens are provisioned in fuses, except the "Raw Unlock Token", which is a netlist constant. The purpose of each lifecycle state is described below. Additionally below is a table that summarizes which states allow debug (i.e. JTAG and DFT) access to various Caliptra Subsystem and SoC components.

Lifecycle StateJTAG AccessDFT Access
RawLCCNone
TestUnlocked[0–7]LCC, CLTAP*, MCU, CoreSS, SoC
TestLocked[0–7]LCCNone
ManufLCC, CLTAP*None
Manuf Debug UnlockLCC, CLTAP*, MCU, CoreSoC*
ProdLCCNone
Prod Debug UnlockLCC, CLTAP*, MCU, CoreSoC*
ProdEndLCCNone
RMALCC, CLTAP*, MCU, CoreSS, SoC
ScrapLCCNone

* Integration Configurable
CLTAP = Chip Level TAP

TestUnlocked[0–7] states are used for initial testing to ensure chip health. All lifecycle tokens in the SECRET_LC_TRANSITION_PARTITION fuse partition should be provisioned in TestUnlocked0 to allow further actuation of the lifecycle controller during manufacturing. After testing, the chip is locked by entering a TestLocked[0–7] state to close debug access.

Using a provisioned token, a chip can transition from any of the TestUnlock[0–7] / TestLocked[0–7] states to the Manuf(acturing) state. In this state, debug access is once again opened, and the UDS and other manufacturing-specific fuses are injected. All production debug unlock tokens for the production state must be provisioned in this state, and the partition locked.

After manufacturing, the chip enters a production state (Prod or ProdEnd). Additional fuse provisioning (e.g., field entropy, revocation bits) may occur here, but only for fuse partitions not already locked in manufacturing. Entry into debug mode in production uses signature authentication with public keys, supporting multiple debug levels (up to 8), each with different privileges.

Production End & RMA marks the end of the chip’s functional lifecycle. The chip is no longer considered part of the active fleet and is not used for regular operations. Additionally, from any lifecycle state, the chip may transition (unconditionally without token) to the Scrap state, where fuse zeroization is performed, in accordance with FIPS requirements, to securely erase all secret assets stored in fuses.

Background: Fuse Controller

As mentioned above, Caliptra Subsystem contains a One-Time Programmable (OTP) fuse memory bank that is controlled by a hardware block known as the fuse_ctrl (or fuse controller). The OTP memory bank is split into partitions, and each partition:

  1. contains a digest field over the partition, and
  2. can be write-locked by writing to the digest field.

The locking mechanism prevents further changes to certain partitions (e.g., UDS). Once locked, these fuses cannot be overwritten for the lifetime of the device, with the exception of zeroizable partitions which may be cleared once a device is decommissioned. While the fuse memory map may be expanded for a particular integration, see the integration guide for more details, a baseline memory map is provided upstream.

Provisioning Sequence

Below is a summary of the provisioning flow required to bring a Caliptra Subsystem device from a raw lifecycle state to a production lifecycle state. This flow assumes all devices in a raw state have all fuses in their, unprogrammed, initial state, i.e., all bits set to zeros. Additionally, while this flow may be performed at a manufacturing stage of the integrator's choosing, we describe the following operations from the perspective of a tester, as if the operations were performed entirely at a Final Test (FT) silicon manufacturing stage with the aid of an Automated Test Equipment (ATE).

Caliptra Provisioning Flow

  1. Tester drives a lifecycle transition via JTAG: Raw → TestUnlocked0
  2. Perform wafer sort testing.
  3. Tester programs the following fuses (via JTAG or by loading MCU firmware loaded to SRAM):
    1. vendor test
    2. Lifecycle tokens
    3. Manuf debug unlock token
  4. Perform more wafer sort testing.
  5. Tester drives a lifecycle transition via JTAG: TestUnlocked* → Manuf
  6. Tester programs remaining fuses:
    1. Secure Boot Key hashes / types
    2. UDS fuses via programming sequence with Caliptra Core API
  7. Tester requests Caliptra Core to generate HMAC endorsed IDevID CSR and extract from DUT.
  8. Tester forward CSR and HMAC to HSM for authentication and endorsement.
  9. HSM validates HMAC and endorses IDevID TBS certificate.
  10. [Optional] Tester program IDevID certificate into integration-specific non-volatile storage.
  11. Tester drives a lifecycle transition via JTAG: Manuf → Prod[End]

Provisioning Responsibilities

Provisioning responsibilities vary depending on whether the SoC containing Caliptra Subsystem follows one of two integration scenarios (labeled 1 and 2 below). Below, we provide details on how the IDevID Certificate Signing Requests (CSRs) are authenticated and endorsed in each product integration scenario. We define two different roles to aid this discussion: "vendor/manufacturer" and "owner".

