BaseLib/OUTPUT/./X86ReadGdtr.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86ReadGdtr.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/X86ReadIdtr.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=BaseLibStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/./X86ReadIdtr.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86ReadIdtr.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/X86SpeculationBarrier.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=BaseLibStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/./X86SpeculationBarrier.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86SpeculationBarrier.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/X86Thunk.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=BaseLibStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/./X86Thunk.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86Thunk.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/X86WriteGdtr.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=BaseLibStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/./X86WriteGdtr.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86WriteGdtr.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/X86WriteIdtr.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=BaseLibStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/./X86WriteIdtr.obj -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 /home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Library/BaseLib/X86WriteIdtr.c rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/BaseLib.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/BaseLib.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/MdePkg/Library/BaseLib/BaseLib/OUTPUT/object_files.lst Building ... /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2/Stage2.inf [IA32] Building ... /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1B/Stage1B.inf [IA32] Building ... /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/OsLoader.inf [IA32] Building ... /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Stage1A.inf [IA32] Building ... /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/FirmwareUpdate.inf [IA32] "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/AutoGen.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1AStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/./AutoGen.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/AutoGen.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/AutoGen.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1BStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/./AutoGen.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1B -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/AutoGen.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/AutoGen.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage2Strings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/./AutoGen.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2 -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/AutoGen.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/AutoGen.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./AutoGen.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/AutoGen.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/AutoGen.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./AutoGen.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/AutoGen.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1BStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/./Stage1B.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1B -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1B/Stage1B.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage2Strings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/./Stage2.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2 -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2/Stage2.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/BlockIoTest.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./BlockIoTest.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/BlockIoTest.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/CmdFwUpdate.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./CmdFwUpdate.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/CmdFwUpdate.c Trim --asm-file -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.i -i /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/inc.lst /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32/SecEntry.nasm "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/BootConfig.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./BootConfig.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/BootConfig.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/CsmeFwUpdate.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./CsmeFwUpdate.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/CsmeFwUpdate.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.obj.deps -E -x assembler-with-cpp -include AutoGen.h -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32/SecEntry.nasm > /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.ii Trim --trim-long --source-code -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.iii /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.ii rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/object_files.lst "gcc" -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x40 -Wl,--entry,_ModuleEntryPoint -u _ModuleEntryPoint -Wl,-Map,/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.map,--whole-archive -flto -Os -Wl,-m,elf_i386,--oformat=elf32-i386 -no-pie -Wl,--start-group,@/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/static_library_files.lst,--end-group -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1BStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 -Wl,--script=/home/sadashiva/SBL/slimbootloader-master_1/BaseTools/Scripts/GccBase.lds -Wno-error -no-pie "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./FirmwareUpdate.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/FirmwareUpdate.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2Hob.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage2Strings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/./Stage2Hob.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2 -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2/Stage2Hob.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/BootOption.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./BootOption.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/BootOption.c "nasm" -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/ -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/ -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/ -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/ -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/ -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include/ -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/ -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include/ -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/ -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include/ -f elf32 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.obj /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Ia32/SecEntry.iii "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1AStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/./Stage1A.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage1A/Stage1A.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdateHelper.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./FirmwareUpdateHelper.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/FirmwareUpdateHelper.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/BootParameters.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./BootParameters.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/BootParameters.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2Support.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage2Strings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/./Stage2Support.obj -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2 -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/IncludePrivate -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Stage2/Stage2Support.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/GetCapsuleImage.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/./GetCapsuleImage.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Silicon/CommonSocPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/FirmwareUpdate/GetCapsuleImage.c rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/object_files.lst "gcc" -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x40 -Wl,--entry,_ModuleEntryPoint -u _ModuleEntryPoint -Wl,-Map,/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.map,--whole-archive -flto -Os -Wl,-m,elf_i386,--oformat=elf32-i386 -no-pie -Wl,--start-group,@/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/static_library_files.lst,--end-group -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage1AStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 -Wl,--script=/home/sadashiva/SBL/slimbootloader-master_1/BaseTools/Scripts/GccBase.lds -Wno-error -no-pie "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/ExtraModSupport.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./ExtraModSupport.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/ExtraModSupport.c rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/object_files.lst "gcc" -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x40 -Wl,--entry,_ModuleEntryPoint -u _ModuleEntryPoint -Wl,-Map,/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.map,--whole-archive -flto -Os -Wl,-m,elf_i386,--oformat=elf32-i386 -no-pie -Wl,--start-group,@/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/static_library_files.lst,--end-group -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=FirmwareUpdateStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 -Wl,--script=/home/sadashiva/SBL/slimbootloader-master_1/BaseTools/Scripts/GccBase.lds -Wno-error -no-pie rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/object_files.lst "gcc" -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x40 -Wl,--entry,_ModuleEntryPoint -u _ModuleEntryPoint -Wl,-Map,/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.map,--whole-archive -flto -Os -Wl,-m,elf_i386,--oformat=elf32-i386 -no-pie -Wl,--start-group,@/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/static_library_files.lst,--end-group -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=Stage2Strings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 -Wl,--script=/home/sadashiva/SBL/slimbootloader-master_1/BaseTools/Scripts/GccBase.lds -Wno-error -no-pie "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/KeyManagement.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./KeyManagement.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/KeyManagement.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/LoadImage.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./LoadImage.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/LoadImage.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/ModService.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./ModService.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/ModService.c lto-wrapper: warning: using serial compilation of 2 LTRANS jobs "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./OsLoader.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/OsLoader.c "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/PerformanceData.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./PerformanceData.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/PerformanceData.c lto-wrapper: warning: using serial compilation of 5 LTRANS jobs "gcc" -MMD -MF /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/PreOsSupport.obj.deps -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -c -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/./PreOsSupport.obj -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader -I/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/MdePkg/Include/Ia32 -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg -I/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCommonPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg -I/home/sadashiva/SBL/slimbootloader-master_1/IntelFsp2Pkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg -I/home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/Include -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg -I/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Include /home/sadashiva/SBL/slimbootloader-master_1/PayloadPkg/OsLoader/PreOsSupport.c rm -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.lib "gcc-ar" cr /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.lib @/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/object_files.lst "gcc" -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x40 -Wl,--entry,_ModuleEntryPoint -u _ModuleEntryPoint -Wl,-Map,/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.map,--whole-archive -flto -Os -Wl,-m,elf_i386,--oformat=elf32-i386 -no-pie -Wl,--start-group,@/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/static_library_files.lst,--end-group -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror -Wno-array-bounds -include AutoGen.h -fno-common -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=OsLoaderStrings -m32 -march=i586 -malign-double -fno-stack-protector -D EFI32 -fno-asynchronous-unwind-tables -Wno-address -fno-omit-frame-pointer -fno-pic -fno-pie -flto -fno-pic -DDISABLE_NEW_DEPRECATED_INTERFACES -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 -Wl,--script=/home/sadashiva/SBL/slimbootloader-master_1/BaseTools/Scripts/GccBase.lds -Wno-error -no-pie lto-wrapper: warning: using serial compilation of 4 LTRANS jobs "objcopy" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.debug "objcopy" --strip-unneeded -R .eh_frame /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll "objcopy" --add-gnu-debuglink="/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.debug" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.debug /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage1A.debug "GenFw" -e PEIM -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/Stage1A.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage1A.efi cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/DEBUG/*.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT test -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.map && cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84.map GenFw -t -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84Te.raw /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1A/Stage1A/OUTPUT/Stage1A.efi test -e /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84Te.raw && GenSec -s EFI_SECTION_TE -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84SEC1.1.te /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84Te.raw GenFfs -t EFI_FV_FILETYPE_PEIM -g A0FC7906-3519-4605-BACD-50B7C4392F84 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84.ffs -oi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A0FC7906-3519-4605-BACD-50B7C4392F84Stage1A/A0FC7906-3519-4605-BACD-50B7C4392F84SEC1.1.te -n 16 lto-wrapper: warning: using serial compilation of 7 LTRANS jobs "objcopy" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.debug "objcopy" --strip-unneeded -R .eh_frame /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll "objcopy" --add-gnu-debuglink="/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.debug" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.debug /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage1B.debug "GenFw" -e PEIM -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/Stage1B.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage1B.efi cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/DEBUG/*.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT test -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.map && cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56.map GenFw -t -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56Te.raw /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage1B/Stage1B/OUTPUT/Stage1B.efi test -e /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56Te.raw && GenSec -s EFI_SECTION_TE -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56SEC1.1.te /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56Te.raw GenFfs -t EFI_FV_FILETYPE_PEIM -g A68576FB-074E-4490-A82A-7C56121ECC56 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56.ffs -oi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A68576FB-074E-4490-A82A-7C56121ECC56Stage1B/A68576FB-074E-4490-A82A-7C56121ECC56SEC1.1.te -n 16 "objcopy" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.debug "objcopy" --strip-unneeded -R .eh_frame /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll "objcopy" --add-gnu-debuglink="/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.debug" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.debug /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage2.debug "GenFw" -e PEIM -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/Stage2.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/Stage2.efi cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/DEBUG/*.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT test -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.map && cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4.map GenFw -t -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4Te.raw /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/BootloaderCorePkg/Stage2/Stage2/OUTPUT/Stage2.efi test -e /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4Te.raw && GenSec -s EFI_SECTION_TE -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4SEC1.1.te /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4Te.raw GenFfs -t EFI_FV_FILETYPE_PEIM -g 1BB388F8-77D8-4c00-98A7-38F45931B2A4 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4.ffs -oi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/1BB388F8-77D8-4c00-98A7-38F45931B2A4Stage2/1BB388F8-77D8-4c00-98A7-38F45931B2A4SEC1.1.te -n 16 "objcopy" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.debug "objcopy" --strip-unneeded -R .eh_frame /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll "objcopy" --add-gnu-debuglink="/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.debug" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.debug /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/FirmwareUpdate.debug "GenFw" -e PEIM -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/FirmwareUpdate.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/FirmwareUpdate.efi cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/DEBUG/*.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT test -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.map && cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06.map GenFw -t -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06Te.raw /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/FirmwareUpdate/FirmwareUpdate/OUTPUT/FirmwareUpdate.efi test -e /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06Te.raw && GenSec -s EFI_SECTION_TE -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06SEC1.1.te /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06Te.raw GenFfs -t EFI_FV_FILETYPE_PEIM -g E2E57F60-4C17-461e-92A2-E428DBB12D06 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06.ffs -oi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/E2E57F60-4C17-461e-92A2-E428DBB12D06FirmwareUpdate/E2E57F60-4C17-461e-92A2-E428DBB12D06SEC1.1.te -n 16 "objcopy" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.debug "objcopy" --strip-unneeded -R .eh_frame /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll "objcopy" --add-gnu-debuglink="/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.debug" /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.debug /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/OsLoader.debug "GenFw" -e PEIM -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/OsLoader.dll cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.efi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/OsLoader.efi cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/DEBUG/*.