RoleDefinition
Vendor/ManufacturerThe entity that manufactures or integrates the SoC/Caliptra hardware and defines the vendor public key(s). This entity may endorse Caliptra IDevID certificates.
OwnerThe downstream party that takes custody of the device for operational use, controls which firmware and identities are trusted, enforces ownership policies (e.g. via an owner public key), and is responsible for protecting Caliptra security assets once devices are in the field. This entity may also endorse Caliptra IDevID certificates, if the Vendor/Manufacturer does not.

Scenario 1: Vendor and Owner are the Same Entity

Vendor and owner are the same entity; provisioning is performed on owner controlled infrastructure. The owner may choose to deploy provisioning infrastructure at any stage in their silicon (e.g., FT or SLT stages) and/or platform (e.g. L5 or L10 stages) manufacturing process, since they own both silicon and platform manufacturing. Specifically, at silicon manufacturing (typically at FT or SLT stages) the UDS should be programmed, and the IDevID CSR (and HMAC) extracted, using Caliptra APIs. Then, the IDevID CSR may either be (depending on the Vendor/Owner's product specific requirements),

  1. endorsed at the same silicon manufacturing stage (FT or SLT) after verifying the CSR HMAC, or
  2. collected, along with the CSR HMAC, and stored in an owner database to be authenticated and endorsed at a later platform manufacturing stage.

Regardless of which manufacturing stage (silicon or platform) the owner chooses to deploy provisioning infrastructure at, two key infrastructure components will be required:

  • an HSM to both:
    • verify the HMAC signature of each IDevID CSR, and
    • endorse each certificate.
  • a Device Registry Database to either:
    • store IDevID CSRs harvested during silicon manufacturing to be endorsed later during platform manufacturing, or
    • store IDevID certificates that are endorsed during silicon manufacturing.

Scenario 2: Vendor builds a Caliptra device for a single Owner

The vendor is building a device for a single owner. In this scenario, provisioning may be either:

  1. entirely performed by the vendor's infrastructure deployed at any silicon manufacturing stage (e.g., FT or SLT stages), or
  2. performed by a combination of the vendor's provisioning infrastructure, deployed at a silicon manufacturing stage (e.g., FT or SLT stages), and the ODM or owner's infrastructure, deployed at a platform manufacturing stage (e.g., L5 or L10 stages)

Option 1

If option 1 is selected, the vendor will likely need to deploy the same two infrastructure components required in Scenario 1: an HSM and Device Registry Database. The vendor infrastructure is then responsible for:

  1. programming the UDS using Caliptra APIs,
  2. extracting the IDevID CSR (and HMAC) using Caliptra APIs
  3. validating CSR HMACs/endorsing CSRs with their HSM, and
  4. storing endorsed certificates in a database until they can be transferred to the intended owner.

In this option, the owner is trusting the vendor's CA keys, and therefore their provisioning infrastructure.

Option 2

If option 2 is selected, the vendor may only need to deploy a Device Registry Database, while the owner will need to deploy both an HSM and a Device Registry Database. The vendor then performs steps 1 and 2 in option 1 during silicon manufacturing, and stores the CSRs and their corresponding HMACs in a database to share with the owner. Later, during platform manufacturing, the owner validates each CSR HMAC and endorses each certificate with their HSM.

Lifecycle and Debug Unlock Token Requirements

All lifecycle and debug tokens, except the raw unlock token, are provisioned during manufacturing (in the TestUnlocked0 state), and stored by the manufacturer, or handed over to the device owner (e.g., the RMA unlock token). Below we provide guidance on how said tokens should be generated, stored, and/or transmitted to device owners.