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT test -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.map && cp -p -f /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.map /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514.map GenFw -t -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514Te.raw /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/IA32/PayloadPkg/OsLoader/OsLoader/OUTPUT/OsLoader.efi test -e /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514Te.raw && GenSec -s EFI_SECTION_TE -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514SEC1.1.te /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514Te.raw GenFfs -t EFI_FV_FILETYPE_PEIM -g A257AA67-53F3-491B-8CFF-E9A4E2E2A514 -o /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514.ffs -oi /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Ffs/A257AA67-53F3-491B-8CFF-E9A4E2E2A514OsLoader/A257AA67-53F3-491B-8CFF-E9A4E2E2A514SEC1.1.te -n 16 Fd File Name:STAGE1A (/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/STAGE1A.fd) Generate Region at Offset 0x0 Region Size = 0x7000 Region File Name = /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_T.bin Generate Region at Offset 0x7000 Region Size = 0x21000 Region Name = FV Generating STAGE1A FV ########### Fd File Name:STAGE1B (/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/STAGE1B.fd) Generate Region at Offset 0x0 Region Size = 0xA7000 Region Name = FV Generating STAGE1B FV ### Generate Region at Offset 0xA7000 Region Size = 0x79000 Region File Name = /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_M.bin Fd File Name:STAGE2 (/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/STAGE2.fd) Generate Region at Offset 0x0 Region Size = 0xC0000 Region Name = FV Generating STAGE2 FV ##### Generate Region at Offset 0xC0000 Region Size = 0x40000 Region File Name = /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_S.bin Fd File Name:OSLOADER (/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/OSLOADER.fd) Generate Region at Offset 0x0 Region Size = 0x57000 Region Name = FV Generating OSLOADER FV # Generating FWUPDATE FV # GUID cross reference file can be found at /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/Guid.xref FV Space Information STAGE1A [14%Full] 135168 (0x21000) total, 19888 (0x4db0) used, 115280 (0x1c250) free STAGE1B [14%Full] 684032 (0xa7000) total, 98576 (0x18110) used, 585456 (0x8eef0) free STAGE2 [46%Full] 786432 (0xc0000) total, 367792 (0x59cb0) used, 418640 (0x66350) free OSLOADER [86%Full] 356352 (0x57000) total, 309344 (0x4b860) used, 47008 (0xb7a0) free FWUPDATE [99%Full] 229376 (0x38000) total, 227424 (0x37860) used, 1952 (0x7a0) free Build report can be found at /home/sadashiva/SBL/slimbootloader-master_1/Report.log - Done - Build end time: 15:16:21, Jun.18 2024 Build total time: 00:00:40 Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerCompTestKey_Priv_RSA3072.pem !! Key used for Singing /home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR/ContainerTestKey_Priv_RSA3072.pem !! Container 'IPFW' was created successfully at: /home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/SIIPFW.bin Patching STAGE1A Patched offset 0x00027FFC:[90909090] with value 0xFFFDF000 # Patch BFV Patched offset 0x00007000:[00000000] with value 0xFFFE22B0 # Patch Stage1A Entry Patched offset 0x00007004:[00000000] with value 0xFFFDF5D0 # Patch Module Base Patched offset 0x0000B9DC:[FF000000] with value 0xFFFDF064 # Patch VerInfo Patched offset 0x0000B9D4:[FF000000] with value 0xFFFDF4FC # Patch PcdBase Patched offset 0x00027FF8:[90909090] with value 0xFFFDF0A4 # Patch FlashMap Patched offset 0x00027FC0:[00000000] with value 0xFFFDF2C0 # FIT table Patched offset 0x000072C0:[FFFFFFFF] with value 0x5449465F # FIT Signature Low Patched offset 0x000072C4:[FFFFFFFF] with value 0x2020205F # FIT Signature High Patched offset 0x000072C8:[FFFFFFFF] with value 0x00000103 # FIT FFS section length Patched offset 0x000072C8:[00000103] with value 0x000000D7 # FIT table max length Patched offset 0x0000B9D8:[FF000000] with value 0xFFFDF3B4 # Patch HashStore Patching STAGE1B Patched offset 0x00000000:[00000000] with value 0xFFDF0EE0 # Patch Stage1B Entry Patched offset 0x00000004:[00000000] with value 0xFFDE0070 # Patch Stage1B Base Patched offset 0x00015548:[FF000000] with value 0xFFDF603C # Patch Internal CfgDataBase Patching STAGE2 Patched offset 0x00000000:[00000000] with value 0x0101BD80 # Patch Stage2 Entry Patched offset 0x00000004:[00000000] with value 0x01000070 # Patch Stage2 Base Patched offset 0x00022BAC:[FF000000] with value 0x0104CBE4 # Patch VBT Patched offset 0x00022BB0:[FF000000] with value 0x010248FC # Patch ACPI Patched offset 0x00022BA8:[FF000000] with value 0x0104EA14 # Patch Logo Address Patched offset 0x00022B88:[FFFFFFFF] with value 0x0000B296 # Patch Logo Size Generating redundant components Patching UCODE base in FSP-T UPD parameter to 0xFF9BE000 for STAGE1A_B.fd Rebasing STAGE1B_B Patched 767 entries in 1 TE/PE32 images. Rebase FSP-T from 0xFFFD8000 to 0xFFFD8000: Patched 0 entries in 1 TE/PE32 images. Patched 0 entries using FSP patch table. Rebase FSP-M from 0xFFE87000 to 0xFFB27000: Patched 2054 entries in 8 TE/PE32 images. Patched 0 entries using FSP patch table. Rebase FSP-S from 0x010C0000 to 0x010C0000: Patched 0 entries in 3 TE/PE32 images. Patched 0 entries using FSP patch table. Create FSP component file '/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_S.bin' Create FSP component file '/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_M.bin' Create FSP component file '/home/sadashiva/SBL/slimbootloader-master_1/Build/BootloaderCorePkg/DEBUG_GCC5/FV/FSP_T.bin' Updating HashStore STAGE1A_A.fd Update HashStore entry 0 with file STAGE1B_A.hash Update HashStore entry 1 with file STAGE2.hash Update HashStore entry 2 with file PAYLOAD.hash Update HashStore entry 3 with file FWUPDATE.hash Update HashStore entry 4 with file MSTKEY.hash Updating HashStore STAGE1A_B.fd Update HashStore entry 0 with file STAGE1B_B.hash Update HashStore entry 1 with file STAGE2.hash Update HashStore entry 2 with file PAYLOAD.hash Update HashStore entry 3 with file FWUPDATE.hash Update HashStore entry 4 with file MSTKEY.hash Updating FIT FIT Address: 0xFFFDF2C0 Patching entry 0 with 0xFFD1E000 - uCode Patching entry 1 with 0xFFFA0000:0x00000000 - ACM Patching entry 3 with 0xFFFD8000:0x0000072C - BIOS Module(Stage1A base to FIT table start) Patching entry 4 with 0xFFDE0000:0x00012000 - BIOS Module(Stage1B) Patching entry 5 with 0xFFFD7600:0x00000400 - KM Patching entry 6 with 0xFFFD7A00:0x00000600 - BPM Patching entry 2 with 0xFFFDF340:0x000020CC - BIOS Module(FIT table end to 4GB) FIT 7 entries added Updating Checksum Updating FIT in STAGE1A_B Patching entry 0 from 0xFFD1E000 with 0xFF9BE000 size:0x00000000 Patching entry 4 from 0xFFDE0000 with 0xFFA80000 size:0x00012000 Flash Map Information: +------------------------------------------------------------------------+ | FLASH MAP | | (RomSize = 0x00D00000) | +------------------------------------------------------------------------+ | NAME | OFFSET (BASE) | SIZE | FLAGS | +----------+------------------------+------------+-----------------------+ +------------------------------------------------------------------------+ | TOP SWAP A | +------------------------------------------------------------------------+ | SG1A | 0xcd8000(0xFFFD8000) | 0x028000 | Uncompressed, TS_A | | ACM0 | 0xca0000(0xFFFA0000) | 0x038000 | Uncompressed, TS_A | | EMTY | 0xc80000(0xFFF80000) | 0x020000 | Uncompressed, TS_A | +------------------------------------------------------------------------+ | TOP SWAP B | +------------------------------------------------------------------------+ | SG1A | 0xc58000(0xFFF58000) | 0x028000 | Uncompressed, TS_B | | ACM0 | 0xc20000(0xFFF20000) | 0x038000 | Uncompressed, TS_B | | EMTY | 0xc00000(0xFFF00000) | 0x020000 | Uncompressed, TS_B | +------------------------------------------------------------------------+ | REDUNDANT A | +------------------------------------------------------------------------+ | SG1B | 0xae0000(0xFFDE0000) | 0x120000 | Uncompressed, R_A | | KEYH | 0xadf000(0xFFDDF000) | 0x001000 | Uncompressed, R_A | | CNFG | 0xadb000(0xFFDDB000) | 0x004000 | Uncompressed, R_A | | FWUP | 0xabf000(0xFFDBF000) | 0x01c000 | Compressed , R_A | | SG02 | 0xa2e000(0xFFD2E000) | 0x091000 | Compressed , R_A | | UCOD | 0xa1e000(0xFFD1E000) | 0x010000 | Uncompressed, R_A | | EMTY | 0x8a0000(0xFFBA0000) | 0x17e000 | Uncompressed, R_A | +------------------------------------------------------------------------+ | REDUNDANT B | +------------------------------------------------------------------------+ | SG1B | 0x780000(0xFFA80000) | 0x120000 | Uncompressed, R_B | | KEYH | 0x77f000(0xFFA7F000) | 0x001000 | Uncompressed, R_B | | CNFG | 0x77b000(0xFFA7B000) | 0x004000 | Uncompressed, R_B | | FWUP | 0x75f000(0xFFA5F000) | 0x01c000 | Compressed , R_B | | SG02 | 0x6ce000(0xFF9CE000) | 0x091000 | Compressed , R_B | | UCOD | 0x6be000(0xFF9BE000) | 0x010000 | Uncompressed, R_B | | EMTY | 0x540000(0xFF840000) | 0x17e000 | Uncompressed, R_B | +------------------------------------------------------------------------+ | NON REDUNDANT | +------------------------------------------------------------------------+ | PYLD | 0x510000(0xFF810000) | 0x030000 | Compressed , NR | | UVAR | 0x50f000(0xFF80F000) | 0x001000 | Uncompressed, NR | | EPLD | 0x3ad000(0xFF6AD000) | 0x162000 | Uncompressed, NR | | MRCD | 0x3a5000(0xFF6A5000) | 0x008000 | Uncompressed, NR | | VARS | 0x3a3000(0xFF6A3000) | 0x002000 | Uncompressed, NR | | IPFW | 0x335000(0xFF635000) | 0x06e000 | Uncompressed, NR | | EMTY | 0x001000(0xFF301000) | 0x334000 | Uncompressed, NR | +------------------------------------------------------------------------+ | NON VOLATILE | +------------------------------------------------------------------------+ | RSVD | 0x000000(0xFF300000) | 0x001000 | Uncompressed, NV | +----------+------------------------+------------+-----------------------+ Done [ehl] ! sadashiva@SVR33U:~/SBL/slimbootloader-master_1$ python3 Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s Outputs\ehl\StitchComponents.zip -c Platform\ElkhartBoardPkg\Script\StitchIfwiConfig.py -w C:\Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 213, in main stitch_cfg_file = imp.load_source('StitchIfwiConfig', args.config_file) File "/usr/lib/python3.10/imp.py", line 172, in load_source module = _load(spec) File "", line 719, in _load File "", line 688, in _load_unlocked File "", line 879, in exec_module File "", line 1016, in get_code File "/usr/lib/python3.10/imp.py", line 158, in get_data return super().get_data(path) File "", line 1073, in get_data FileNotFoundError: [Errno 2] No such file or directory: 'PlatformElkhartBoardPkgScriptStitchIfwiConfig.py' sadashiva@SVR33U:~/SBL/slimbootloader-master_1$ cd Platform/ElkhartlakeBoardPkg/ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ python3 StitchLoader.py -i ifwi.bin -s SlimBootloader.bin -o sbl_ifwi_img.bin python3: can't open file '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/StitchLoader.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ python3 StitchLoader.py -i ifwi.bin -s SlimBootloader.bin -o sbl_ifwi_img.bin python3: can't open file '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/StitchLoader.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ python3 StitchIfwi.py -h python3: can't open file '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/StitchIfwi.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ cd Script/ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -h /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp usage: StitchIfwi.py [-h] [-p PLATFORM] [-w WORK_DIR] -c CONFIG_FILE [-s SBL_FILE] [-b {legacy,vm,fve,fvme}] [-d PLAT_DATA] [-r] [-t {ptt,dtpm,none}] -k KEY_DIR [-o OPTION] [-op OUTPATH] options: -h, --help show this help message and exit -p PLATFORM specify platform sku to stitch -w WORK_DIR specify stitch workspace directory, CSME tools and ingredients should be here -c CONFIG_FILE specify the platform specific stitch config file -s SBL_FILE specify slim bootloader file or generate zip file -b {legacy,vm,fve,fvme} specify Boot Guard profile type -d PLAT_DATA Specify a platform specific data (HEX, DWORD) for customization -r delete temporary files after stitch -t {ptt,dtpm,none} specify TPM type -k KEY_DIR specify the path to Sbl Keys directory -o OPTION Platform specific stitch option. Format: '-o option1;option2;...' For each option its format is 'parameter:data'. Try -o help for more information -op OUTPATH Specify path to write output IFIW and signed bin files sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchLoader.py -i ifwi.bin -s SlimBootloader.bin -o sbl_img.bin Creating IFWI image ... done! sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -i ifwi.bin -s SlimBootloader.bin -o sbl_img.bin /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp usage: StitchIfwi.py [-h] [-p PLATFORM] [-w WORK_DIR] -c CONFIG_FILE [-s SBL_FILE] [-b {legacy,vm,fve,fvme}] [-d PLAT_DATA] [-r] [-t {ptt,dtpm,none}] -k KEY_DIR [-o OPTION] [-op OUTPATH] sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ vim StitchIfwi.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w ./ -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 128, in stitch shutil.copytree (os.path.join (stitch_dir, 'Input'), temp_dir) File "/usr/lib/python3.10/shutil.py", line 557, in copytree with os.scandir(src) as itr: FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/Input' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w . -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 128, in stitch shutil.copytree (os.path.join (stitch_dir, 'Input'), temp_dir) File "/usr/lib/python3.10/shutil.py", line 557, in copytree with os.scandir(src) as itr: FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/Input' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ ls GpioDataConfig.py ifwi.bin __pycache__ sbl_img.bin SlimBootloader.bin StitchIfwiConfig.py StitchIfwi.py StitchLoader.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w . -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 128, in stitch shutil.copytree (os.path.join (stitch_dir, 'Input'), temp_dir) File "/usr/lib/python3.10/shutil.py", line 557, in copytree with os.scandir(src) as itr: FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/Input' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ pwd /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w .home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 246, in main os.chdir(work_dir) FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/.home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp Please specify stitch work directory This is an IFWI stitch config script for Slim Bootloader For the FIT tool and stitching ingredients listed in step 2 below, please contact your Intel representative. 1. Create a stitching workspace directory. The paths mentioned below are all relative to it. 2. Extract required tools and ingredients to stitching workspace. - FIT tool Copy 'fit.exe' or 'fit' and 'vsccommn.bin' to 'Fit' folder - BPMGEN2 Tool Copy the contents of the tool to Bpmgen2 folder Rename the bpmgen2 parameter to bpmgen2.params if its name is not this name. - Components Copy 'cse_image.bin' to 'Input/cse_image.bin' Copy PMC firmware image to 'Input/pmc.bin'. Copy EC firmware image to 'Input/ec.bin'. copy ECregionpointer.bin to 'Input/ecregionpointer.bin' Copy GBE binary image to 'Input/gbe.bin'. Copy ACM firmware image to 'Input/acm.bin'. 3. Openssl Openssl is required for stitch. the stitch tool will search evn OPENSSL_PATH, to find Openssl. If evn OPENSSL_PATH is not found, will find openssl from "C:\Openssl\Openssl" 4. Stitch the final image EX: Assuming stitching workspace is at D:\Stitch and building ifwi for EHL platform To stitch IFWI with SPI QUAD mode and Boot Guard profile VM: StitchIfwi.py -b vm -p ehl -w D:\Stitch -s Stitch_Components.zip -c StitchIfwiConfig.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w .home/sadashiva/SBL/slimbootloader-master_1 -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 246, in main os.chdir(work_dir) FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/.home/sadashiva/SBL/slimbootloader-master_1' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -w ../../../ -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 128, in stitch shutil.copytree (os.path.join (stitch_dir, 'Input'), temp_dir) File "/usr/lib/python3.10/shutil.py", line 557, in copytree with os.scandir(src) as itr: FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/slimbootloader-master_1/Input' sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ vim StitchIfwi.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp Please specify stitch work directory This is an IFWI stitch config script for Slim Bootloader For the FIT tool and stitching ingredients listed in step 2 below, please contact your Intel representative. 1. Create a stitching workspace directory. The paths mentioned below are all relative to it. 2. Extract required tools and ingredients to stitching workspace. - FIT tool Copy 'fit.exe' or 'fit' and 'vsccommn.bin' to 'Fit' folder - BPMGEN2 Tool Copy the contents of the tool to Bpmgen2 folder Rename the bpmgen2 parameter to bpmgen2.params if its name is not this name. - Components Copy 'cse_image.bin' to 'Input/cse_image.bin' Copy PMC firmware image to 'Input/pmc.bin'. Copy EC firmware image to 'Input/ec.bin'. copy ECregionpointer.bin to 'Input/ecregionpointer.bin' Copy GBE binary image to 'Input/gbe.bin'. Copy ACM firmware image to 'Input/acm.bin'. 3. Openssl Openssl is required for stitch. the stitch tool will search evn OPENSSL_PATH, to find Openssl. If evn OPENSSL_PATH is not found, will find openssl from "C:\Openssl\Openssl" 4. Stitch the final image EX: Assuming stitching workspace is at D:\Stitch and building ifwi for EHL platform To stitch IFWI with SPI QUAD mode and Boot Guard profile VM: StitchIfwi.py -b vm -p ehl -w D:\Stitch -s Stitch_Components.zip -c StitchIfwiConfig.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ ls GpioDataConfig.py ifwi.bin __pycache__ sbl_img.bin SlimBootloader.bin StitchIfwiConfig.py StitchIfwi.py StitchLoader.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -i ifwi.bin -c StitchIfwiConfig.py -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp usage: StitchIfwi.py [-h] [-p PLATFORM] [-w WORK_DIR] -c CONFIG_FILE [-s SBL_FILE] [-b {legacy,vm,fve,fvme}] [-d PLAT_DATA] [-r] [-t {ptt,dtpm,none}] -k KEY_DIR [-o OPTION] [-op OUTPATH] StitchIfwi.py: error: unrecognized arguments: -i ifwi.bin sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ ls GpioDataConfig.py ifwi.bin __pycache__ sbl_img.bin SlimBootloader.bin StitchIfwiConfig.py StitchIfwi.py StitchLoader.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ cd ../ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ ls AcpiTables BoardConfig.py CfgData ElkhartlakeBoardPkg.dec Include Library Script VbtBin VerInfo.txt sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ cd sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ sadashiva@SVR33U:~$ cd ! bash: cd: !: No such file or directory sadashiva@SVR33U:~$ cd !~ cd ~/intelFPGA_pro/23.2/nios2eds/nios2_command_shell.sh quartus_pfg -c ../org_sof_files/ghrd_1sx280hu2f50e1vgas.sof s10_socdk_flash_image.jic -o device=MT25QU02G -o flash_loader=1SX280HU2 -o hps_path=u-boot-socfpga/spl/u-boot-spl-dtb.hex -o mode=ASX4 bash: cd: too many arguments sadashiva@SVR33U:~$ cd ~/intelFPGA_pro/23.2/nios2eds/nios2_command_shell.sh quartus_pfg -c ../org_sof_files/ghrd_1sx280hu2f50e1vgas.sof s10_socdk_flash_image.jic -o device=MT25QU02G -o flash_loader=1SX280HU2 -o hps_path=u-boot-socfpga/spl/u-boot-spl-dtb.hex -o mode=ASX4^C sadashiva@SVR33U:~$ cd SBL/slimbootloader-master_1/ sadashiva@SVR33U:~/SBL/slimbootloader-master_1$ ls BaseTools BootloaderCorePkg BuildLoader.py Conf IntelFsp2Pkg Licenses Outputs Platform Report.log BootloaderCommonPkg Build CODEOWNERS Dockerfile LICENSE MdePkg PayloadPkg README.rst Silicon sadashiva@SVR33U:~/SBL/slimbootloader-master_1$ cd Platform/ElkhartlakeBoardPkg/Script/ sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -b legacy -s ../../../Outputs/ehl/Stitch_Components.zip -c StitchIfwiConfig.py -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp Please specify stitch work directory This is an IFWI stitch config script for Slim Bootloader For the FIT tool and stitching ingredients listed in step 2 below, please contact your Intel representative. 