Token Generation

All lifecycle and manufacturing debug tokens should be generated using either a NIST’s SP 800-90A or NIST’s SP 800-90C (Second Draft) compliant random bit generator (RBG), depending on the uniqueness requirements of the given token. Production debug unlock tokens should follow the guideline of FIPS 186-5 and FIPS 204 for ECDSA and ML-DSA based signature schemes, respectively.

Token Uniqueness

While product integration requirements should ultimately dictate the uniqueness of tokens across a set of chips for a given product, the following table provides a recommendation to maximize security of the provisioning process, while also facilitating ease of deployment.

TokenUniqueness
Raw UnlockUnique of a specific chip tapeout, i.e. the same across all chips
Test Unlock 1–7Unique per wafer lot or SKU.
Test Exit to ManufUnique per wafer lot or SKU.
Manuf to ProdUnique per wafer lot or SKU.
Prod to ProdEndProduct specific.
RMAUnique per chip.
Manuf Debug UnlockUnique per wafer lot or SKU.
Prod Debug UnlockUnique per wafer lot or SKU.

Token Storage and Use

Manufacturers / Vendors should avoid storing these tokens in plaintext on disk. Instead, an HSM-backed Key Derivation Function should be used to produce the tokens on demand when possible. If tokens must be stored, as is the case with RMA and debug tokens, they should be encrypted with a key that is itself protected by an HSM.

Facility Guidelines

To meet various security certification requirements (e.g. FIPS 140-3 Level 3) provisioning Caliptra Subsystem fuses (including secret fuse values like Field Entropy and UDS) may demand a highly controlled OSAT environment. Below we categorize some of these facility requirements:

  1. physical security and access controls,
  2. environmental controls,
  3. data logging and traceability,
  4. key management practices, and
  5. adherence to industry standards and certification requirements.

It is the responsibility of the product integrator to ensure the appropriate requirements are met for the specific certification level relevant to their product.

Appendix

Lifecycle State Constraints for Provisioning Fuses

The fuse partition below corresponds to the Caliptra Subsystem 2.1.1 reference fuse map.