1. Create a stitching workspace directory. The paths mentioned below are all relative to it. 2. Extract required tools and ingredients to stitching workspace. - FIT tool Copy 'fit.exe' or 'fit' and 'vsccommn.bin' to 'Fit' folder - BPMGEN2 Tool Copy the contents of the tool to Bpmgen2 folder Rename the bpmgen2 parameter to bpmgen2.params if its name is not this name. - Components Copy 'cse_image.bin' to 'Input/cse_image.bin' Copy PMC firmware image to 'Input/pmc.bin'. Copy EC firmware image to 'Input/ec.bin'. copy ECregionpointer.bin to 'Input/ecregionpointer.bin' Copy GBE binary image to 'Input/gbe.bin'. Copy ACM firmware image to 'Input/acm.bin'. 3. Openssl Openssl is required for stitch. the stitch tool will search evn OPENSSL_PATH, to find Openssl. If evn OPENSSL_PATH is not found, will find openssl from "C:\Openssl\Openssl" 4. Stitch the final image EX: Assuming stitching workspace is at D:\Stitch and building ifwi for EHL platform To stitch IFWI with SPI QUAD mode and Boot Guard profile VM: StitchIfwi.py -b vm -p ehl -w D:\Stitch -s Stitch_Components.zip -c StitchIfwiConfig.py sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ python3 StitchIfwi.py -h /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp usage: StitchIfwi.py [-h] [-p PLATFORM] [-w WORK_DIR] -c CONFIG_FILE [-s SBL_FILE] [-b {legacy,vm,fve,fvme}] [-d PLAT_DATA] [-r] [-t {ptt,dtpm,none}] -k KEY_DIR [-o OPTION] [-op OUTPATH] options: -h, --help show this help message and exit -p PLATFORM specify platform sku to stitch -w WORK_DIR specify stitch workspace directory, CSME tools and ingredients should be here -c CONFIG_FILE specify the platform specific stitch config file -s SBL_FILE specify slim bootloader file or generate zip file -b {legacy,vm,fve,fvme} specify Boot Guard profile type -d PLAT_DATA Specify a platform specific data (HEX, DWORD) for customization -r delete temporary files after stitch -t {ptt,dtpm,none} specify TPM type -k KEY_DIR specify the path to Sbl Keys directory -o OPTION Platform specific stitch option. Format: '-o option1;option2;...' For each option its format is 'parameter:data'. Try -o help for more information -op OUTPATH Specify path to write output IFIW and signed bin files sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script$ cd .. sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg$ cd .. sadashiva@SVR33U:~/SBL/slimbootloader-master_1/Platform$ cd .. sadashiva@SVR33U:~/SBL/slimbootloader-master_1$ cd .. sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master slimbootloader-master/ slimbootloader-master_1/ sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master slimbootloader-master/ slimbootloader-master_1/ sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1 /usr/bin/python3: can't find '__main__' module in '/home/sadashiva/SBL/slimbootloader-master_1' sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 138, in stitch zf = zipfile.ZipFile(sbl_file, 'r', zipfile.ZIP_DEFLATED) File "/usr/lib/python3.10/zipfile.py", line 1251, in __init__ self.fp = io.open(file, filemode) FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/Outputs/ehl/Stitch_Components.zip' sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR [sudo] password for sadashiva: /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR [sudo] password for sadashiva: /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ python3 SBL/slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py -h python3: can't open file '/home/sadashiva/SBL/SBL/slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py -h python3: can't open file '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py -h python3: can't open file '/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartBoardPkg/Script/StitchIfwi.py': [Errno 2] No such file or directory sadashiva@SVR33U:~/SBL$ python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ export SBL_KEY_DIR=/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/SBL_KEY_DIR sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... Error in running process: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 156, in stitch gen_xml_file(stitch_dir, stitch_cfg_file, btg_profile, plt_params_list, platform, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 49, in gen_xml_file run_process (cmd) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Fit/fit' sadashiva@SVR33U:~/SBL$ chmod +x /home/sadashiva/SBL/Stitching/Fit/fit sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:06:05 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 137, in update_btGuard_manifests gen_bpmgen2_params(stitch_cfg_file, os.path.join(bpm_gen2dir, "bpmgen2.params"), os.path.join(output_dir, "bpmgen2.params")) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 105, in gen_bpmgen2_params InFileptr = open(InFile, 'r', encoding='utf8') FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2.params' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:06:47 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating new keys.... writing RSA key writing RSA key Generating Btg KeyManifest.bin.... Error in running process: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 140, in update_btGuard_manifests sign_slimboot_binary(sbl_file, bpm_gen2dir, bmpgen_params, bpm_key_dir, key_size, hash_type, out_file, output_dir, key_manifest_hash_file) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 243, in sign_slimboot_binary bpm_sign_binary(infile, os.path.join(output_dir, "sbl_sec.bin"), output_dir, bpm_gen2dir, key_dir, bpmgen2_params, key_sz, oem_pub_key_hash_file, hash_type) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 205, in bpm_sign_binary run_process ([bpmgen2_tool, File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: '/home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:16:36 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... Error in running process: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 140, in update_btGuard_manifests sign_slimboot_binary(sbl_file, bpm_gen2dir, bmpgen_params, bpm_key_dir, key_size, hash_type, out_file, output_dir, key_manifest_hash_file) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 243, in sign_slimboot_binary bpm_sign_binary(infile, os.path.join(output_dir, "sbl_sec.bin"), output_dir, bpm_gen2dir, key_dir, bpmgen2_params, key_sz, oem_pub_key_hash_file, hash_type) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 205, in bpm_sign_binary run_process ([bpmgen2_tool, File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:17:09 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... Error in running process: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 140, in update_btGuard_manifests sign_slimboot_binary(sbl_file, bpm_gen2dir, bmpgen_params, bpm_key_dir, key_size, hash_type, out_file, output_dir, key_manifest_hash_file) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 243, in sign_slimboot_binary bpm_sign_binary(infile, os.path.join(output_dir, "sbl_sec.bin"), output_dir, bpm_gen2dir, key_dir, bpmgen2_params, key_sz, oem_pub_key_hash_file, hash_type) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 205, in bpm_sign_binary run_process ([bpmgen2_tool, File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2' sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:18:24 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... Error in running process: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 140, in update_btGuard_manifests sign_slimboot_binary(sbl_file, bpm_gen2dir, bmpgen_params, bpm_key_dir, key_size, hash_type, out_file, output_dir, key_manifest_hash_file) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 243, in sign_slimboot_binary bpm_sign_binary(infile, os.path.join(output_dir, "sbl_sec.bin"), output_dir, bpm_gen2dir, key_dir, bpmgen2_params, key_sz, oem_pub_key_hash_file, hash_type) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 205, in bpm_sign_binary run_process ([bpmgen2_tool, File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2' sadashiva@SVR33U:~/SBL$ chmod +x /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:01 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Start KM Gen function Adding Public Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem, Producing KM binary output file /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin KM Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem, KM Public Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem, Key Manifest ID: 1, KM Key Hash: 12, Signing Scheme: 22, KMSVN: 0, pKmOutFileName /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin || KeyCount 1 || SigSource 1 Generating KM - Get Public Keys (1) Usage: 1, Alg: 0xB ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc fabb28a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0xfabb28a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at fabb28a0 ## Base64 data starting address: fabb28bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc fabb1890 ## Placing result in DER Buffer at address: fabb1890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: fabb28bb, B64Length: 0x23d pDecodeLocation: fabb1890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xfabb28a0 @@ -- Free 0xfabb1890 ## DEBUG (ReadKey) end - Calcualting Public Keyhash -- an RSA key 384 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f - Creating KM signature ## DEBUG (KmGenMain) Addr KM: a007a1e0, pSignature: a007a224 - RSA signature ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem @@ malloc fabb28a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0xfabb28a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at fabb28a0 ## Base64 data starting address: fabb28bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc fabb1890 ## Placing result in DER Buffer at address: fabb1890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: fabb28bb, B64Length: 0x23d pDecodeLocation: fabb1890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xfabb28a0 @@ -- Free 0xfabb1890 ## DEBUG (ReadKey) end ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc fabb1a50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xfabb1a50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at fabb1a50 ## Base64 data starting address: fabb1a6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc fabb2b20 ## Placing result in DER Buffer at address: fabb2b20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: fabb1a6c, B64Length: 0x97e pDecodeLocation: fabb2b20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xfabb1a50 @@ -- Free 0xfabb2b20 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc fabb1a50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xfabb1a50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at fabb1a50 ## Base64 data starting address: fabb1a6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc fabb2b20 ## Placing result in DER Buffer at address: fabb2b20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: fabb1a6c, B64Length: 0x97e pDecodeLocation: fabb2b20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0xfabb1a50 @@ -- Free 0xfabb2b20 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc fabb1a50 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc fabb2280 ##-- BigNumInit ##-- Created BigNumber Context @0xFABB2280 size: 823 ##-- pData: a0079d90 ## Creating BigNumber Context - NumBytes: 4 @@ malloc fabb25c0 ##-- BigNumInit ##-- Created BigNumber Context @0xFABB25C0 size: 71 ##-- pData: a0079d44 @@ -- Free 0xfabb2280 @@ -- Free 0xfabb25c0 ##-- Created RSA PubKey Context @0xFABB1A50 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc fabb2b20 ##-- Setting Modulus: 0000: 75 2a f2 18 e9 5d 82 6f ##-- Setting PrivateExp: 0000: f1 25 cb 4a 0f 38 f3 09 ## Creating BigNumber Context - NumBytes: 384 @@ malloc fabb2280 ##-- BigNumInit ##-- Created BigNumber Context @0xFABB2280 size: 823 ##-- pData: a0079d90 ## Creating BigNumber Context - NumBytes: 384 @@ malloc fabb3500 ##-- BigNumInit ##-- Created BigNumber Context @0xFABB3500 size: 823 ##-- pData: a0079f10 @@ -- Free 0xfabb2280 @@ -- Free 0xfabb3500 ##-- Created RSA PrivateKey Context @0xFABB2B20 size: 2511 @@ malloc fabb3840 Random Number (256 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc fabb2610 ## -- Randomize the seed ## -- seed: -1610113868 ## Creating BigNumber Context - NumBytes: 4 @@ malloc fabb25c0 ##-- BigNumInit ##-- Created BigNumber Context @0xFABB25C0 size: 71 ##-- pData: a0079cb4 @@ -- Free 0xfabb25c0 @@ -- Free 0xfabb2610 Random Number (256 bits): b9 34 f9 46 d6 b0 dc b e4 6b d4 f0 86 cc dd 8 70 e6 fd 3e be 76 af ae f1 41 81 ae 44 ff fb a7 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0xfabb1a50 @@ -- Free 0xfabb2b20 @@ -- Free 0xfabb3840 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f 10 01 00 10 00 0c 01 00 01 00 75 2a 0050: f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb 0060: c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f a3 40 0070: 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 0080: e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 ea 79 0090: 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb 00a0: e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 00b0: c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 00c0: b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 00d0: ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 00e0: 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 00f0: 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 0100: 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 ab 18 0110: 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 dd ac 0120: ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0130: 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 0140: c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 1a f9 0150: b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 0160: 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 0170: 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 06 d6 0180: fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 d4 23 0190: e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 b8 74 01a0: ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 01b0: 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 96 28 01c0: ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 16 00 01d0: 10 00 0c 0b 00 50 49 3c ef 1f f7 34 c5 05 3d 55 01e0: 10 36 be 22 ab bf 01 3d 16 3b b6 12 27 17 01 bf 01f0: fb 27 9a fb 72 89 fd 86 71 f3 81 1d a3 5b 09 f8 0200: 5d 88 3a a3 48 e2 5d 95 48 c7 89 a4 e3 6a 18 d0 0210: 15 a9 f3 94 da 8c 8c 24 dc 53 64 2b 7d a4 5e 26 0220: b3 21 5f b8 58 f9 67 29 47 d1 d9 cb 60 ae d3 d4 0230: 6b 64 13 c7 28 ec 01 9e d7 87 5b c8 e5 7c 3e 80 0240: 2a c9 90 34 65 da 5c 70 ba 33 60 04 9e 56 82 2f 0250: 9f 6b d3 5e 6e 0b 56 90 c9 4f 3c f8 2c cd 4c 69 0260: 7c f0 06 58 46 b4 3e 3a 1c 25 b2 8f f4 9c 13 0c 0270: dc 77 5e 2b 45 66 e7 ed e4 18 f6 94 36 8e 4f 0c 0280: 61 3f cb 94 89 ec 29 a3 d3 bd ba b9 56 5b f1 e0 0290: 1c 81 2a 0f fa 5d 0d 96 23 42 c7 81 2c d4 c0 d4 02a0: a8 aa d1 00 9a 07 1f f1 84 ee a0 41 02 27 a0 1b 02b0: 01 c5 a5 39 c2 5a c4 5e ba 0a 2f 18 13 a0 a3 c8 02c0: d2 18 df 3c 20 1c 60 bc a2 2a 38 ab 9b 78 fe 06 02d0: 2d 47 28 1b 07 f1 49 81 0a c7 db 96 6e 2a fd d9 02e0: cf c3 cc 21 81 a1 fc 3d 1a 00 0a 06 19 66 c8 99 02f0: 40 8d 8e 0a 36 c2 7b 4f 4a f6 62 3d f9 7a cc 23 0300: 0e 48 5c 7c d2 da 33 8e c7 9e e4 96 58 84 d5 bf 0310: 1d a8 22 75 ec 81 d4 25 31 8b 6c 88 5d e6 6f 4b 0320: 7d 27 5f 05 a4 a5 a1 46 61 e8 31 6b 3e fc 22 7e 0330: 40 50 5b 90 1b 06 ef a9 50 55 1f c2 d3 32 f9 de 0340: a4 75 d3 5b 36 6e 3e d7 cc ba 62 82 91 71 8d e5 0350: 66 aa 0c 95 5f ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 50 49 3c ef 1f f7 34 c5 05 3d 55 10 36 be 22 ab 0010: bf 01 3d 16 3b b6 12 27 17 01 bf fb 27 9a fb 72 0020: 89 fd 86 71 f3 81 1d a3 5b 09 f8 5d 88 3a a3 48 0030: e2 5d 95 48 c7 89 a4 e3 6a 18 d0 15 a9 f3 94 da 0040: 8c 8c 24 dc 53 64 2b 7d a4 5e 26 b3 21 5f b8 58 0050: f9 67 29 47 d1 d9 cb 60 ae d3 d4 6b 64 13 c7 28 0060: ec 01 9e d7 87 5b c8 e5 7c 3e 80 2a c9 90 34 65 0070: da 5c 70 ba 33 60 04 9e 56 82 2f 9f 6b d3 5e 6e 0080: 0b 56 90 c9 4f 3c f8 2c cd 4c 69 7c f0 06 58 46 0090: b4 3e 3a 1c 25 b2 8f f4 9c 13 0c dc 77 5e 2b 45 00a0: 66 e7 ed e4 18 f6 94 36 8e 4f 0c 61 3f cb 94 89 00b0: ec 29 a3 d3 bd ba b9 56 5b f1 e0 1c 81 2a 0f fa 00c0: 5d 0d 96 23 42 c7 81 2c d4 c0 d4 a8 aa d1 00 9a 00d0: 07 1f f1 84 ee a0 41 02 27 a0 1b 01 c5 a5 39 c2 00e0: 5a c4 5e ba 0a 2f 18 13 a0 a3 c8 d2 18 df 3c 20 00f0: 1c 60 bc a2 2a 38 ab 9b 78 fe 06 2d 47 28 1b 07 0100: f1 49 81 0a c7 db 96 6e 2a fd d9 cf c3 cc 21 81 0110: a1 fc 3d 1a 00 0a 06 19 66 c8 99 40 8d 8e 0a 36 0120: c2 7b 4f 4a f6 62 3d f9 7a cc 23 0e 48 5c 7c d2 0130: da 33 8e c7 9e e4 96 58 84 d5 bf 1d a8 22 75 ec 0140: 81 d4 25 31 8b 6c 88 5d e6 6f 4b 7d 27 5f 05 a4 0150: a5 a1 46 61 e8 31 6b 3e fc 22 7e 40 50 5b 90 1b 0160: 06 ef a9 50 55 1f c2 d3 32 f9 de a4 75 d3 5b 36 0170: 6e 3e d7 cc ba 62 82 91 71 8d e5 66 aa 0c 95 5f Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Writing KM to file (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin, BufAddress: a007a1e0, Size 0x355 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin (0x355 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end Generating Btg Boot Policy Manifest (BPM).bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 GEN /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params -BPM /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin -U /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -d:2 Start BPM Gen function --Will Produce BPM binary output file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin --Will generate modified BIOS file /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin with updated BPM and with KM from /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin --Verbose level 2 ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin @@ malloc (FileBufferRaw) ba4ef010 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin Opened BIOS File 13312 KBytes (0xD00000) ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin @@ malloc b49878a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin Parsing input parameter file Processing BPM parameter file /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params --readBuffer: FileVersion pValue: 1 Header valid -- Parsing rest of the file 0: ToolVersion '7' 0: ToolDate '20000101' 0: FileDate '20240618' 0: # BPM_DEF '# BPM_DEF' Processing BPM Header section 1: PlatformRules 'EHL Embedded' 1: BpmStrutVersion '0x20' 1: BpmRevision '0x01' 1: BpmRevocation '1' 1: AcmRevocation '2' 1: NEMPages '3' 1: IbbSetCount '1' 1: CurrentIbbSet '0' 1: # IBB_SET '# IBB_SET' Processing IBB Elements section 2: IbbSetType '0:ColdBoot' 2: IbbSetInclude 'TRUE' 2: PBETValue '0xF' 2: MCHBAR '0x00000000FEC80000' 2: VTD_BAR '0x00000000FED91000' 2: DmaProtBase0 '0x0' 2: DmaProtLimit0 '0x0' 2: DmaProtBase1 '0x0' 2: DmaProtLimit1 '0x0' 2: IbbFlags '0x2' 2: DmaProtAutoCalc 'FALSE' 2: IbbHashAlgID '0x0C:SHA384' 2: IbbEntry '0xFFFFFFF0' 2: PostIbbHashAlgID '0x10' 2: PostIBBHashSource 'Calculate' 2: PostIbbHashFile '' 2: IbbSegSource 'FIT' 2: IbbSegFile '' 2: IbbGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 2: ObbHashAlgID '0x10' 2: ObbFullFvHash 'FALSE' 2: ObbHashSource 'File' 2: ObbHashFile '' 2: # TXT_ELEMENT '# TXT_ELEMENT' Processing TXT Element section 3: TxtInclude 'FALSE' 3: MinSvn '0x0' 3: TxtFlags '0x0' 3: StrideSize '0x0' 3: AcpiBase '0x400' 3: PwrmBase '0xFE000000' 3: PdUseDefault 'TRUE' 3: PdMinutes '5' 3: PdSeconds '0' 3: PttCmosOffset0 '0x7E' 3: PttCmosOffset1 '0x7F' 3: TxtSegSource 'IBB' 3: TxtSegGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 3: TxtSegHashAlgID '0x10' 3: # PLATFORM_CONFIG_ELEMENT '# PLATFORM_CONFIG_ELEMENT' Processing Platform Config Data Element section 4: PcdInclude 'FALSE' 4: PdReqLocation 'TPM' 4: CmosIndexRegister '0x70' 4: CmosDataRegister '0x71' 4: CmosIndexOffset '125' 4: CmosBitFieldWidth '3' 4: CmosBitFieldPosition '0' 4: # TPM1.2_LOCATION '# TPM1.2_LOCATION' 4: TpmIndexHandle '0x50000004' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # TPM2.0_LOCATION '# TPM2.0_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # PTT_LOCATION '# PTT_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # COMMUNICATION_NEM_BUFFER '# COMMUNICATION_NEM_BUFFER' 4: CnbsInclude 'False' 4: CnbsBase '0xFF000000' 4: CnbsSize '0x1000' 4: # PLATFORM_MANUFACTURERS_ELEMENT '# PLATFORM_MANUFACTURERS_ELEMENT' Processing Platfrom Manufacturer's Element section 5: PmdeInclude 'FALSE' 5: PmdeFile '' 5: # PLATFORM_FIRMWARE_RESILIENCY_ELEMENT '# PLATFORM_FIRMWARE_RESILIENCY_ELEMENT' Processing Platform Firmware Resiliency Element Section 7: PfrsInclude 'FALSE' 7: PfrsControlFlags '0x00000000' 7: PfrsCpldSmbusAddr '0x0' 7: PfrsPchActiveOffset '0x0' 7: PfrsPchRecoveryOffset '0x0' 7: PfrsPchStagingOffset '0x0' 7: PfrsBmcActiveOffset '0x0' 7: PfrsBmcRecoveryOffset '0x0' 7: PfrsBmcStagingOffset '0x0' 7: # BPM_SIGNATURE '# BPM_SIGNATURE' Processing Signature Element section 6: BpmSigSource 'Internal' 6: BpmSigHashAlgID '0x0C:SHA384' 6: BpmSigKeyType '0x01' 6: BpmSigScheme '0x16:RSAPSS' 6: BpmKeySizeBits '3072' 6: BpmSigPubKey 'BpmGen2/keys/bpm_pubkey_3072.pem' 6: BpmSigPrivKey 'BpmGen2/keys/bpm_privkey_3072.pem' 6: BpmSigBatch '' 6: BpmSigData '' 6: BpmSigDataType 'BPM Body' 6: BpmSigXSig '' 6: #EOF '#EOF' Parsing FIT Table ba4f0000 d00000 ## DEBUG (ParseFitIntoContext) start ## FitTableFlashAddr: fffdf2c0 ## Actual FIT Addr: bb1cf2c0 ## DEBUG ACM Size: 17e80 (97920) ## FIT BIOS Module 0, Addr: 0xFFFDF340, Size: 0x20CC0, Next Addr: 0x0 ## FIT BIOS Module 1, Addr: 0xFFFD8000, Size: 0x72C0, Next Addr: 0xFFFDF2C0 ## FIT BIOS Module 2, Addr: 0xFFDE0000, Size: 0x120000, Next Addr: 0xFFF00000 ## DEBUG - GetFillCount at FFFDF340 = 88 ## DEBUG - GetFillCount at FFFDF340 = 0 ## DEBUG (ParseFitIntoContext) FitCount: 8 and 5 spare ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 dd 01: 00000000ffd1e000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffde0000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000400 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000600 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) ## DEBUG - BPM Address: 0xfffd7a00, Max Size: 0x0600, KM Address: 0xfffd7600, Max Size: 0x0400 Generating BPM ## DEBUG (GenerateBpm) START ## Added FIT and ACM, now adding other regions to exclusion arrray: ## 0: FIT Type: 0xB -- Added to exclusion range ## 1: FIT Type: 0xC -- Added to exclusion range ## Adding uCode patch region @ FFD1E000 Size: 5000 ## Regions to be excluded from IBB Segments: Base: FFFDF2C0 Size 0x80 Base: FFFA0000 Size 0x17E80 Base: FFFD7600 Size 0x400 Base: FFFD7A00 Size 0x600 Base: FFD1E000 Size 0x5000 --Processing IBB set 0 Set Type: 0:ColdBoot IbbSegSource: FIT IBB segments from FIT --Checking IBB Segments for Overlap with excluded regions Checking Base:FFFDF340, Size: 0x20cc0 OK OK OK OK OK Checking Base:FFFD8000, Size: 0x72c0 OK OK OK OK OK Checking Base:FFDE0000, Size: 0x120000 OK OK OK OK OK ## Checking for 0-length segments: SegCount = 3 ## IBB Segments after removing any overlaps Base: FFFDF340, Size: 0x20CC0 Base: FFFD8000, Size: 0x72C0 Base: FFDE0000, Size: 0x120000 ## DEBUG (GenerateBpm) Size of IBB Set: 264, PostIBB Segments: 0, IBB Segments: 3 ## DEBUG Sorting Segments ## DEBUG (GenerateBpm) IBB Set processing done --Processing signature info Creating the BPM ## DEBUG (BuildBpm) START @@ malloc b4986890 Generating BPM Header ## DEBUG (BuildBpm) Buffer address = 0xB4986890, Size: 0x439 Generating IBB Elements ## DEBUG IBB Set address = 0xB49868A4 Number of IBB Sets: 1 --IBB Set: 0 **** WARNING **** DMA protect flag must be set -- Setting DMA Protect bit in IBB Flags Getting OBB, IBB & Post IBB hash digests ## DEBUG (BuildBpm) - PostIBB HashAlg 0x10 ## DEBUG (BuildBpm) - Calculate IBB Digest ## DEBUG - Selected IBB digest size 48, at 0xB49868EE ## DEBUG - calc IBB digest gpBufOrigBIOS: 0xBA4F0000; Hashbuffer: 0xB49868F0; HashAlg: 0xc; Set: 0 ## DEBUG (CreateIbbBiosHash) - 0xBA4F0000, 0xD00000, 0xB49868F0, 0xC, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xBAFD0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xBB1C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xBB1CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0010: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xBA4F0000, 0xD00000, 0xB4986924, 0x4, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x4 ## -- SHA1 is 1 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xBAFD0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xBB1C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xBB1CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 84 b2 29 22 0010: f4 46 52 61 00 00 00 00 00 00 00 00 00 00 00 00 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xBA4F0000, 0xD00000, 0xB498693C, 0xB, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xBAFD0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xBB1C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xBB1CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 93 d1 33 b0 26 26 3f 2f e9 de 21 3a b0 f6 60 87 0010: ab 78 c3 e9 dc e8 a8 50 14 23 ba e5 85 14 0b c1 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xBA4F0000, 0xD00000, 0xB4986960, 0x12, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xBAFD0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xBB1C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xBB1CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 0010: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (BuildBpm) - Obb HashAlg 0x10 ## DEBUG (GetObbBHash) - BIOS Addr: 0xBA4F0000, Size: 0xD00000, Set: 0x0 ## DEBUG (GetObbBHash) - Obb HashAlg 0x10 Signing the BPM Generated BPM Body to be signed -- 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0070: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb 0080: e6 6d 26 45 84 8a e7 7b fe 4a 19 e0 94 92 e1 6b 0090: 04 00 14 00 d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 00a0: 84 b2 29 22 f4 46 52 61 0b 00 20 00 93 d1 33 b0 00b0: 26 26 3f 2f e9 de 21 3a b0 f6 60 87 ab 78 c3 e9 00c0: dc e8 a8 50 14 23 ba e5 85 14 0b c1 12 00 20 00 00d0: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 00e0: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 de ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 ## DEBUG (PrepareRsaSignature) - 0 BpmGen2/keys/bpm_pubkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc b4986d40 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0xb4986d40 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at b4986d40 ## Base64 data starting address: b4986d5b ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc b4986fc0 ## Placing result in DER Buffer at address: b4986fc0 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: b4986d5b, B64Length: 0x23d pDecodeLocation: b4986fc0 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xb4986d40 @@ -- Free 0xb4986fc0 ## DEBUG (ReadKey) end Signing Internally ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: BpmGen2/keys/bpm_privkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc b4988c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xb4988c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at b4988c20 ## Base64 data starting address: b4988c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc b4987c10 ## Placing result in DER Buffer at address: b4987c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: b4988c3c, B64Length: 0x97e pDecodeLocation: b4987c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xb4988c20 @@ -- Free 0xb4987c10 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc b4988c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xb4988c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at b4988c20 ## Base64 data starting address: b4988c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc b4987c10 ## Placing result in DER Buffer at address: b4987c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: b4988c3c, B64Length: 0x97e pDecodeLocation: b4987c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0xb4988c20 @@ -- Free 0xb4987c10 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc b4987c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987180 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987180 size: 823 ##-- pData: 28823410 ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: 288233c4 @@ -- Free 0xb4987180 @@ -- Free 0xb49874c0 ##-- Created RSA PubKey Context @0xB4987C10 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc b4988440 ##-- Setting Modulus: 0000: 4d 3d b0 31 70 0f 65 13 ##-- Setting PrivateExp: 0000: 21 11 cb 85 26 95 d4 35 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987180 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987180 size: 823 ##-- pData: 28823410 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987510 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987510 size: 823 ##-- pData: 28823590 @@ -- Free 0xb4987180 @@ -- Free 0xb4987510 ##-- Created RSA PrivateKey Context @0xB4988440 size: 2511 @@ malloc b4988e20 Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc b498cf80 ## -- Randomize the seed ## -- seed: 679621428 ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: 28823334 @@ -- Free 0xb49874c0 @@ -- Free 0xb498cf80 Random Number (384 bits): ba a5 31 8b b7 56 20 a9 db cc ec 64 ee 1 1b aa 81 7a 22 49 c3 b2 23 79 80 62 65 bb 71 fd 37 a 52 cd d2 59 b 1f ae f7 4e ce 43 c1 96 41 ea 31 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0xb4987c10 @@ -- Free 0xb4988440 @@ -- Free 0xb4988e20 Generating the KeyAndSignature structure 0000: 5f 5f 50 4d 53 47 5f 5f 20 00 00 00 10 01 00 10 0010: 00 0c 01 00 01 00 4d 3d b0 31 70 0f 65 13 41 23 0020: ed 38 58 b5 51 f6 41 95 7d 7a 8c ea ee 21 15 51 0030: 36 8f ed 98 e5 4e 31 e1 82 db 86 8a 0d bd 72 9d 0040: d4 dd dd 5f 36 f9 0a 67 de a7 27 94 09 e1 fc 11 0050: 75 f8 58 92 ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 0060: 2f 4e d7 4d b9 27 e1 49 90 83 3d 10 0b f2 11 31 0070: 3a c3 60 39 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 0080: 48 bc 96 69 c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 0090: 26 80 ff b7 d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f 00a0: c4 ee 23 aa 6a 96 47 56 3d 0c 5f ec 54 59 31 25 00b0: 13 98 82 aa 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e 00c0: ac cc 8c d9 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 00d0: 38 cf 86 a6 c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 00e0: 4e b2 06 dc 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 00f0: be aa 9c b7 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa 0100: bb 11 e1 3d b0 48 70 db 1f 58 42 48 73 71 38 3b 0110: 92 4c 1b 6e 1f 28 74 09 ec 24 8d 19 6d 02 21 68 0120: 5e 77 74 eb 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e 0130: dc 1b 27 6f 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 0140: 52 03 c2 d1 b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 0150: 7a 9a fc 29 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 0160: 8d 95 e8 86 af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 0170: 1a 61 d2 5b 77 1a a4 66 33 4f 74 6f 90 92 a9 63 0180: 94 2e 66 1c dc 25 63 9f f2 7d fb fe bf c0 bc fe 0190: a8 5c 75 7c 8c 9b 16 00 10 00 0c 0c 00 74 b8 55 01a0: 38 0d 33 68 f2 d1 91 34 50 06 57 3b 74 c4 42 c3 01b0: b2 46 14 4d e6 59 65 e7 d7 e6 62 47 3f 56 04 e4 01c0: cd 59 ec 67 f0 c4 7b c5 1f 26 29 75 7b 00 a1 f8 01d0: f1 8d 93 61 bf 16 48 02 dc 71 cf e7 0e 13 da e7 01e0: 43 93 44 91 2e a2 07 71 9e 5f 9d 3b ea 9e d9 17 01f0: 1e 77 22 29 0c 2c a6 9c de ee 38 32 9e 39 b5 7e 0200: 8b 09 46 53 13 95 5b 3c cd 95 7c a2 48 93 e7 21 0210: 94 df 2b 92 b3 aa 4b 40 57 8f d6 84 8d 6e 15 a2 0220: 10 0d 33 ed 92 9c a5 c3 2b 55 3c 5d 40 d1 e5 dc 0230: b3 de 6a 4d dd 7e d5 6c 7b 44 20 89 fa 31 52 fa 0240: c8 7d d1 d2 5e ac 94 a7 38 58 50 f6 2f 85 8f dc 0250: 4d 65 05 b9 45 be c9 d2 97 45 79 48 76 d3 b0 57 0260: 99 05 c2 66 81 23 bf 5b 9f 4c 42 df ad b0 76 6c 0270: d6 69 e4 34 a6 74 41 fa 3f 69 50 78 13 2e 3f da 0280: 66 c3 97 66 6c 73 0d 15 7f bc 42 de 08 30 b4 8a 0290: 4b f6 0f 96 30 30 5b 6c 9a ba 7c ec 7b 1d 2b 3c 02a0: d0 6f 5d ad 4f 88 88 30 09 61 f8 35 4a 58 bf 8d 02b0: d1 97 65 21 7b 21 0d 95 5c 1c 61 37 68 42 e7 5d 02c0: ac 27 61 42 82 2a ea 66 6c 68 6e 07 17 a2 af d1 02d0: bf 49 fc a0 c6 27 14 4e b8 c9 5d e0 9b aa a1 b7 02e0: 90 8d 3a 7b 22 3e 1a 29 ba 89 c6 71 94 a0 fa 8d 02f0: 80 21 6a d0 36 02 90 42 bd bc 98 36 1d 0a 41 ff 0300: 50 45 9b 7c 13 0b 4b 83 54 22 c9 25 87 04 76 8b 0310: 04 7e 47 06 f1 f6 62 9c ce ff 89 df 78 ## DEBUG BuildBpm -- BPM created **** BPM Generated **** ## DEBUG (VerifyBpm) start Start Bpm Verification... Bpm Verification...TempBuf: b4986890 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: b49868a4 0 0 0 0 Bpm Verification2...TempBuf: b49868a4 b49868a4 0 0 0 0 Bpm Verification3...IbbElement: b49868a4 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFDE0000 [0xBAFD0000 = 0xFFDF0EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xBB1C8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xBB1CF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc b4987c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987510 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987510 size: 823 ##-- pData: b49869c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: b49869be @@ -- Free 0xb4987510 @@ -- Free 0xb49874c0 ##-- Created RSA PubKey Context @0xB4987C10 size: 2087 @@ malloc b4988440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0xb4987c10 @@ -- Free 0xb4988440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Saving BPM to file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin WriteOutputFile: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BPM Buf: b4986890, Size: 439 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0070: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb 0080: e6 6d 26 45 84 8a e7 7b fe 4a 19 e0 94 92 e1 6b 0090: 04 00 14 00 d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 00a0: 84 b2 29 22 f4 46 52 61 0b 00 20 00 93 d1 33 b0 00b0: 26 26 3f 2f e9 de 21 3a b0 f6 60 87 ab 78 c3 e9 00c0: dc e8 a8 50 14 23 ba e5 85 14 0b c1 12 00 20 00 00d0: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 00e0: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 de ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 10 01 00 10 00 0c 01 00 0130: 01 00 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 0140: 51 f6 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 0150: e5 4e 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 0160: 36 f9 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 0170: ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d 0180: b9 27 e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 0190: 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 01a0: c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 01b0: d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 01c0: 6a 96 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 01d0: 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 01e0: 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 01f0: c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 0200: 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 0210: 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d 0220: b0 48 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 0230: 1f 28 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 0240: 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 0250: 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 0260: b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 0270: 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 0280: af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 0290: 77 1a a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c 02a0: dc 25 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 02b0: 8c 9b 16 00 10 00 0c 0c 00 74 b8 55 38 0d 33 68 02c0: f2 d1 91 34 50 06 57 3b 74 c4 42 c3 b2 46 14 4d 02d0: e6 59 65 e7 d7 e6 62 47 3f 56 04 e4 cd 59 ec 67 02e0: f0 c4 7b c5 1f 26 29 75 7b 00 a1 f8 f1 8d 93 61 02f0: bf 16 48 02 dc 71 cf e7 0e 13 da e7 43 93 44 91 0300: 2e a2 07 71 9e 5f 9d 3b ea 9e d9 17 1e 77 22 29 0310: 0c 2c a6 9c de ee 38 32 9e 39 b5 7e 8b 09 46 53 0320: 13 95 5b 3c cd 95 7c a2 48 93 e7 21 94 df 2b 92 0330: b3 aa 4b 40 57 8f d6 84 8d 6e 15 a2 10 0d 33 ed 0340: 92 9c a5 c3 2b 55 3c 5d 40 d1 e5 dc b3 de 6a 4d 0350: dd 7e d5 6c 7b 44 20 89 fa 31 52 fa c8 7d d1 d2 0360: 5e ac 94 a7 38 58 50 f6 2f 85 8f dc 4d 65 05 b9 0370: 45 be c9 d2 97 45 79 48 76 d3 b0 57 99 05 c2 66 0380: 81 23 bf 5b 9f 4c 42 df ad b0 76 6c d6 69 e4 34 0390: a6 74 41 fa 3f 69 50 78 13 2e 3f da 66 c3 97 66 03a0: 6c 73 0d 15 7f bc 42 de 08 30 b4 8a 4b f6 0f 96 03b0: 30 30 5b 6c 9a ba 7c ec 7b 1d 2b 3c d0 6f 5d ad 03c0: 4f 88 88 30 09 61 f8 35 4a 58 bf 8d d1 97 65 21 03d0: 7b 21 0d 95 5c 1c 61 37 68 42 e7 5d ac 27 61 42 03e0: 82 2a ea 66 6c 68 6e 07 17 a2 af d1 bf 49 fc a0 03f0: c6 27 14 4e b8 c9 5d e0 9b aa a1 b7 90 8d 3a 7b 0400: 22 3e 1a 29 ba 89 c6 71 94 a0 fa 8d 80 21 6a d0 0410: 36 02 90 42 bd bc 98 36 1d 0a 41 ff 50 45 9b 7c 0420: 13 0b 4b 83 54 22 c9 25 87 04 76 8b 04 7e 47 06 0430: f1 f6 62 9c ce ff 89 df 78 ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BufAddress: b4986890, Size 0x439 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin (0x439 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end ## DEBUG (GenerateBpm) End of proceedure ###################### # BootPolicyManifest # ###################### BootPolicyManifestHeader: StructureID: __ACBP__ StructVersion: 0x21 HdrStructVer: 0x20 HdrSize: 0x0014 KeySigOffset: 0x0128 BpmRevision: 0x01 BpmRevocation: 0x01 AcmRevocation: 0x02 Reserved: 00 NEMPages: 0x0003 IbbElement: StructureID: __IBBS__ StructVersion: 0x20 Reserved: 00 Element Size: 0108 (264) Reserved: 00 SetType: 0x00 Reserved: 00 PBETValue: 0x0f Flags: 0x00000003 Enable VT-d: 1 InitMeasLoc3: 1 AuthorityMeas:0 TPM on Error: 0 Top Swap: 0 Force (MK)TME:0 SpiralEnforce:0 SRTM Attest: 0 Force CNB: 0 SVN_OVR: 0 IBB_MCHBAR: 0x00000000fec80000 VTD_BAR: 0x00000000fed91000 DmaProtBase0: 0x00000000 DmaProtLimit0: 0x00000000 DmaProtBase1: 0x0000000000000000 DmaProtLimit1: 0x0000000000000000 PostIbbHash: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: IbbEntry: 0xfffffff0 HashList (Number of Digests: 4, Total Size: 152) [0] HashAlg: 0x000c - 0x0C:SHA384 Size: 0x0030 HashBuffer: 2fd01dd108273256cb8f0c95f94ed6f622f8e502f39bc6e6860fcc196c916bbbe66d2645848ae77bfe4a19e09492e16b [1] HashAlg: 0x0004 - 0x04:SHA1 Size: 0x0014 HashBuffer: d8f8a9fc0bcd7c72b6892cc284b22922f4465261 [2] HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 93d133b026263f2fe9de213ab0f66087ab78c3e9dce8a8501423bae585140bc1 [3] HashAlg: 0x0012 - 0x12:SM3 Size: 0x0020 HashBuffer: cb345f862726fd9ae42462169ffdf10c28a415a9937096eda1930cd30674a610 OBB Digest: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: Reserved: 00 00 00 -- Debug (PrintpIbbElement -1- 0xB4986924, pIbbEntry 0xB49868E4, pDigest 0xB4986980, pFlashSegment 0xB4986988, Segment Count: 0x03 Seg# Base------ Size------ Flags- Reserved Measured Cache Type--- [ 0] 0xffde0000 0x00120000 0x0000 00, 00 Yes Write Protect [ 1] 0xfffd8000 0x000072c0 0x0000 00, 00 Yes Write Protect [ 2] 0xfffdf340 0x00020cc0 0x0000 00, 00 Yes Write Protect Boot Policy Manifest Signature Element: StructureID: __PMSG__ StructVersion: 0x20 Reserved: 0x00 00 00 Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 51 f6 0010: 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 e5 4e 0020: 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 36 f9 0030: 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 ce b9 0040: da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d b9 27 0050: e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 89 72 0060: 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 