PartitionItemSize [B]Lifecycle State
SW_TEST_UNLOCK_PARTITIONCPTRA_SS_MANUF_DEBUG_UNLOCK_TOKEN64TEST_UNLOCKED
SECRET_MANUF_PARTITIONCPTRA_CORE_UDS_SEED64MANUF
SECRET_PROD_PARTITION_0CPTRA_CORE_FIELD_ENTROPY_08In-Field
SECRET_PROD_PARTITION_1CPTRA_CORE_FIELD_ENTROPY_18In-Field
SECRET_PROD_PARTITION_2CPTRA_CORE_FIELD_ENTROPY_28In-Field
SECRET_PROD_PARTITION_3CPTRA_CORE_FIELD_ENTROPY_38In-Field
SW_MANUF_PARTITIONCPTRA_CORE_ANTI_ROLLBACK_DISABLE4MANUF
CPTRA_CORE_IDEVID_CERT_IDEVID_ATTR96MANUF
SOC_SPECIFIC_IDEVID_CERTIFICATE4MANUF
CPTRA_CORE_IDEVID_MANUF_HSM_IDENTIFIER16MANUF
CPTRA_CORE_SOC_STEPPING_ID4MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_048MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_148MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_248MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_348MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_448MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_548MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_648MANUF
CPTRA_SS_PROD_DEBUG_UNLOCK_PKS_748MANUF
SECRET_LC_TRANSITION_PARTITIONCPTRA_SS_TEST_UNLOCK_TOKEN_116TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_216TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_316TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_416TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_516TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_616TEST_UNLOCKED
CPTRA_SS_TEST_UNLOCK_TOKEN_716TEST_UNLOCKED
CPTRA_SS_TEST_EXIT_TO_MANUF_TOKEN16TEST_UNLOCKED
CPTRA_SS_MANUF_TO_PROD_TOKEN16TEST_UNLOCKED
CPTRA_SS_PROD_TO_PROD_END_TOKEN16TEST_UNLOCKED
CPTRA_SS_RMA_TOKEN16TEST_UNLOCKED
SVN_PARTITIONCPTRA_CORE_FMC_KEY_MANIFEST_SVN4In-Field
CPTRA_CORE_RUNTIME_SVN16In-Field
CPTRA_CORE_SOC_MANIFEST_SVN16In-Field
CPTRA_CORE_SOC_MANIFEST_MAX_SVN4In-Field
VENDOR_TEST_PARTITIONVENDOR_TEST32TEST_UNLOCKED
VENDOR_HASHES_MANUF_PARTITIONCPTRA_CORE_VENDOR_PK_HASH_048MANUF
CPTRA_CORE_PQC_KEY_TYPE_04MANUF
VENDOR_HASHES_PROD_PARTITIONCPTRA_SS_OWNER_PK_HASH48MANUF
CPTRA_SS_OWNER_PQC_KEY_TYPE4MANUF
CPTRA_SS_OWNER_PK_HASH_VALID4MANUF
CPTRA_CORE_VENDOR_PK_HASH_148MANUF
CPTRA_CORE_PQC_KEY_TYPE_14MANUF
CPTRA_CORE_VENDOR_PK_HASH_248MANUF
CPTRA_CORE_PQC_KEY_TYPE_24MANUF
CPTRA_CORE_VENDOR_PK_HASH_348MANUF
CPTRA_CORE_PQC_KEY_TYPE_34MANUF
CPTRA_CORE_VENDOR_PK_HASH_448MANUF
CPTRA_CORE_PQC_KEY_TYPE_44MANUF
CPTRA_CORE_VENDOR_PK_HASH_548MANUF
CPTRA_CORE_PQC_KEY_TYPE_54MANUF
CPTRA_CORE_VENDOR_PK_HASH_648MANUF
CPTRA_CORE_PQC_KEY_TYPE_64MANUF
CPTRA_CORE_VENDOR_PK_HASH_748MANUF
CPTRA_CORE_PQC_KEY_TYPE_74MANUF
CPTRA_CORE_VENDOR_PK_HASH_848MANUF
CPTRA_CORE_PQC_KEY_TYPE_84MANUF
CPTRA_CORE_VENDOR_PK_HASH_948MANUF
CPTRA_CORE_PQC_KEY_TYPE_94MANUF
CPTRA_CORE_VENDOR_PK_HASH_1048MANUF
CPTRA_CORE_PQC_KEY_TYPE_104MANUF
CPTRA_CORE_VENDOR_PK_HASH_1148MANUF
CPTRA_CORE_PQC_KEY_TYPE_114MANUF
CPTRA_CORE_VENDOR_PK_HASH_1248MANUF
CPTRA_CORE_PQC_KEY_TYPE_124MANUF
CPTRA_CORE_VENDOR_PK_HASH_1348MANUF
CPTRA_CORE_PQC_KEY_TYPE_134MANUF
CPTRA_CORE_VENDOR_PK_HASH_1448MANUF
CPTRA_CORE_PQC_KEY_TYPE_144MANUF
CPTRA_CORE_VENDOR_PK_HASH_1548MANUF
CPTRA_CORE_PQC_KEY_TYPE_154MANUF
CPTRA_CORE_VENDOR_PK_HASH_VALID16MANUF
VENDOR_REVOCATIONS_PROD_PARTITIONCPTRA_SS_OWNER_ECC_REVOCATION4In-Field
CPTRA_SS_OWNER_LMS_REVOCATION4In-Field
CPTRA_SS_OWNER_MLDSA_REVOCATION4In-Field
CPTRA_CORE_ECC_REVOCATION_04In-Field
CPTRA_CORE_LMS_REVOCATION_04In-Field
CPTRA_CORE_MLDSA_REVOCATION_04In-Field
CPTRA_CORE_ECC_REVOCATION_14In-Field
CPTRA_CORE_LMS_REVOCATION_14In-Field
CPTRA_CORE_MLDSA_REVOCATION_14In-Field
CPTRA_CORE_ECC_REVOCATION_24In-Field
CPTRA_CORE_LMS_REVOCATION_24In-Field
CPTRA_CORE_MLDSA_REVOCATION_24In-Field
CPTRA_CORE_ECC_REVOCATION_34In-Field
CPTRA_CORE_LMS_REVOCATION_34In-Field
CPTRA_CORE_MLDSA_REVOCATION_34In-Field
CPTRA_CORE_ECC_REVOCATION_44In-Field
CPTRA_CORE_LMS_REVOCATION_44In-Field
CPTRA_CORE_MLDSA_REVOCATION_44In-Field
CPTRA_CORE_ECC_REVOCATION_54In-Field
CPTRA_CORE_LMS_REVOCATION_54In-Field
CPTRA_CORE_MLDSA_REVOCATION_54In-Field