c0 79 0070: e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 d4 ca 0080: e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 6a 96 0090: 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 2b 41 00a0: 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 4b 29 00b0: c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 c5 28 00c0: 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 31 f2 00d0: e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 96 c4 00e0: eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d b0 48 00f0: 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 1f 28 0100: 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 7b 04 0110: 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 35 cb 0120: 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 b0 0e 0130: 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 5d 4a 0140: a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 af 5e 0150: 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 77 1a 0160: a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c dc 25 0170: 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 8c 9b SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000c 0x0C:SHA384 Signature: 0000: 74 b8 55 38 0d 33 68 f2 d1 91 34 50 06 57 3b 74 0010: c4 42 c3 b2 46 14 4d e6 59 65 e7 d7 e6 62 47 3f 0020: 56 04 e4 cd 59 ec 67 f0 c4 7b c5 1f 26 29 75 7b 0030: 00 a1 f8 f1 8d 93 61 bf 16 48 02 dc 71 cf e7 0e 0040: 13 da e7 43 93 44 91 2e a2 07 71 9e 5f 9d 3b ea 0050: 9e d9 17 1e 77 22 29 0c 2c a6 9c de ee 38 32 9e 0060: 39 b5 7e 8b 09 46 53 13 95 5b 3c cd 95 7c a2 48 0070: 93 e7 21 94 df 2b 92 b3 aa 4b 40 57 8f d6 84 8d 0080: 6e 15 a2 10 0d 33 ed 92 9c a5 c3 2b 55 3c 5d 40 0090: d1 e5 dc b3 de 6a 4d dd 7e d5 6c 7b 44 20 89 fa 00a0: 31 52 fa c8 7d d1 d2 5e ac 94 a7 38 58 50 f6 2f 00b0: 85 8f dc 4d 65 05 b9 45 be c9 d2 97 45 79 48 76 00c0: d3 b0 57 99 05 c2 66 81 23 bf 5b 9f 4c 42 df ad 00d0: b0 76 6c d6 69 e4 34 a6 74 41 fa 3f 69 50 78 13 00e0: 2e 3f da 66 c3 97 66 6c 73 0d 15 7f bc 42 de 08 00f0: 30 b4 8a 4b f6 0f 96 30 30 5b 6c 9a ba 7c ec 7b 0100: 1d 2b 3c d0 6f 5d ad 4f 88 88 30 09 61 f8 35 4a 0110: 58 bf 8d d1 97 65 21 7b 21 0d 95 5c 1c 61 37 68 0120: 42 e7 5d ac 27 61 42 82 2a ea 66 6c 68 6e 07 17 0130: a2 af d1 bf 49 fc a0 c6 27 14 4e b8 c9 5d e0 9b 0140: aa a1 b7 90 8d 3a 7b 22 3e 1a 29 ba 89 c6 71 94 0150: a0 fa 8d 80 21 6a d0 36 02 90 42 bd bc 98 36 1d 0160: 0a 41 ff 50 45 9b 7c 13 0b 4b 83 54 22 c9 25 87 0170: 04 76 8b 04 7e 47 06 f1 f6 62 9c ce ff 89 df 78 BPM Body Size: 0x128, Signature Element Size: 0x31D ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f # FYI: Public Key Hash Digest # Algorithm: 0x0B:SHA256 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateHash) size=32 0000: 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 0010: 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f # FYI: Public Key Hash Digest # Algorithm: 0x12:SM3 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d 0010: b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 0020: 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 # FYI: Public Key Hash Digest # Algorithm: 0x0C:SHA384 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc b4987c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987510 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987510 size: 823 ##-- pData: b49869c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: b49869be @@ -- Free 0xb4987510 @@ -- Free 0xb49874c0 ##-- Created RSA PubKey Context @0xB4987C10 size: 2087 @@ malloc b4988440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0xb4987c10 @@ -- Free 0xb4988440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process Debug (PrintBootPolicyManifest) - End of proceedure ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 50 49 3c ef 1f f7 34 c5 05 3d 55 10 36 be 22 ab 0010: bf 01 3d 16 3b b6 12 27 17 01 bf fb 27 9a fb 72 0020: 89 fd 86 71 f3 81 1d a3 5b 09 f8 5d 88 3a a3 48 0030: e2 5d 95 48 c7 89 a4 e3 6a 18 d0 15 a9 f3 94 da 0040: 8c 8c 24 dc 53 64 2b 7d a4 5e 26 b3 21 5f b8 58 0050: f9 67 29 47 d1 d9 cb 60 ae d3 d4 6b 64 13 c7 28 0060: ec 01 9e d7 87 5b c8 e5 7c 3e 80 2a c9 90 34 65 0070: da 5c 70 ba 33 60 04 9e 56 82 2f 9f 6b d3 5e 6e 0080: 0b 56 90 c9 4f 3c f8 2c cd 4c 69 7c f0 06 58 46 0090: b4 3e 3a 1c 25 b2 8f f4 9c 13 0c dc 77 5e 2b 45 00a0: 66 e7 ed e4 18 f6 94 36 8e 4f 0c 61 3f cb 94 89 00b0: ec 29 a3 d3 bd ba b9 56 5b f1 e0 1c 81 2a 0f fa 00c0: 5d 0d 96 23 42 c7 81 2c d4 c0 d4 a8 aa d1 00 9a 00d0: 07 1f f1 84 ee a0 41 02 27 a0 1b 01 c5 a5 39 c2 00e0: 5a c4 5e ba 0a 2f 18 13 a0 a3 c8 d2 18 df 3c 20 00f0: 1c 60 bc a2 2a 38 ab 9b 78 fe 06 2d 47 28 1b 07 0100: f1 49 81 0a c7 db 96 6e 2a fd d9 cf c3 cc 21 81 0110: a1 fc 3d 1a 00 0a 06 19 66 c8 99 40 8d 8e 0a 36 0120: c2 7b 4f 4a f6 62 3d f9 7a cc 23 0e 48 5c 7c d2 0130: da 33 8e c7 9e e4 96 58 84 d5 bf 1d a8 22 75 ec 0140: 81 d4 25 31 8b 6c 88 5d e6 6f 4b 7d 27 5f 05 a4 0150: a5 a1 46 61 e8 31 6b 3e fc 22 7e 40 50 5b 90 1b 0160: 06 ef a9 50 55 1f c2 d3 32 f9 de a4 75 d3 5b 36 0170: 6e 3e d7 cc ba 62 82 91 71 8d e5 66 aa 0c 95 5f Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Updating BIOS Image with new BPM(BPM Size=0x439) ## DEBUG (UpdateBIOS) Updating BIOS with new KM (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) Version 2.x RSA sigend KM Updating FIT KM size to 0x355 (853) 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 dd updating FIT Checksum 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 52 Final FIT table ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 52 01: 00000000ffd1e000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffde0000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000355 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000439 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Verifying BPM and KM ## DEBUG (VerifyBpm) start ## FitTableFlashAddr: fffdf2c0 Start Bpm Verification... Bpm Verification...TempBuf: bb1c7a00 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: bb1c7a14 0 0 0 0 Bpm Verification2...TempBuf: bb1c7a14 bb1c7a14 0 0 0 0 Bpm Verification3...IbbElement: bb1c7a14 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFDE0000 [0xBAFD0000 = 0xFFDF0EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xBB1C8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xBB1CF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc b4987c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987510 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987510 size: 823 ##-- pData: bb1c7b32 ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: bb1c7b2e @@ -- Free 0xb4987510 @@ -- Free 0xb49874c0 ##-- Created RSA PubKey Context @0xB4987C10 size: 2087 @@ malloc b4988440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0xb4987c10 @@ -- Free 0xb4988440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Start Key Manifest Verification... ## FitTableFlashAddr: fffdf2c0 ## DEBUG (VerifyKeyManifest) -Verify BP Keyhash ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f --PASS: BPM KeyHash Digest Verification ## DEBUG (VerifyKmSignature) - start KeyManifest Signature Verification... 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f KM addr: bb1c7600, KmSig Addr: bb1c7644 0000: 10 01 00 10 00 0c 01 00 01 00 75 2a f2 18 e9 5d 0010: 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb c6 00 08 1a 0020: fe b1 3b 34 c6 26 7d 77 06 6f a3 40 71 8e 3f 00 0030: 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 e9 c5 a0 44 0040: 23 29 6d 5a c5 a8 60 17 53 48 ea 79 6e b3 f4 18 0050: 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb e4 dc 49 1b 0060: fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 c0 3c 86 85 0070: 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 b7 f9 7b 79 0080: 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 ad 14 e1 e1 0090: d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 84 82 8c 05 00a0: 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 30 18 e8 08 00b0: aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 40 eb 57 39 00c0: f1 dd ea d9 94 d1 10 de cd 12 ab 18 7e 6d 67 f5 00d0: ae da db 0a dc 1b 40 b1 7e d9 dd ac ba 44 3b d3 00e0: 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0d 62 cd 7b 00f0: 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 c2 13 d0 5e 0100: cd 36 ae df 61 ee c6 65 84 4c 1a f9 b6 23 ca 54 0110: 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 61 b2 fb af 0120: c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 22 f9 d4 e6 0130: db 72 c0 28 d4 1d 99 20 cd cf 06 d6 fb 5e 80 c7 0140: e4 46 6c a6 ff dd ed cb 44 80 d4 23 e4 41 e7 d3 0150: 83 28 54 a4 5b bf 1c 90 02 44 b8 74 ba 83 49 d3 0160: 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 27 36 2c e1 0170: d4 03 30 37 da 43 b9 09 02 a1 96 28 ad 8f 74 48 0180: 52 05 39 3c 7f 61 db 26 bb d8 16 00 10 00 0c 0b 0190: 00 50 49 3c ef 1f f7 34 c5 05 3d 55 10 36 be 22 01a0: ab bf 01 3d 16 3b b6 12 27 17 01 bf fb 27 9a fb 01b0: 72 89 fd 86 71 f3 81 1d a3 5b 09 f8 5d 88 3a a3 01c0: 48 e2 5d 95 48 c7 89 a4 e3 6a 18 d0 15 a9 f3 94 01d0: da 8c 8c 24 dc 53 64 2b 7d a4 5e 26 b3 21 5f b8 01e0: 58 f9 67 29 47 d1 d9 cb 60 ae d3 d4 6b 64 13 c7 01f0: 28 ec 01 9e d7 87 5b c8 e5 7c 3e 80 2a c9 90 34 0200: 65 da 5c 70 ba 33 60 04 9e 56 82 2f 9f 6b d3 5e 0210: 6e ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc b4987c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc b4987510 ##-- BigNumInit ##-- Created BigNumber Context @0xB4987510 size: 823 ##-- pData: bb1c764e ## Creating BigNumber Context - NumBytes: 4 @@ malloc b49874c0 ##-- BigNumInit ##-- Created BigNumber Context @0xB49874C0 size: 71 ##-- pData: bb1c764a @@ -- Free 0xb4987510 @@ -- Free 0xb49874c0 ##-- Created RSA PubKey Context @0xB4987C10 size: 2087 @@ malloc b4988440 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0xb4987c10 @@ -- Free 0xb4988440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process ## DEBUG (VerifyKmSignature) - end of proceedure --Verify Key Manifest - PASS **** Writing BIOS Image to file (/home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin) **** ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin, BufAddress: ba4f0000, Size 0xd00000 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin (0xd00000 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end @@ -- Free (BootPolicyManifest) 0xb4986890 @@ -- Free (KeyManifest) 0xb49878a0 @@ -- Free (FileBufferRaw) 0xba4ef010 ###################################### # BPM / BIOS generated successfully! # ###################################### ## DEBUG (BpmGenMain) - end (Status: 0) writing RSA key Swap top swap block.... Swapping Top Swap Blocks.... Sign backup partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Start KM Gen function Adding Public Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem, Producing KM binary output file /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin KM Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem, KM Public Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem, Key Manifest ID: 1, KM Key Hash: 12, Signing Scheme: 22, KMSVN: 0, pKmOutFileName /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin || KeyCount 1 || SigSource 1 Generating KM - Get Public Keys (1) Usage: 1, Alg: 0xB ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc f3a6f8a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0xf3a6f8a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at f3a6f8a0 ## Base64 data starting address: f3a6f8bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc f3a6e890 ## Placing result in DER Buffer at address: f3a6e890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: f3a6f8bb, B64Length: 0x23d pDecodeLocation: f3a6e890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xf3a6f8a0 @@ -- Free 0xf3a6e890 ## DEBUG (ReadKey) end - Calcualting Public Keyhash -- an RSA key 384 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f - Creating KM signature ## DEBUG (KmGenMain) Addr KM: 8f956d00, pSignature: 8f956d44 - RSA signature ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem @@ malloc f3a6f8a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0xf3a6f8a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at f3a6f8a0 ## Base64 data starting address: f3a6f8bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc f3a6e890 ## Placing result in DER Buffer at address: f3a6e890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: f3a6f8bb, B64Length: 0x23d pDecodeLocation: f3a6e890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xf3a6f8a0 @@ -- Free 0xf3a6e890 ## DEBUG (ReadKey) end ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc f3a6ea50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xf3a6ea50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at f3a6ea50 ## Base64 data starting address: f3a6ea6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc f3a6fb20 ## Placing result in DER Buffer at address: f3a6fb20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: f3a6ea6c, B64Length: 0x97e pDecodeLocation: f3a6fb20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0xf3a6ea50 @@ -- Free 0xf3a6fb20 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc f3a6ea50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0xf3a6ea50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at f3a6ea50 ## Base64 data starting address: f3a6ea6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc f3a6fb20 ## Placing result in DER Buffer at address: f3a6fb20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: f3a6ea6c, B64Length: 0x97e pDecodeLocation: f3a6fb20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0xf3a6ea50 @@ -- Free 0xf3a6fb20 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc f3a6ea50 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc f3a6f280 ##-- BigNumInit ##-- Created BigNumber Context @0xF3A6F280 size: 823 ##-- pData: 8f9568b0 ## Creating BigNumber Context - NumBytes: 4 @@ malloc f3a6f5c0 ##-- BigNumInit ##-- Created BigNumber Context @0xF3A6F5C0 size: 71 ##-- pData: 8f956864 @@ -- Free 0xf3a6f280 @@ -- Free 0xf3a6f5c0 ##-- Created RSA PubKey Context @0xF3A6EA50 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc f3a6fb20 ##-- Setting Modulus: 0000: 75 2a f2 18 e9 5d 82 6f ##-- Setting PrivateExp: 0000: f1 25 cb 4a 0f 38 f3 09 ## Creating BigNumber Context - NumBytes: 384 @@ malloc f3a6f280 ##-- BigNumInit ##-- Created BigNumber Context @0xF3A6F280 size: 823 ##-- pData: 8f9568b0 ## Creating BigNumber Context - NumBytes: 384 @@ malloc f3a70500 ##-- BigNumInit ##-- Created BigNumber Context @0xF3A70500 size: 823 ##-- pData: 8f956a30 @@ -- Free 0xf3a6f280 @@ -- Free 0xf3a70500 ##-- Created RSA PrivateKey Context @0xF3A6FB20 size: 2511 @@ malloc f3a70840 Random Number (256 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc f3a6f610 ## -- Randomize the seed ## -- seed: -1886033964 ## Creating BigNumber Context - NumBytes: 4 @@ malloc f3a6f5c0 ##-- BigNumInit ##-- Created BigNumber Context @0xF3A6F5C0 size: 71 ##-- pData: 8f9567d4 @@ -- Free 0xf3a6f5c0 @@ -- Free 0xf3a6f610 Random Number (256 bits): cc c9 45 a3 90 fc 95 4b 59 e5 22 45 69 1b be 5a e9 40 57 64 63 89 39 75 23 cb 50 ba ce 70 e1 78 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0xf3a6ea50 @@ -- Free 0xf3a6fb20 @@ -- Free 0xf3a70840 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f 10 01 00 10 00 0c 01 00 01 00 75 2a 0050: f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb 0060: c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f a3 40 0070: 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 0080: e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 ea 79 0090: 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb 00a0: e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 00b0: c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 00c0: b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 00d0: ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 00e0: 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 00f0: 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 0100: 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 ab 18 0110: 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 dd ac 0120: ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0130: 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 0140: c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 1a f9 0150: b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 0160: 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 0170: 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 06 d6 0180: fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 d4 23 0190: e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 b8 74 01a0: ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 01b0: 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 96 28 01c0: ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 16 00 01d0: 10 00 0c 0b 00 94 9f 68 e4 c7 27 94 92 17 72 85 01e0: 62 51 43 95 e7 f3 2d ff ca 5d 51 92 bf 5a 1f 28 01f0: 66 a8 54 06 d0 d5 45 4a c7 cc d2 a9 71 88 8c 50 0200: ef b4 2a 61 c1 ab 00 11 52 f4 ba c0 a2 ab f6 a8 0210: d4 4d fd db 3e bd 86 ee 35 71 d3 3e f7 91 6b 44 0220: b2 8c 20 cc 06 17 83 9d be 1a 9c 7b 67 4f 37 fb 0230: e8 39 01 ac 4d c1 bc b9 bf a2 52 20 b1 ee 51 9d 0240: f2 74 b2 96 cc 9b d8 33 d9 c0 ee 49 89 40 c4 51 0250: a5 08 7d 40 8c 8a 02 5c 5a 1b 19 c9 63 4a 4a 10 0260: 0c 14 94 d5 c1 a8 50 a1 3c 86 5d 2c 2f 72 ce 5f 0270: c7 a0 ca eb 2c 6b ae c6 a0 87 1d aa 2f 07 87 f8 0280: bd 47 8a 01 33 3b eb e5 3c d6 b8 9a ac e7 3f 74 0290: 60 68 5e b7 50 9a e2 d3 7c a0 14 f1 ce 4b 50 24 02a0: 6c e1 82 e9 70 4a 15 8c 0d 9b 58 38 2a 2e 0b e9 02b0: 9d 55 83 9d f5 a3 0e 68 1f f2 b7 3d ea a6 98 21 02c0: fa a5 22 ea ae 0e e1 cf f7 63 b5 95 78 0d 68 ca 02d0: 96 b1 76 62 41 7d f4 a5 5d db 0e 24 08 fe cb 9d 02e0: de 24 aa 5d 7d 2a e9 75 b8 3b cf 51 a0 62 3e 9e 02f0: 94 14 9d fc 75 9a c4 b6 3c ed 2d 9c 69 20 f3 21 0300: 89 cd 05 38 78 21 b4 a2 9f 76 9e a6 98 3c be 0f 0310: 59 31 1b 16 0d 53 61 e9 d5 5e cd 14 34 14 e4 3b 0320: cc cf 77 2f 0d db 33 33 8d d8 48 0b 7e 01 9e 84 0330: e0 cb 26 63 52 3a b3 eb ea a2 f1 91 63 3c c8 a9 0340: 93 be b8 46 c3 4a e1 6a e8 66 67 63 87 50 6b a1 0350: b5 cc 71 5c 52 ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 94 9f 68 e4 c7 27 94 92 17 72 85 62 51 43 95 e7 0010: f3 2d ff ca 5d 51 92 bf 5a 1f 28 66 a8 54 06 d0 0020: d5 45 4a c7 cc d2 a9 71 88 8c 50 ef b4 2a 61 c1 0030: ab 00 11 52 f4 ba c0 a2 ab f6 a8 d4 4d fd db 3e 0040: bd 86 ee 35 71 d3 3e f7 91 6b 44 b2 8c 20 cc 06 0050: 17 83 9d be 1a 9c 7b 67 4f 37 fb e8 39 01 ac 4d 0060: c1 bc b9 bf a2 52 20 b1 ee 51 9d f2 74 b2 96 cc 0070: 9b d8 33 d9 c0 ee 49 89 40 c4 51 a5 08 7d 40 8c 0080: 8a 02 5c 5a 1b 19 c9 63 4a 4a 10 0c 14 94 d5 c1 0090: a8 50 a1 3c 86 5d 2c 2f 72 ce 5f c7 a0 ca eb 2c 00a0: 6b ae c6 a0 87 1d aa 2f 07 87 f8 bd 47 8a 01 33 00b0: 3b eb e5 3c d6 b8 9a ac e7 3f 74 60 68 5e b7 50 00c0: 9a e2 d3 7c a0 14 f1 ce 4b 50 24 6c e1 82 e9 70 00d0: 4a 15 8c 0d 9b 58 38 2a 2e 0b e9 9d 55 83 9d f5 00e0: a3 0e 68 1f f2 b7 3d ea a6 98 21 fa a5 22 ea ae 00f0: 0e e1 cf f7 63 b5 95 78 0d 68 ca 96 b1 76 62 41 0100: 7d f4 a5 5d db 0e 24 08 fe cb 9d de 24 aa 5d 7d 0110: 2a e9 75 b8 3b cf 51 a0 62 3e 9e 94 14 9d fc 75 0120: 9a c4 b6 3c ed 2d 9c 69 20 f3 21 89 cd 05 38 78 0130: 21 b4 a2 9f 76 9e a6 98 3c be 0f 59 31 1b 16 0d 0140: 53 61 e9 d5 5e cd 14 34 14 e4 3b cc cf 77 2f 0d 0150: db 33 33 8d d8 48 0b 7e 01 9e 84 e0 cb 26 63 52 0160: 3a b3 eb ea a2 f1 91 63 3c c8 a9 93 be b8 46 c3 0170: 4a e1 6a e8 66 67 63 87 50 6b a1 b5 cc 71 5c 52 Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Writing KM to file (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin, BufAddress: 8f956d00, Size 0x355 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin (0x355 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end Generating Btg Boot Policy Manifest (BPM).bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 GEN /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params -BPM /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin -U /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -d:2 Start BPM Gen function --Will Produce BPM binary output file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin --Will generate modified BIOS file /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin with updated BPM and with KM from /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin --Verbose level 2 ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin @@ malloc (FileBufferRaw) f1eef010 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin Opened BIOS File 13312 KBytes (0xD00000) ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin @@ malloc 7b0278a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin Parsing input parameter file Processing BPM parameter file /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params --readBuffer: FileVersion pValue: 1 Header valid -- Parsing rest of the file 0: ToolVersion '7' 0: ToolDate '20000101' 0: FileDate '20240618' 0: # BPM_DEF '# BPM_DEF' Processing BPM Header section 1: PlatformRules 'EHL Embedded' 1: BpmStrutVersion '0x20' 1: BpmRevision '0x01' 1: BpmRevocation '1' 1: AcmRevocation '2' 1: NEMPages '3' 1: IbbSetCount '1' 1: CurrentIbbSet '0' 1: # IBB_SET '# IBB_SET' Processing IBB Elements section 2: IbbSetType '0:ColdBoot' 2: IbbSetInclude 'TRUE' 2: PBETValue '0xF' 2: MCHBAR '0x00000000FEC80000' 2: VTD_BAR '0x00000000FED91000' 2: DmaProtBase0 '0x0' 2: DmaProtLimit0 '0x0' 2: DmaProtBase1 '0x0' 2: DmaProtLimit1 '0x0' 2: IbbFlags '0x2' 2: DmaProtAutoCalc 'FALSE' 2: IbbHashAlgID '0x0C:SHA384' 2: IbbEntry '0xFFFFFFF0' 2: PostIbbHashAlgID '0x10' 2: PostIBBHashSource 'Calculate' 2: PostIbbHashFile '' 2: IbbSegSource 'FIT' 2: IbbSegFile '' 2: IbbGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 2: ObbHashAlgID '0x10' 2: ObbFullFvHash 'FALSE' 2: ObbHashSource 'File' 2: ObbHashFile '' 2: # TXT_ELEMENT '# TXT_ELEMENT' Processing TXT Element section 3: TxtInclude 'FALSE' 3: MinSvn '0x0' 3: TxtFlags '0x0' 3: StrideSize '0x0' 3: AcpiBase '0x400' 3: PwrmBase '0xFE000000' 3: PdUseDefault 'TRUE' 3: PdMinutes '5' 3: PdSeconds '0' 3: PttCmosOffset0 '0x7E' 3: PttCmosOffset1 '0x7F' 3: TxtSegSource 'IBB' 3: TxtSegGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 3: TxtSegHashAlgID '0x10' 3: # PLATFORM_CONFIG_ELEMENT '# PLATFORM_CONFIG_ELEMENT' Processing Platform Config Data Element section 4: PcdInclude 'FALSE' 4: PdReqLocation 'TPM' 4: CmosIndexRegister '0x70' 4: CmosDataRegister '0x71' 4: CmosIndexOffset '125' 4: CmosBitFieldWidth '3' 4: CmosBitFieldPosition '0' 4: # TPM1.2_LOCATION '# TPM1.2_LOCATION' 4: TpmIndexHandle '0x50000004' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # TPM2.0_LOCATION '# TPM2.0_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # PTT_LOCATION '# PTT_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # COMMUNICATION_NEM_BUFFER '# COMMUNICATION_NEM_BUFFER' 4: CnbsInclude 'False' 4: CnbsBase '0xFF000000' 4: CnbsSize '0x1000' 4: # PLATFORM_MANUFACTURERS_ELEMENT '# PLATFORM_MANUFACTURERS_ELEMENT' Processing Platfrom Manufacturer's Element section 5: PmdeInclude 'FALSE' 5: PmdeFile '' 5: # PLATFORM_FIRMWARE_RESILIENCY_ELEMENT '# PLATFORM_FIRMWARE_RESILIENCY_ELEMENT' Processing Platform Firmware Resiliency Element Section 7: PfrsInclude 'FALSE' 7: PfrsControlFlags '0x00000000' 7: PfrsCpldSmbusAddr '0x0' 7: PfrsPchActiveOffset '0x0' 7: PfrsPchRecoveryOffset '0x0' 7: PfrsPchStagingOffset '0x0' 7: PfrsBmcActiveOffset '0x0' 7: PfrsBmcRecoveryOffset '0x0' 7: PfrsBmcStagingOffset '0x0' 7: # BPM_SIGNATURE '# BPM_SIGNATURE' Processing Signature Element section 6: BpmSigSource 'Internal' 6: BpmSigHashAlgID '0x0C:SHA384' 6: BpmSigKeyType '0x01' 6: BpmSigScheme '0x16:RSAPSS' 6: BpmKeySizeBits '3072' 6: BpmSigPubKey 'BpmGen2/keys/bpm_pubkey_3072.pem' 6: BpmSigPrivKey 'BpmGen2/keys/bpm_privkey_3072.pem' 6: BpmSigBatch '' 6: BpmSigData '' 6: BpmSigDataType 'BPM Body' 6: BpmSigXSig '' 6: #EOF '#EOF' Parsing FIT Table f1ef0000 d00000 ## DEBUG (ParseFitIntoContext) start ## FitTableFlashAddr: fffdf2c0 ## Actual FIT Addr: f2bcf2c0 ## DEBUG ACM Size: 17e80 (97920) ## FIT BIOS Module 0, Addr: 0xFFFDF340, Size: 0x20CC0, Next Addr: 0x0 ## FIT BIOS Module 1, Addr: 0xFFFD8000, Size: 0x72C0, Next Addr: 0xFFFDF2C0 ## FIT BIOS Module 2, Addr: 0xFFA80000, Size: 0x120000, Next Addr: 0xFFBA0000 ## DEBUG - GetFillCount at FFFDF340 = 88 ## DEBUG - GetFillCount at FFFDF340 = 0 ## DEBUG (ParseFitIntoContext) FitCount: 8 and 5 spare ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 49 01: 00000000ff9be000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffa80000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000400 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000600 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) ## DEBUG - BPM Address: 0xfffd7a00, Max Size: 0x0600, KM Address: 0xfffd7600, Max Size: 0x0400 Generating BPM ## DEBUG (GenerateBpm) START ## Added FIT and ACM, now adding other regions to exclusion arrray: ## 0: FIT Type: 0xB -- Added to exclusion range ## 1: FIT Type: 0xC -- Added to exclusion range ## Adding uCode patch region @ FF9BE000 Size: 5000 ## Regions to be excluded from IBB Segments: Base: FFFDF2C0 Size 0x80 Base: FFFA0000 Size 0x17E80 Base: FFFD7600 Size 0x400 Base: FFFD7A00 Size 0x600 Base: FF9BE000 Size 0x5000 --Processing IBB set 0 Set Type: 0:ColdBoot IbbSegSource: FIT IBB segments from FIT --Checking IBB Segments for Overlap with excluded regions Checking Base:FFFDF340, Size: 0x20cc0 OK OK OK OK OK Checking Base:FFFD8000, Size: 0x72c0 OK OK OK OK OK Checking Base:FFA80000, Size: 0x120000 OK OK OK OK OK ## Checking for 0-length segments: SegCount = 3 ## IBB Segments after removing any overlaps Base: FFFDF340, Size: 0x20CC0 Base: FFFD8000, Size: 0x72C0 Base: FFA80000, Size: 0x120000 ## DEBUG (GenerateBpm) Size of IBB Set: 264, PostIBB Segments: 0, IBB Segments: 3 ## DEBUG Sorting Segments ## DEBUG (GenerateBpm) IBB Set processing done --Processing signature info Creating the BPM ## DEBUG (BuildBpm) START @@ malloc 7b026890 Generating BPM Header ## DEBUG (BuildBpm) Buffer address = 0x7B026890, Size: 0x439 Generating IBB Elements ## DEBUG IBB Set address = 0x7B0268A4 Number of IBB Sets: 1 --IBB Set: 0 **** WARNING **** DMA protect flag must be set -- Setting DMA Protect bit in IBB Flags Getting OBB, IBB & Post IBB hash digests ## DEBUG (BuildBpm) - PostIBB HashAlg 0x10 ## DEBUG (BuildBpm) - Calculate IBB Digest ## DEBUG - Selected IBB digest size 48, at 0x7B0268EE ## DEBUG - calc IBB digest gpBufOrigBIOS: 0xF1EF0000; Hashbuffer: 0x7B0268F0; HashAlg: 0xc; Set: 0 ## DEBUG (CreateIbbBiosHash) - 0xF1EF0000, 0xD00000, 0x7B0268F0, 0xC, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xF2670000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xF2BC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xF2BCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0010: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xF1EF0000, 0xD00000, 0x7B026924, 0x4, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x4 ## -- SHA1 is 1 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xF2670000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xF2BC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xF2BCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 61 1e 9a b3 0010: 19 df 07 61 00 00 00 00 00 00 00 00 00 00 00 00 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xF1EF0000, 0xD00000, 0x7B02693C, 0xB, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xF2670000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xF2BC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xF2BCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 37 6b a9 e8 e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 0010: c5 88 23 a8 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xF1EF0000, 0xD00000, 0x7B026960, 0x12, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xF2670000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xF2BC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xF2BCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 0010: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (BuildBpm) - Obb HashAlg 0x10 ## DEBUG (GetObbBHash) - BIOS Addr: 0xF1EF0000, Size: 0xD00000, Set: 0x0 ## DEBUG (GetObbBHash) - Obb HashAlg 0x10 Signing the BPM Generated BPM Body to be signed -- 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0070: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 0080: 4f 52 5c 4b 76 ac 26 ae 44 96 54 c8 a3 c8 02 0b 0090: 04 00 14 00 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 00a0: 61 1e 9a b3 19 df 07 61 0b 00 20 00 37 6b a9 e8 00b0: e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 c5 88 23 a8 00c0: 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 12 00 20 00 00d0: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 00e0: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 a8 ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 ## DEBUG (PrepareRsaSignature) - 0 BpmGen2/keys/bpm_pubkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc 7b026d40 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x7b026d40 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 7b026d40 ## Base64 data starting address: 7b026d5b ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 7b026fc0 ## Placing result in DER Buffer at address: 7b026fc0 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 7b026d5b, B64Length: 0x23d pDecodeLocation: 7b026fc0 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x7b026d40 @@ -- Free 0x7b026fc0 ## DEBUG (ReadKey) end Signing Internally ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: BpmGen2/keys/bpm_privkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 7b028c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7b028c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7b028c20 ## Base64 data starting address: 7b028c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 7b027c10 ## Placing result in DER Buffer at address: 7b027c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7b028c3c, B64Length: 0x97e pDecodeLocation: 7b027c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x7b028c20 @@ -- Free 0x7b027c10 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 7b028c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7b028c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7b028c20 ## Base64 data starting address: 7b028c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 7b027c10 ## Placing result in DER Buffer at address: 7b027c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7b028c3c, B64Length: 0x97e pDecodeLocation: 7b027c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x7b028c20 @@ -- Free 0x7b027c10 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7b027c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027180 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027180 size: 823 ##-- pData: b3f79940 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: b3f798f4 @@ -- Free 0x7b027180 @@ -- Free 0x7b0274c0 ##-- Created RSA PubKey Context @0x7B027C10 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 7b028440 ##-- Setting Modulus: 0000: 4d 3d b0 31 70 0f 65 13 ##-- Setting PrivateExp: 0000: 21 11 cb 85 26 95 d4 35 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027180 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027180 size: 823 ##-- pData: b3f79940 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027510 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027510 size: 823 ##-- pData: b3f79ac0 @@ -- Free 0x7b027180 @@ -- Free 0x7b027510 ##-- Created RSA PrivateKey Context @0x7B028440 size: 2511 @@ malloc 7b028e20 Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 7b02cf80 ## -- Randomize the seed ## -- seed: -1275619228 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: b3f79864 @@ -- Free 0x7b0274c0 @@ -- Free 0x7b02cf80 Random Number (384 bits): 4 49 38 4e 2f 9c e 95 ef 7e f6 53 39 8f 31 df 28 19 4 8 e3 2c 1 c1 f9 29 32 ec 13 c3 78 c1 e6 60 4d f3 5b db 77 d1 db 71 24 98 cd c4 1b 6e ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x7b027c10 @@ -- Free 0x7b028440 @@ -- Free 0x7b028e20 Generating the KeyAndSignature structure 0000: 5f 5f 50 4d 53 47 5f 5f 20 00 00 00 10 01 00 10 0010: 00 0c 01 00 01 00 4d 3d b0 31 70 0f 65 13 41 23 0020: ed 38 58 b5 51 f6 41 95 7d 7a 8c ea ee 21 15 51 0030: 36 8f ed 98 e5 4e 31 e1 82 db 86 8a 0d bd 72 9d 0040: d4 dd dd 5f 36 f9 0a 67 de a7 27 94 09 e1 fc 11 0050: 75 f8 58 92 ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 0060: 2f 4e d7 4d b9 27 e1 49 90 83 3d 10 0b f2 11 31 0070: 3a c3 60 39 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 0080: 48 bc 96 69 c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 0090: 26 80 ff b7 d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f 00a0: c4 ee 23 aa 6a 96 47 56 3d 0c 5f ec 54 59 31 25 00b0: 13 98 82 aa 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e 00c0: ac cc 8c d9 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 00d0: 38 cf 86 a6 c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 00e0: 4e b2 06 dc 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 00f0: be aa 9c b7 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa 0100: bb 11 e1 3d b0 48 70 db 1f 58 42 48 73 71 38 3b 0110: 92 4c 1b 6e 1f 28 74 09 ec 24 8d 19 6d 02 21 68 0120: 5e 77 74 eb 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e 0130: dc 1b 27 6f 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 0140: 52 03 c2 d1 b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 0150: 7a 9a fc 29 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 0160: 8d 95 e8 86 af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 0170: 1a 61 d2 5b 77 1a a4 66 33 4f 74 6f 90 92 a9 63 0180: 94 2e 66 1c dc 25 63 9f f2 7d fb fe bf c0 bc fe 0190: a8 5c 75 7c 8c 9b 16 00 10 00 0c 0c 00 36 dd a9 01a0: 4e 85 3f eb 94 5f 4e 09 a2 54 70 ca eb 60 6f d7 01b0: bf 29 a2 e4 41 87 78 72 83 5a 4d 37 5b 00 b1 73 01c0: 5e 41 99 e7 1e 5e 6f 80 b1 ef fe b2 7a 5c bf 5b 01d0: c0 96 16 83 25 3f 0f bc 9b 7d 81 a2 c6 00 8e 77 01e0: 0a 6a 63 e3 15 7a 78 6a be 5d eb cf 75 ea e7 ef 01f0: 60 01 73 6b cf 8f d6 8b a0 ea 09 03 b8 8e 9f 8d 0200: b9 fa f8 60 4d 7b 79 20 c8 55 81 75 e0 dd c5 60 0210: 7f 77 83 7e db 68 46 48 63 f6 10 4c 8e 30 1b bb 0220: 8a 5b 6f 86 61 b6 28 87 b5 44 9f 29 e6 76 bc b2 0230: a1 84 04 d9 2c a0 0e 7a dd 63 a3 51 39 db ba 6a 0240: 73 cb 25 10 71 4b 90 86 18 c4 57 9f 05 de 06 85 0250: b7 eb fa 2b fd 3f 17 42 8a c8 b6 4d a5 8f 9c 72 0260: 02 25 fe 08 87 ec e5 97 aa a7 4c 0d 53 b1 56 01 0270: 86 bd bf aa e5 0e ff f8 7a ae ee d4 42 71 e3 4f 0280: 78 e1 d5 2e 44 d0 20 0d 0b 1c c0 39 2b 58 27 f1 0290: f3 b1 ea 11 82 fc 5b b1 46 d2 66 c4 01 aa cb bc 02a0: 4c ed 40 2c 15 d2 29 d8 de 90 95 83 db 23 b6 fa 02b0: 12 43 fe 07 df dc 0d 78 12 10 ac 84 87 61 53 4f 02c0: 47 e5 9f 71 f5 3a d7 2a 87 df 46 3b 1a 15 71 a3 02d0: af 72 87 7b 12 1c 1b 92 9d 34 f4 31 58 24 99 35 02e0: a4 cf 29 a4 6d ee 1f 5f 76 ee 23 96 13 4f 0a a4 02f0: d0 8c 21 b5 53 b9 44 4c df 2f 9a 33 8f 30 93 e3 0300: 1c 26 64 cf 7c 02 c6 0a 2e 08 19 6d 5e 4f 21 cf 0310: ac c9 d2 3d ec af 05 d7 ba 90 d6 ba ad ## DEBUG BuildBpm -- BPM created **** BPM Generated **** ## DEBUG (VerifyBpm) start Start Bpm Verification... Bpm Verification...TempBuf: 7b026890 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: 7b0268a4 0 0 0 0 Bpm Verification2...TempBuf: 7b0268a4 7b0268a4 0 0 0 0 Bpm Verification3...IbbElement: 7b0268a4 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFA80000 [0xF2670000 = 0xFFA90EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xF2BC8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xF2BCF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7b027c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027510 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027510 size: 823 ##-- pData: 7b0269c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: 7b0269be @@ -- Free 0x7b027510 @@ -- Free 0x7b0274c0 ##-- Created RSA PubKey Context @0x7B027C10 size: 2087 @@ malloc 7b028440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x7b027c10 @@ -- Free 0x7b028440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Saving BPM to file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin WriteOutputFile: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BPM Buf: 7b026890, Size: 439 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0070: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 0080: 4f 52 5c 4b 76 ac 26 ae 44 96 54 c8 a3 c8 02 0b 0090: 04 00 14 00 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 00a0: 61 1e 9a b3 19 df 07 61 0b 00 20 00 37 6b a9 e8 00b0: e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 c5 88 23 a8 00c0: 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 12 00 20 00 00d0: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 00e0: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 a8 ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 10 01 00 10 00 0c 01 00 0130: 01 00 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 0140: 51 f6 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 0150: e5 4e 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 0160: 36 f9 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 0170: ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d 0180: b9 27 e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 0190: 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 01a0: c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 01b0: d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 01c0: 6a 96 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 01d0: 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 01e0: 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 01f0: c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 0200: 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 0210: 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d 0220: b0 48 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 0230: 1f 28 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 0240: 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 0250: 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 0260: b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 0270: 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 0280: af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 0290: 77 1a a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c 02a0: dc 25 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 02b0: 8c 9b 16 00 10 00 0c 0c 00 36 dd a9 4e 85 3f eb 02c0: 94 5f 4e 09 a2 54 70 ca eb 60 6f d7 bf 29 a2 e4 02d0: 41 87 78 72 83 5a 4d 37 5b 00 b1 73 5e 41 99 e7 02e0: 1e 5e 6f 80 b1 ef fe b2 7a 5c bf 5b c0 96 16 83 02f0: 25 3f 0f bc 9b 7d 81 a2 c6 00 8e 77 0a 6a 63 e3 0300: 15 7a 78 6a be 5d eb cf 75 ea e7 ef 60 01 73 6b 0310: cf 8f d6 8b a0 ea 09 03 b8 8e 9f 8d b9 fa f8 60 0320: 4d 7b 79 20 c8 55 81 75 e0 dd c5 60 7f 77 83 7e 0330: db 68 46 48 63 f6 10 4c 8e 30 1b bb 8a 5b 6f 86 0340: 61 b6 28 87 b5 44 9f 29 e6 76 bc b2 a1 84 04 d9 0350: 2c a0 0e 7a dd 63 a3 51 39 db ba 6a 73 cb 25 10 0360: 71 4b 90 86 18 c4 57 9f 05 de 06 85 b7 eb fa 2b 0370: fd 3f 17 42 8a c8 b6 4d a5 8f 9c 72 02 25 fe 08 0380: 87 ec e5 97 aa a7 4c 0d 53 b1 56 01 86 bd bf aa 0390: e5 0e ff f8 7a ae ee d4 42 71 e3 4f 78 e1 d5 2e 03a0: 44 d0 20 0d 0b 1c c0 39 2b 58 27 f1 f3 b1 ea 11 03b0: 82 fc 5b b1 46 d2 66 c4 01 aa cb bc 4c ed 40 2c 03c0: 15 d2 29 d8 de 90 95 83 db 23 b6 fa 12 43 fe 07 03d0: df dc 0d 78 12 10 ac 84 87 61 53 4f 47 e5 9f 71 03e0: f5 3a d7 2a 87 df 46 3b 1a 15 71 a3 af 72 87 7b 03f0: 12 1c 1b 92 9d 34 f4 31 58 24 99 35 a4 cf 29 a4 0400: 6d ee 1f 5f 76 ee 23 96 13 4f 0a a4 d0 8c 21 b5 0410: 53 b9 44 4c df 2f 9a 33 8f 30 93 e3 1c 26 64 cf 0420: 7c 02 c6 0a 2e 08 19 6d 5e 4f 21 cf ac c9 d2 3d 0430: ec af 05 d7 ba 90 d6 ba ad ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BufAddress: 7b026890, Size 0x439 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin (0x439 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end ## DEBUG (GenerateBpm) End of proceedure ###################### # BootPolicyManifest # ###################### BootPolicyManifestHeader: StructureID: __ACBP__ StructVersion: 0x21 HdrStructVer: 0x20 HdrSize: 0x0014 KeySigOffset: 0x0128 BpmRevision: 0x01 BpmRevocation: 0x01 AcmRevocation: 0x02 Reserved: 00 NEMPages: 0x0003 IbbElement: StructureID: __IBBS__ StructVersion: 0x20 Reserved: 00 Element Size: 0108 (264) Reserved: 00 SetType: 0x00 Reserved: 00 PBETValue: 0x0f Flags: 0x00000003 Enable VT-d: 1 InitMeasLoc3: 1 AuthorityMeas:0 TPM on Error: 0 Top Swap: 0 Force (MK)TME:0 SpiralEnforce:0 SRTM Attest: 0 Force CNB: 0 SVN_OVR: 0 IBB_MCHBAR: 0x00000000fec80000 VTD_BAR: 0x00000000fed91000 DmaProtBase0: 0x00000000 DmaProtLimit0: 0x00000000 DmaProtBase1: 0x0000000000000000 DmaProtLimit1: 0x0000000000000000 PostIbbHash: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: IbbEntry: 0xfffffff0 HashList (Number of Digests: 4, Total Size: 152) [0] HashAlg: 0x000c - 0x0C:SHA384 Size: 0x0030 HashBuffer: e38765f00865a224ea35e4d0bfbd0470f964ed0d1e755af013ec672217164ca04f525c4b76ac26ae449654c8a3c8020b [1] HashAlg: 0x0004 - 0x04:SHA1 Size: 0x0014 HashBuffer: 731b7d1b9f2d45b2fab6e84f611e9ab319df0761 [2] HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 376ba9e8e94bf50bc7d47b4499214cf4c58823a8739b0e65f5f6c576d85bbe20 [3] HashAlg: 0x0012 - 0x12:SM3 Size: 0x0020 HashBuffer: 91d591bbe1fc3d1d5694ea33ac3b7e9655c100ca0d5e620f27f53e4da4542251 OBB Digest: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: Reserved: 00 00 00 -- Debug (PrintpIbbElement -1- 0x7B026924, pIbbEntry 0x7B0268E4, pDigest 0x7B026980, pFlashSegment 0x7B026988, Segment Count: 0x03 Seg# Base------ Size------ Flags- Reserved Measured Cache Type--- [ 0] 0xffa80000 0x00120000 0x0000 00, 00 Yes Write Protect [ 1] 0xfffd8000 0x000072c0 0x0000 00, 00 Yes Write Protect [ 2] 0xfffdf340 0x00020cc0 0x0000 00, 00 Yes Write Protect Boot Policy Manifest Signature Element: StructureID: __PMSG__ StructVersion: 0x20 Reserved: 0x00 00 00 Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 51 f6 0010: 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 e5 4e 0020: 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 36 f9 0030: 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 ce b9 0040: da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d b9 27 0050: e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 89 72 0060: 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 c0 79 0070: e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 d4 ca 0080: e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 6a 96 0090: 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 2b 41 00a0: 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 4b 29 00b0: c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 c5 28 00c0: 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 31 f2 00d0: e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 96 c4 00e0: eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d b0 48 00f0: 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 1f 28 0100: 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 7b 04 0110: 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 35 cb 0120: 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 b0 0e 0130: 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 5d 4a 0140: a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 af 5e 0150: 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 77 1a 0160: a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c dc 25 0170: 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 8c 9b SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000c 0x0C:SHA384 Signature: 0000: 36 dd a9 4e 85 3f eb 94 5f 4e 09 a2 54 70 ca eb 0010: 60 6f d7 bf 29 a2 e4 41 87 78 72 83 5a 4d 37 5b 0020: 00 b1 73 5e 41 99 e7 1e 5e 6f 80 b1 ef fe b2 7a 0030: 5c bf 5b c0 96 16 83 25 3f 0f bc 9b 7d 81 a2 c6 0040: 00 8e 77 0a 6a 63 e3 15 7a 78 6a be 5d eb cf 75 0050: ea e7 ef 60 01 73 6b cf 8f d6 8b a0 ea 09 03 b8 0060: 8e 9f 8d b9 fa f8 60 4d 7b 79 20 c8 55 81 75 e0 0070: dd c5 60 7f 77 83 7e db 68 46 48 63 f6 10 4c 8e 0080: 30 1b bb 8a 5b 6f 86 61 b6 28 87 b5 44 9f 29 e6 0090: 76 bc b2 a1 84 04 d9 2c a0 0e 7a dd 63 a3 51 39 00a0: db ba 6a 73 cb 25 10 71 4b 90 86 18 c4 57 9f 05 00b0: de 06 85 b7 eb fa 2b fd 3f 17 42 8a c8 b6 4d a5 00c0: 8f 9c 72 02 25 fe 08 87 ec e5 97 aa a7 4c 0d 53 00d0: b1 56 01 86 bd bf aa e5 0e ff f8 7a ae ee d4 42 00e0: 71 e3 4f 78 e1 d5 2e 44 d0 20 0d 0b 1c c0 39 2b 00f0: 58 27 f1 f3 b1 ea 11 82 fc 5b b1 46 d2 66 c4 01 0100: aa cb bc 4c ed 40 2c 15 d2 29 d8 de 90 95 83 db 0110: 23 b6 fa 12 43 fe 07 df dc 0d 78 12 10 ac 84 87 0120: 61 53 4f 47 e5 9f 71 f5 3a d7 2a 87 df 46 3b 1a 0130: 15 71 a3 af 72 87 7b 12 1c 1b 92 9d 34 f4 31 58 0140: 24 99 35 a4 cf 29 a4 6d ee 1f 5f 76 ee 23 96 13 0150: 4f 0a a4 d0 8c 21 b5 53 b9 44 4c df 2f 9a 33 8f 0160: 30 93 e3 1c 26 64 cf 7c 02 c6 0a 2e 08 19 6d 5e 0170: 4f 21 cf ac c9 d2 3d ec af 05 d7 ba 90 d6 ba ad BPM Body Size: 0x128, Signature Element Size: 0x31D ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f # FYI: Public Key Hash Digest # Algorithm: 0x0B:SHA256 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateHash) size=32 0000: 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 0010: 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f # FYI: Public Key Hash Digest # Algorithm: 0x12:SM3 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d 0010: b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 0020: 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 # FYI: Public Key Hash Digest # Algorithm: 0x0C:SHA384 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7b027c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027510 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027510 size: 823 ##-- pData: 7b0269c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: 7b0269be @@ -- Free 0x7b027510 @@ -- Free 0x7b0274c0 ##-- Created RSA PubKey Context @0x7B027C10 size: 2087 @@ malloc 7b028440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x7b027c10 @@ -- Free 0x7b028440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process Debug (PrintBootPolicyManifest) - End of proceedure ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 94 9f 68 e4 c7 27 94 92 17 72 85 62 51 43 95 e7 0010: f3 2d ff ca 5d 51 92 bf 5a 1f 28 66 a8 54 06 d0 0020: d5 45 4a c7 cc d2 a9 71 88 8c 50 ef b4 2a 61 c1 0030: ab 00 11 52 f4 ba c0 a2 ab f6 a8 d4 4d fd db 3e 0040: bd 86 ee 35 71 d3 3e f7 91 6b 44 b2 8c 20 cc 06 0050: 17 83 9d be 1a 9c 7b 67 4f 37 fb e8 39 01 ac 4d 0060: c1 bc b9 bf a2 52 20 b1 ee 51 9d f2 74 b2 96 cc 0070: 9b d8 33 d9 c0 ee 49 89 40 c4 51 a5 08 7d 40 8c 0080: 8a 02 5c 5a 1b 19 c9 63 4a 4a 10 0c 14 94 d5 c1 0090: a8 50 a1 3c 86 5d 2c 2f 72 ce 5f c7 a0 ca eb 2c 00a0: 6b ae c6 a0 87 1d aa 2f 07 87 f8 bd 47 8a 01 33 00b0: 3b eb e5 3c d6 b8 9a ac e7 3f 74 60 68 5e b7 50 00c0: 9a e2 d3 7c a0 14 f1 ce 4b 50 24 6c e1 82 e9 70 00d0: 4a 15 8c 0d 9b 58 38 2a 2e 0b e9 9d 55 83 9d f5 00e0: a3 0e 68 1f f2 b7 3d ea a6 98 21 fa a5 22 ea ae 00f0: 0e e1 cf f7 63 b5 95 78 0d 68 ca 96 b1 76 62 41 0100: 7d f4 a5 5d db 0e 24 08 fe cb 9d de 24 aa 5d 7d 0110: 2a e9 75 b8 3b cf 51 a0 62 3e 9e 94 14 9d fc 75 0120: 9a c4 b6 3c ed 2d 9c 69 20 f3 21 89 cd 05 38 78 0130: 21 b4 a2 9f 76 9e a6 98 3c be 0f 59 31 1b 16 0d 0140: 53 61 e9 d5 5e cd 14 34 14 e4 3b cc cf 77 2f 0d 0150: db 33 33 8d d8 48 0b 7e 01 9e 84 e0 cb 26 63 52 0160: 3a b3 eb ea a2 f1 91 63 3c c8 a9 93 be b8 46 c3 0170: 4a e1 6a e8 66 67 63 87 50 6b a1 b5 cc 71 5c 52 Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Updating BIOS Image with new BPM(BPM Size=0x439) ## DEBUG (UpdateBIOS) Updating BIOS with new KM (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) Version 2.x RSA sigend KM Updating FIT KM size to 0x355 (853) 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 49 updating FIT Checksum 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 be Final FIT table ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 be 01: 00000000ff9be000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffa80000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000355 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000439 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Verifying BPM and KM ## DEBUG (VerifyBpm) start ## FitTableFlashAddr: fffdf2c0 Start Bpm Verification... Bpm Verification...TempBuf: f2bc7a00 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: f2bc7a14 0 0 0 0 Bpm Verification2...TempBuf: f2bc7a14 f2bc7a14 0 0 0 0 Bpm Verification3...IbbElement: f2bc7a14 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFA80000 [0xF2670000 = 0xFFA90EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xF2BC8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xF2BCF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7b027c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027510 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027510 size: 823 ##-- pData: f2bc7b32 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: f2bc7b2e @@ -- Free 0x7b027510 @@ -- Free 0x7b0274c0 ##-- Created RSA PubKey Context @0x7B027C10 size: 2087 @@ malloc 7b028440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x7b027c10 @@ -- Free 0x7b028440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Start Key Manifest Verification... ## FitTableFlashAddr: fffdf2c0 ## DEBUG (VerifyKeyManifest) -Verify BP Keyhash ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f --PASS: BPM KeyHash Digest Verification ## DEBUG (VerifyKmSignature) - start KeyManifest Signature Verification... 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f KM addr: f2bc7600, KmSig Addr: f2bc7644 0000: 10 01 00 10 00 0c 01 00 01 00 75 2a f2 18 e9 5d 0010: 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb c6 00 08 1a 0020: fe b1 3b 34 c6 26 7d 77 06 6f a3 40 71 8e 3f 00 0030: 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 e9 c5 a0 44 0040: 23 29 6d 5a c5 a8 60 17 53 48 ea 79 6e b3 f4 18 0050: 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb e4 dc 49 1b 0060: fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 c0 3c 86 85 0070: 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 b7 f9 7b 79 0080: 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 ad 14 e1 e1 0090: d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 84 82 8c 05 00a0: 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 30 18 e8 08 00b0: aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 40 eb 57 39 00c0: f1 dd ea d9 94 d1 10 de cd 12 ab 18 7e 6d 67 f5 00d0: ae da db 0a dc 1b 40 b1 7e d9 dd ac ba 44 3b d3 00e0: 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0d 62 cd 7b 00f0: 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 c2 13 d0 5e 0100: cd 36 ae df 61 ee c6 65 84 4c 1a f9 b6 23 ca 54 0110: 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 61 b2 fb af 0120: c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 22 f9 d4 e6 0130: db 72 c0 28 d4 1d 99 20 cd cf 06 d6 fb 5e 80 c7 0140: e4 46 6c a6 ff dd ed cb 44 80 d4 23 e4 41 e7 d3 0150: 83 28 54 a4 5b bf 1c 90 02 44 b8 74 ba 83 49 d3 0160: 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 27 36 2c e1 0170: d4 03 30 37 da 43 b9 09 02 a1 96 28 ad 8f 74 48 0180: 52 05 39 3c 7f 61 db 26 bb d8 16 00 10 00 0c 0b 0190: 00 94 9f 68 e4 c7 27 94 92 17 72 85 62 51 43 95 01a0: e7 f3 2d ff ca 5d 51 92 bf 5a 1f 28 66 a8 54 06 01b0: d0 d5 45 4a c7 cc d2 a9 71 88 8c 50 ef b4 2a 61 01c0: c1 ab 00 11 52 f4 ba c0 a2 ab f6 a8 d4 4d fd db 01d0: 3e bd 86 ee 35 71 d3 3e f7 91 6b 44 b2 8c 20 cc 01e0: 06 17 83 9d be 1a 9c 7b 67 4f 37 fb e8 39 01 ac 01f0: 4d c1 bc b9 bf a2 52 20 b1 ee 51 9d f2 74 b2 96 0200: cc 9b d8 33 d9 c0 ee 49 89 40 c4 51 a5 08 7d 40 0210: 8c ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7b027c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7b027510 ##-- BigNumInit ##-- Created BigNumber Context @0x7B027510 size: 823 ##-- pData: f2bc764e ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7b0274c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7B0274C0 size: 71 ##-- pData: f2bc764a @@ -- Free 0x7b027510 @@ -- Free 0x7b0274c0 ##-- Created RSA PubKey Context @0x7B027C10 size: 2087 @@ malloc 7b028440 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0x7b027c10 @@ -- Free 0x7b028440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process ## DEBUG (VerifyKmSignature) - end of proceedure --Verify Key Manifest - PASS **** Writing BIOS Image to file (/home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin) **** ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin, BufAddress: f1ef0000, Size 0xd00000 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin (0xd00000 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end @@ -- Free (BootPolicyManifest) 0x7b026890 @@ -- Free (KeyManifest) 0x7b0278a0 @@ -- Free (FileBufferRaw) 0xf1eef010 ###################################### # BPM / BIOS generated successfully! # ###################################### ## DEBUG (BpmGenMain) - end (Status: 0) writing RSA key Swap to original top swap block.... Swapping Top Swap Blocks.... Generate Oem Key Manifest.... Generate and sigm OemKeyManifest binary.... Error in running process: /home/sadashiva/SBL/Stitching/Meu/meu -gen meu_config -save /home/sadashiva/SBL/Stitching/Temp/meu_config.xml Traceback (most recent call last): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 288, in sys.exit(main()) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 247, in main if stitch (work_dir, stitch_cfg_file, sbl_file, args.btg_profile, plt_params_list, skipped_replace_list, args.plat_data, args.platform, args.tpm): File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py", line 159, in stitch update_btGuard_manifests(stitch_dir, stitch_cfg_file, btg_profile, tpm) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/security_stitch_help.py", line 150, in update_btGuard_manifests gen_sign_oem_key_manifest(meu_path, oem_bin_input, bpm_key_dir, key_size, output_dir, oem_bin_output) File "/home/sadashiva/SBL/slimbootloader-master_1/Platform/CommonBoardPkg/Script/BtgSign.py", line 119, in gen_sign_oem_key_manifest run_process ([meu_path, '-gen', 'meu_config', '-save', os.path.join(output_dir, 'meu_config.xml')]) File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 237, in run_process raise exc File "/home/sadashiva/SBL/slimbootloader-master_1/BootloaderCorePkg/Tools/CommonUtility.py", line 226, in run_process result = subprocess.call (arg_list) File "/usr/lib/python3.10/subprocess.py", line 345, in call with Popen(*popenargs, **kwargs) as p: File "/usr/lib/python3.10/subprocess.py", line 971, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/usr/lib/python3.10/subprocess.py", line 1863, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) PermissionError: [Errno 13] Permission denied: '/home/sadashiva/SBL/Stitching/Meu/meu' sadashiva@SVR33U:~/SBL$ chmod +x /home/sadashiva/SBL/Stitching/Meu/meu sadashiva@SVR33U:~/SBL$ sudo python3 slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py -b legacy -s slimbootloader-master_1/Outputs/ehl/Stitch_Components.zip -c slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwiConfig.py -w Stitching -p ehl -k SBL_KEY_DIR /home/sadashiva/SBL/slimbootloader-master_1/Platform/ElkhartlakeBoardPkg/Script/StitchIfwi.py:12: DeprecationWarning: the imp module is deprecated in favour of importlib and slated for removal in Python 3.12; see the module's documentation for alternative uses import imp {'': None} No platform specific parameter provided Executing stitch....... Unpack files from zip file ... Replace components in both partitions.... Replacing components....... Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Replacing components....... Padding 0x18c00 bytes at the end to fill the region 'ACM0' Generating xml file ......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:33 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -sku EHL No Emulation -save /home/sadashiva/SBL/Stitching/Temp/new.xml -w /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/new.xml Program terminated. ------------------- 4521 $SourceDir\OemBinary.bin $SourceDir\BiosRegion.bin $SourceDir\MeRegionFile.bin $SourceDir\ChipInitBinary.bin $SourceDir\PmcBinary.bin $SourceDir\PchcSubPartitionData.bin $SourceDir\IsifSubPartitionData.bin 32MB VsccEntry0 0xEF 0x40 0x19 0x1 $Yes Disabled No USB2 Ports No No No No No No 0x00000005 No No x2 PCIe on Lanes 6 and 7 Yes Yes No SATA GPIO Polarity PCIe X1 No No Disabled TSN Disabled Disabled 512KB Generating BPM GEN2 params file Sign partitions.... Sign primary partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Start KM Gen function Adding Public Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem, Producing KM binary output file /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin KM Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem, KM Public Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem, Key Manifest ID: 1, KM Key Hash: 12, Signing Scheme: 22, KMSVN: 0, pKmOutFileName /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin || KeyCount 1 || SigSource 1 Generating KM - Get Public Keys (1) Usage: 1, Alg: 0xB ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc 7e66f8a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x7e66f8a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 7e66f8a0 ## Base64 data starting address: 7e66f8bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 7e66e890 ## Placing result in DER Buffer at address: 7e66e890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 7e66f8bb, B64Length: 0x23d pDecodeLocation: 7e66e890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x7e66f8a0 @@ -- Free 0x7e66e890 ## DEBUG (ReadKey) end - Calcualting Public Keyhash -- an RSA key 384 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f - Creating KM signature ## DEBUG (KmGenMain) Addr KM: 9beb3b0, pSignature: 9beb3f4 - RSA signature ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem @@ malloc 7e66f8a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x7e66f8a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 7e66f8a0 ## Base64 data starting address: 7e66f8bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 7e66e890 ## Placing result in DER Buffer at address: 7e66e890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 7e66f8bb, B64Length: 0x23d pDecodeLocation: 7e66e890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x7e66f8a0 @@ -- Free 0x7e66e890 ## DEBUG (ReadKey) end ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc 7e66ea50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7e66ea50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7e66ea50 ## Base64 data starting address: 7e66ea6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 7e66fb20 ## Placing result in DER Buffer at address: 7e66fb20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7e66ea6c, B64Length: 0x97e pDecodeLocation: 7e66fb20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x7e66ea50 @@ -- Free 0x7e66fb20 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc 7e66ea50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7e66ea50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7e66ea50 ## Base64 data starting address: 7e66ea6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 7e66fb20 ## Placing result in DER Buffer at address: 7e66fb20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7e66ea6c, B64Length: 0x97e pDecodeLocation: 7e66fb20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x7e66ea50 @@ -- Free 0x7e66fb20 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 7e66ea50 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7e66f280 ##-- BigNumInit ##-- Created BigNumber Context @0x7E66F280 size: 823 ##-- pData: 9beaf60 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7e66f5c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7E66F5C0 size: 71 ##-- pData: 9beaf14 @@ -- Free 0x7e66f280 @@ -- Free 0x7e66f5c0 ##-- Created RSA PubKey Context @0x7E66EA50 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 7e66fb20 ##-- Setting Modulus: 0000: 75 2a f2 18 e9 5d 82 6f ##-- Setting PrivateExp: 0000: f1 25 cb 4a 0f 38 f3 09 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7e66f280 ##-- BigNumInit ##-- Created BigNumber Context @0x7E66F280 size: 823 ##-- pData: 9beaf60 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 7e670500 ##-- BigNumInit ##-- Created BigNumber Context @0x7E670500 size: 823 ##-- pData: 9beb0e0 @@ -- Free 0x7e66f280 @@ -- Free 0x7e670500 ##-- Created RSA PrivateKey Context @0x7E66FB20 size: 2511 @@ malloc 7e670840 Random Number (256 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 7e66f610 ## -- Randomize the seed ## -- seed: 163491460 