CPTRA_CORE_ECC_REVOCATION_64In-Field
CPTRA_CORE_LMS_REVOCATION_64In-Field
CPTRA_CORE_MLDSA_REVOCATION_64In-Field
CPTRA_CORE_ECC_REVOCATION_74In-Field
CPTRA_CORE_LMS_REVOCATION_74In-Field
CPTRA_CORE_MLDSA_REVOCATION_74In-Field
CPTRA_CORE_ECC_REVOCATION_84In-Field
CPTRA_CORE_LMS_REVOCATION_84In-Field
CPTRA_CORE_MLDSA_REVOCATION_84In-Field
CPTRA_CORE_ECC_REVOCATION_94In-Field
CPTRA_CORE_LMS_REVOCATION_94In-Field
CPTRA_CORE_MLDSA_REVOCATION_94In-Field
CPTRA_CORE_ECC_REVOCATION_104In-Field
CPTRA_CORE_LMS_REVOCATION_104In-Field
CPTRA_CORE_MLDSA_REVOCATION_104In-Field
CPTRA_CORE_ECC_REVOCATION_114In-Field
CPTRA_CORE_LMS_REVOCATION_114In-Field
CPTRA_CORE_MLDSA_REVOCATION_114In-Field
CPTRA_CORE_ECC_REVOCATION_124In-Field
CPTRA_CORE_LMS_REVOCATION_124In-Field
CPTRA_CORE_MLDSA_REVOCATION_124In-Field
CPTRA_CORE_ECC_REVOCATION_134In-Field
CPTRA_CORE_LMS_REVOCATION_134In-Field
CPTRA_CORE_MLDSA_REVOCATION_134In-Field
CPTRA_CORE_ECC_REVOCATION_144In-Field
CPTRA_CORE_LMS_REVOCATION_144In-Field
CPTRA_CORE_MLDSA_REVOCATION_144In-Field
CPTRA_CORE_ECC_REVOCATION_154In-Field
CPTRA_CORE_LMS_REVOCATION_154In-Field
CPTRA_CORE_MLDSA_REVOCATION_154In-Field
VENDOR_SECRET_PROD_PARTITIONCPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_032PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_132PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_232PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_332PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_432PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_532PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_632PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_732PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_832PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_932PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1032PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1132PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1232PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1332PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1432PROD
CPTRA_SS_VENDOR_SPECIFIC_SECRET_FUSE_1532PROD
VENDOR_NON_SECRET_PROD_PARTITIONCPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_032PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_132PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_232PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_332PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_432PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_532PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_632PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_732PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_832PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_932PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1032PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1132PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1232PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1332PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1432PROD
CPTRA_SS_VENDOR_SPECIFIC_NON_SECRET_FUSE_1532PROD
CPTRA_SS_LOCK_HEK_PROD_0CPTRA_SS_LOCK_HEK_PROD_0_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_1CPTRA_SS_LOCK_HEK_PROD_1_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_2CPTRA_SS_LOCK_HEK_PROD_2_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_3CPTRA_SS_LOCK_HEK_PROD_3_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_4CPTRA_SS_LOCK_HEK_PROD_4_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_5CPTRA_SS_LOCK_HEK_PROD_5_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_6CPTRA_SS_LOCK_HEK_PROD_6_RATCHET_SEED48PROD
CPTRA_SS_LOCK_HEK_PROD_7CPTRA_SS_LOCK_HEK_PROD_7_RATCHET_SEED48PROD

Glossary

The following acronyms and abbreviations are used throughout this document.

ATEAutomated Test Equipment
ODMOriginal Design Manufacturer
OSATOutsourced Semiconductor Assembly and Test
FTFinal Test
SLTSystem Level Test
UDSUnique Device Secret
CSRCertificate Signing Request