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 7e66f5c0 ##-- BigNumInit ##-- Created BigNumber Context @0x7E66F5C0 size: 71 ##-- pData: 9beae84 @@ -- Free 0x7e66f5c0 @@ -- Free 0x7e66f610 Random Number (256 bits): a5 23 9d a6 8c e7 97 cd 13 c3 80 9e 3c d9 61 de ca 9e bd 8d 11 c4 e6 c3 30 52 cf 1 1a bd c8 46 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0x7e66ea50 @@ -- Free 0x7e66fb20 @@ -- Free 0x7e670840 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f 10 01 00 10 00 0c 01 00 01 00 75 2a 0050: f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb 0060: c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f a3 40 0070: 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 0080: e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 ea 79 0090: 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb 00a0: e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 00b0: c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 00c0: b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 00d0: ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 00e0: 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 00f0: 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 0100: 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 ab 18 0110: 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 dd ac 0120: ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0130: 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 0140: c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 1a f9 0150: b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 0160: 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 0170: 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 06 d6 0180: fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 d4 23 0190: e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 b8 74 01a0: ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 01b0: 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 96 28 01c0: ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 16 00 01d0: 10 00 0c 0b 00 c1 2f 96 4d 2b b4 c6 7a ef ea 6a 01e0: 2f ce 91 6a cb 1c 22 93 d7 da 17 74 74 e5 e7 cc 01f0: 5a 4c 36 1b 52 71 9b 77 94 29 a4 54 f9 7e f8 ec 0200: 1f fd 69 ba d6 ba 7b 5f ee 8a 26 14 e1 ea eb b5 0210: 25 5c 68 85 73 86 34 be ea 2f d6 d9 a6 96 1f 0c 0220: d6 92 2c 26 ac 9f 37 2c 63 84 89 e5 2f ec fe da 0230: ca 9e b3 b6 80 89 ed 37 3e 5b 92 3a 71 26 0c 70 0240: 71 3e 66 af fa 50 43 fc 7f cf c5 93 92 22 fc 3d 0250: c1 5c e1 44 13 c7 70 b7 08 1f bc ca 3a 13 96 16 0260: 9f 3e bf 19 16 d8 91 f1 49 5a a8 a7 e5 5e 11 f3 0270: ed 64 ee 99 1d 96 7c 5b 8d 25 f2 9e 9a 32 94 bd 0280: 44 32 bd 50 75 83 02 64 27 07 f7 25 f1 0d 97 ff 0290: bb 44 ac 13 c6 3c a1 8b 4d 11 37 15 a0 9c c1 f8 02a0: 2c f6 e2 b5 4f 1f c0 67 c9 5f 36 6b 29 9f 27 fe 02b0: 95 cf 48 5d ad be 35 fe 28 3d ea 1f 31 b5 29 0f 02c0: 63 61 4e 03 21 d6 77 18 d6 08 a1 5f aa 76 12 ad 02d0: 6e eb 38 a0 29 fe d0 57 f0 43 40 84 7e cc c5 ec 02e0: 05 2c ea 6f 37 19 fd f8 d7 3a 7f c4 38 84 86 7b 02f0: 99 83 69 f3 d5 00 29 ea ce 42 da 64 ba d4 2d 98 0300: b7 5e fe 1d fa 09 78 4b 6e ec 6c 94 6c fd a2 08 0310: 4f 7f 7a 9d fb 1b ed 6b 1f 77 3c 60 b0 90 e1 ab 0320: 29 7a 59 4e 0f 63 67 e0 8d 44 e7 92 0a 7e cc 6f 0330: 1e a2 79 4b f0 c1 5c cb cb 6c 63 56 7e 95 15 82 0340: c3 35 c4 08 a5 6f 34 b6 0c ed fb 1d 39 43 23 4a 0350: f9 8c ec 95 dd ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: c1 2f 96 4d 2b b4 c6 7a ef ea 6a 2f ce 91 6a cb 0010: 1c 22 93 d7 da 17 74 74 e5 e7 cc 5a 4c 36 1b 52 0020: 71 9b 77 94 29 a4 54 f9 7e f8 ec 1f fd 69 ba d6 0030: ba 7b 5f ee 8a 26 14 e1 ea eb b5 25 5c 68 85 73 0040: 86 34 be ea 2f d6 d9 a6 96 1f 0c d6 92 2c 26 ac 0050: 9f 37 2c 63 84 89 e5 2f ec fe da ca 9e b3 b6 80 0060: 89 ed 37 3e 5b 92 3a 71 26 0c 70 71 3e 66 af fa 0070: 50 43 fc 7f cf c5 93 92 22 fc 3d c1 5c e1 44 13 0080: c7 70 b7 08 1f bc ca 3a 13 96 16 9f 3e bf 19 16 0090: d8 91 f1 49 5a a8 a7 e5 5e 11 f3 ed 64 ee 99 1d 00a0: 96 7c 5b 8d 25 f2 9e 9a 32 94 bd 44 32 bd 50 75 00b0: 83 02 64 27 07 f7 25 f1 0d 97 ff bb 44 ac 13 c6 00c0: 3c a1 8b 4d 11 37 15 a0 9c c1 f8 2c f6 e2 b5 4f 00d0: 1f c0 67 c9 5f 36 6b 29 9f 27 fe 95 cf 48 5d ad 00e0: be 35 fe 28 3d ea 1f 31 b5 29 0f 63 61 4e 03 21 00f0: d6 77 18 d6 08 a1 5f aa 76 12 ad 6e eb 38 a0 29 0100: fe d0 57 f0 43 40 84 7e cc c5 ec 05 2c ea 6f 37 0110: 19 fd f8 d7 3a 7f c4 38 84 86 7b 99 83 69 f3 d5 0120: 00 29 ea ce 42 da 64 ba d4 2d 98 b7 5e fe 1d fa 0130: 09 78 4b 6e ec 6c 94 6c fd a2 08 4f 7f 7a 9d fb 0140: 1b ed 6b 1f 77 3c 60 b0 90 e1 ab 29 7a 59 4e 0f 0150: 63 67 e0 8d 44 e7 92 0a 7e cc 6f 1e a2 79 4b f0 0160: c1 5c cb cb 6c 63 56 7e 95 15 82 c3 35 c4 08 a5 0170: 6f 34 b6 0c ed fb 1d 39 43 23 4a f9 8c ec 95 dd Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Writing KM to file (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin, BufAddress: 9beb3b0, Size 0x355 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin (0x355 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end Generating Btg Boot Policy Manifest (BPM).bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 GEN /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params -BPM /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin -U /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -d:2 Start BPM Gen function --Will Produce BPM binary output file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin --Will generate modified BIOS file /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin with updated BPM and with KM from /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin --Verbose level 2 ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin @@ malloc (FileBufferRaw) faaef010 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin Opened BIOS File 13312 KBytes (0xD00000) ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin @@ malloc 886068a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin Parsing input parameter file Processing BPM parameter file /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params --readBuffer: FileVersion pValue: 1 Header valid -- Parsing rest of the file 0: ToolVersion '7' 0: ToolDate '20000101' 0: FileDate '20240618' 0: # BPM_DEF '# BPM_DEF' Processing BPM Header section 1: PlatformRules 'EHL Embedded' 1: BpmStrutVersion '0x20' 1: BpmRevision '0x01' 1: BpmRevocation '1' 1: AcmRevocation '2' 1: NEMPages '3' 1: IbbSetCount '1' 1: CurrentIbbSet '0' 1: # IBB_SET '# IBB_SET' Processing IBB Elements section 2: IbbSetType '0:ColdBoot' 2: IbbSetInclude 'TRUE' 2: PBETValue '0xF' 2: MCHBAR '0x00000000FEC80000' 2: VTD_BAR '0x00000000FED91000' 2: DmaProtBase0 '0x0' 2: DmaProtLimit0 '0x0' 2: DmaProtBase1 '0x0' 2: DmaProtLimit1 '0x0' 2: IbbFlags '0x2' 2: DmaProtAutoCalc 'FALSE' 2: IbbHashAlgID '0x0C:SHA384' 2: IbbEntry '0xFFFFFFF0' 2: PostIbbHashAlgID '0x10' 2: PostIBBHashSource 'Calculate' 2: PostIbbHashFile '' 2: IbbSegSource 'FIT' 2: IbbSegFile '' 2: IbbGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 2: ObbHashAlgID '0x10' 2: ObbFullFvHash 'FALSE' 2: ObbHashSource 'File' 2: ObbHashFile '' 2: # TXT_ELEMENT '# TXT_ELEMENT' Processing TXT Element section 3: TxtInclude 'FALSE' 3: MinSvn '0x0' 3: TxtFlags '0x0' 3: StrideSize '0x0' 3: AcpiBase '0x400' 3: PwrmBase '0xFE000000' 3: PdUseDefault 'TRUE' 3: PdMinutes '5' 3: PdSeconds '0' 3: PttCmosOffset0 '0x7E' 3: PttCmosOffset1 '0x7F' 3: TxtSegSource 'IBB' 3: TxtSegGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 3: TxtSegHashAlgID '0x10' 3: # PLATFORM_CONFIG_ELEMENT '# PLATFORM_CONFIG_ELEMENT' Processing Platform Config Data Element section 4: PcdInclude 'FALSE' 4: PdReqLocation 'TPM' 4: CmosIndexRegister '0x70' 4: CmosDataRegister '0x71' 4: CmosIndexOffset '125' 4: CmosBitFieldWidth '3' 4: CmosBitFieldPosition '0' 4: # TPM1.2_LOCATION '# TPM1.2_LOCATION' 4: TpmIndexHandle '0x50000004' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # TPM2.0_LOCATION '# TPM2.0_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # PTT_LOCATION '# PTT_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # COMMUNICATION_NEM_BUFFER '# COMMUNICATION_NEM_BUFFER' 4: CnbsInclude 'False' 4: CnbsBase '0xFF000000' 4: CnbsSize '0x1000' 4: # PLATFORM_MANUFACTURERS_ELEMENT '# PLATFORM_MANUFACTURERS_ELEMENT' Processing Platfrom Manufacturer's Element section 5: PmdeInclude 'FALSE' 5: PmdeFile '' 5: # PLATFORM_FIRMWARE_RESILIENCY_ELEMENT '# PLATFORM_FIRMWARE_RESILIENCY_ELEMENT' Processing Platform Firmware Resiliency Element Section 7: PfrsInclude 'FALSE' 7: PfrsControlFlags '0x00000000' 7: PfrsCpldSmbusAddr '0x0' 7: PfrsPchActiveOffset '0x0' 7: PfrsPchRecoveryOffset '0x0' 7: PfrsPchStagingOffset '0x0' 7: PfrsBmcActiveOffset '0x0' 7: PfrsBmcRecoveryOffset '0x0' 7: PfrsBmcStagingOffset '0x0' 7: # BPM_SIGNATURE '# BPM_SIGNATURE' Processing Signature Element section 6: BpmSigSource 'Internal' 6: BpmSigHashAlgID '0x0C:SHA384' 6: BpmSigKeyType '0x01' 6: BpmSigScheme '0x16:RSAPSS' 6: BpmKeySizeBits '3072' 6: BpmSigPubKey 'BpmGen2/keys/bpm_pubkey_3072.pem' 6: BpmSigPrivKey 'BpmGen2/keys/bpm_privkey_3072.pem' 6: BpmSigBatch '' 6: BpmSigData '' 6: BpmSigDataType 'BPM Body' 6: BpmSigXSig '' 6: #EOF '#EOF' Parsing FIT Table faaf0000 d00000 ## DEBUG (ParseFitIntoContext) start ## FitTableFlashAddr: fffdf2c0 ## Actual FIT Addr: fb7cf2c0 ## DEBUG ACM Size: 17e80 (97920) ## FIT BIOS Module 0, Addr: 0xFFFDF340, Size: 0x20CC0, Next Addr: 0x0 ## FIT BIOS Module 1, Addr: 0xFFFD8000, Size: 0x72C0, Next Addr: 0xFFFDF2C0 ## FIT BIOS Module 2, Addr: 0xFFDE0000, Size: 0x120000, Next Addr: 0xFFF00000 ## DEBUG - GetFillCount at FFFDF340 = 88 ## DEBUG - GetFillCount at FFFDF340 = 0 ## DEBUG (ParseFitIntoContext) FitCount: 8 and 5 spare ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 dd 01: 00000000ffd1e000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffde0000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000400 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000600 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) ## DEBUG - BPM Address: 0xfffd7a00, Max Size: 0x0600, KM Address: 0xfffd7600, Max Size: 0x0400 Generating BPM ## DEBUG (GenerateBpm) START ## Added FIT and ACM, now adding other regions to exclusion arrray: ## 0: FIT Type: 0xB -- Added to exclusion range ## 1: FIT Type: 0xC -- Added to exclusion range ## Adding uCode patch region @ FFD1E000 Size: 5000 ## Regions to be excluded from IBB Segments: Base: FFFDF2C0 Size 0x80 Base: FFFA0000 Size 0x17E80 Base: FFFD7600 Size 0x400 Base: FFFD7A00 Size 0x600 Base: FFD1E000 Size 0x5000 --Processing IBB set 0 Set Type: 0:ColdBoot IbbSegSource: FIT IBB segments from FIT --Checking IBB Segments for Overlap with excluded regions Checking Base:FFFDF340, Size: 0x20cc0 OK OK OK OK OK Checking Base:FFFD8000, Size: 0x72c0 OK OK OK OK OK Checking Base:FFDE0000, Size: 0x120000 OK OK OK OK OK ## Checking for 0-length segments: SegCount = 3 ## IBB Segments after removing any overlaps Base: FFFDF340, Size: 0x20CC0 Base: FFFD8000, Size: 0x72C0 Base: FFDE0000, Size: 0x120000 ## DEBUG (GenerateBpm) Size of IBB Set: 264, PostIBB Segments: 0, IBB Segments: 3 ## DEBUG Sorting Segments ## DEBUG (GenerateBpm) IBB Set processing done --Processing signature info Creating the BPM ## DEBUG (BuildBpm) START @@ malloc 88605890 Generating BPM Header ## DEBUG (BuildBpm) Buffer address = 0x88605890, Size: 0x439 Generating IBB Elements ## DEBUG IBB Set address = 0x886058A4 Number of IBB Sets: 1 --IBB Set: 0 **** WARNING **** DMA protect flag must be set -- Setting DMA Protect bit in IBB Flags Getting OBB, IBB & Post IBB hash digests ## DEBUG (BuildBpm) - PostIBB HashAlg 0x10 ## DEBUG (BuildBpm) - Calculate IBB Digest ## DEBUG - Selected IBB digest size 48, at 0x886058EE ## DEBUG - calc IBB digest gpBufOrigBIOS: 0xFAAF0000; Hashbuffer: 0x886058F0; HashAlg: 0xc; Set: 0 ## DEBUG (CreateIbbBiosHash) - 0xFAAF0000, 0xD00000, 0x886058F0, 0xC, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xFB5D0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFB7C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFB7CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0010: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFAAF0000, 0xD00000, 0x88605924, 0x4, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x4 ## -- SHA1 is 1 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xFB5D0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFB7C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFB7CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 84 b2 29 22 0010: f4 46 52 61 00 00 00 00 00 00 00 00 00 00 00 00 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFAAF0000, 0xD00000, 0x8860593C, 0xB, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xFB5D0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFB7C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFB7CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 93 d1 33 b0 26 26 3f 2f e9 de 21 3a b0 f6 60 87 0010: ab 78 c3 e9 dc e8 a8 50 14 23 ba e5 85 14 0b c1 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFAAF0000, 0xD00000, 0x88605960, 0x12, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFDE0000 (0xFB5D0000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFB7C8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFB7CF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 0010: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (BuildBpm) - Obb HashAlg 0x10 ## DEBUG (GetObbBHash) - BIOS Addr: 0xFAAF0000, Size: 0xD00000, Set: 0x0 ## DEBUG (GetObbBHash) - Obb HashAlg 0x10 Signing the BPM Generated BPM Body to be signed -- 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0070: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb 0080: e6 6d 26 45 84 8a e7 7b fe 4a 19 e0 94 92 e1 6b 0090: 04 00 14 00 d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 00a0: 84 b2 29 22 f4 46 52 61 0b 00 20 00 93 d1 33 b0 00b0: 26 26 3f 2f e9 de 21 3a b0 f6 60 87 ab 78 c3 e9 00c0: dc e8 a8 50 14 23 ba e5 85 14 0b c1 12 00 20 00 00d0: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 00e0: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 de ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 ## DEBUG (PrepareRsaSignature) - 0 BpmGen2/keys/bpm_pubkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc 88605d40 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x88605d40 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 88605d40 ## Base64 data starting address: 88605d5b ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 88605fc0 ## Placing result in DER Buffer at address: 88605fc0 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 88605d5b, B64Length: 0x23d pDecodeLocation: 88605fc0 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x88605d40 @@ -- Free 0x88605fc0 ## DEBUG (ReadKey) end Signing Internally ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: BpmGen2/keys/bpm_privkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 88607c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x88607c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 88607c20 ## Base64 data starting address: 88607c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 88606c10 ## Placing result in DER Buffer at address: 88606c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 88607c3c, B64Length: 0x97e pDecodeLocation: 88606c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x88607c20 @@ -- Free 0x88606c10 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 88607c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x88607c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 88607c20 ## Base64 data starting address: 88607c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 88606c10 ## Placing result in DER Buffer at address: 88606c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 88607c3c, B64Length: 0x97e pDecodeLocation: 88606c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x88607c20 @@ -- Free 0x88606c10 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 88606c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606180 ##-- BigNumInit ##-- Created BigNumber Context @0x88606180 size: 823 ##-- pData: bbca5750 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: bbca5704 @@ -- Free 0x88606180 @@ -- Free 0x886064c0 ##-- Created RSA PubKey Context @0x88606C10 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 88607440 ##-- Setting Modulus: 0000: 4d 3d b0 31 70 0f 65 13 ##-- Setting PrivateExp: 0000: 21 11 cb 85 26 95 d4 35 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606180 ##-- BigNumInit ##-- Created BigNumber Context @0x88606180 size: 823 ##-- pData: bbca5750 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606510 ##-- BigNumInit ##-- Created BigNumber Context @0x88606510 size: 823 ##-- pData: bbca58d0 @@ -- Free 0x88606180 @@ -- Free 0x88606510 ##-- Created RSA PrivateKey Context @0x88607440 size: 2511 @@ malloc 88607e20 Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 8860bf80 ## -- Randomize the seed ## -- seed: -1144367500 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: bbca5674 @@ -- Free 0x886064c0 @@ -- Free 0x8860bf80 Random Number (384 bits): 92 47 de 9f be c0 c9 89 e d2 fc f8 b5 e9 d8 f3 cb 47 54 9b d6 c7 7a d8 51 54 ae e0 40 3a 1f b4 1f bf 3e ea 25 98 9 37 6c 1a 29 24 b2 f6 25 66 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x88606c10 @@ -- Free 0x88607440 @@ -- Free 0x88607e20 Generating the KeyAndSignature structure 0000: 5f 5f 50 4d 53 47 5f 5f 20 00 00 00 10 01 00 10 0010: 00 0c 01 00 01 00 4d 3d b0 31 70 0f 65 13 41 23 0020: ed 38 58 b5 51 f6 41 95 7d 7a 8c ea ee 21 15 51 0030: 36 8f ed 98 e5 4e 31 e1 82 db 86 8a 0d bd 72 9d 0040: d4 dd dd 5f 36 f9 0a 67 de a7 27 94 09 e1 fc 11 0050: 75 f8 58 92 ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 0060: 2f 4e d7 4d b9 27 e1 49 90 83 3d 10 0b f2 11 31 0070: 3a c3 60 39 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 0080: 48 bc 96 69 c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 0090: 26 80 ff b7 d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f 00a0: c4 ee 23 aa 6a 96 47 56 3d 0c 5f ec 54 59 31 25 00b0: 13 98 82 aa 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e 00c0: ac cc 8c d9 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 00d0: 38 cf 86 a6 c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 00e0: 4e b2 06 dc 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 00f0: be aa 9c b7 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa 0100: bb 11 e1 3d b0 48 70 db 1f 58 42 48 73 71 38 3b 0110: 92 4c 1b 6e 1f 28 74 09 ec 24 8d 19 6d 02 21 68 0120: 5e 77 74 eb 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e 0130: dc 1b 27 6f 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 0140: 52 03 c2 d1 b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 0150: 7a 9a fc 29 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 0160: 8d 95 e8 86 af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 0170: 1a 61 d2 5b 77 1a a4 66 33 4f 74 6f 90 92 a9 63 0180: 94 2e 66 1c dc 25 63 9f f2 7d fb fe bf c0 bc fe 0190: a8 5c 75 7c 8c 9b 16 00 10 00 0c 0c 00 4b d9 87 01a0: c6 9a 5b 9f f1 7b 32 a0 66 49 2f 88 ba 39 47 a6 01b0: c4 ec 5a 38 e4 3f 25 16 3f f3 c9 21 ac c9 13 f0 01c0: 1c d5 3c 32 45 d8 54 46 6c 0f 45 57 5d 47 e3 3d 01d0: 96 c9 41 8a 7e 21 d8 e8 cc 09 9a fc 08 e5 73 38 01e0: e0 95 f9 27 34 57 cb fa f0 0c 72 fe 73 dd 27 4e 01f0: d0 41 6a 60 e1 de 7f 47 71 10 1f ed f2 04 1a da 0200: 17 f7 c4 c1 a3 2b c4 9b 08 89 0f e9 b5 04 a0 00 0210: 51 ae 2b 80 e3 47 00 0b fa 56 f2 8a 5f fc f0 58 0220: 22 ee 94 79 2b 35 46 e4 35 60 c9 c2 ee 03 af 5f 0230: 8f d8 7c ab 1b 08 14 e1 0c d0 de b8 fe 92 03 b0 0240: 91 01 1e 7f 04 5f 52 cc e4 13 25 a9 15 15 0b 66 0250: 8c bf 09 fd 35 2e 38 f2 3e e4 94 ee 1e 17 07 60 0260: 6f e2 3b f5 ef cd 5d 11 6a 47 17 ca 87 bf 06 6a 0270: 09 80 41 c5 ee 3e fd 70 b9 ef 5e a6 f9 e6 86 99 0280: e0 89 b8 ad 41 69 b4 cc 07 1d 00 45 5c e9 21 cb 0290: c0 f5 e4 9e b6 40 cd f6 84 64 c5 26 82 79 59 ec 02a0: 52 cf 69 b7 43 75 d4 de 5c c9 e0 76 cc e2 da b5 02b0: 10 41 f9 c2 63 fb b6 fb f4 45 4d d5 c1 e1 f7 77 02c0: 70 3a 28 a5 4c 9a f9 de 50 47 fc 73 5b a8 85 fc 02d0: 29 a5 f7 85 c9 f2 ba 80 07 7f cc 02 9b 13 37 e0 02e0: fd 0e 82 67 47 d2 d0 aa f2 b5 18 d1 7c 57 83 3a 02f0: 6b 95 a3 49 36 21 1f cc f1 f4 b7 8a a3 b0 6c 96 0300: 23 f0 5c ea 2e 4e ff 9a d2 bc 84 c2 a8 a5 3f 62 0310: 71 15 ba 89 e1 84 70 47 75 cd b1 6f 8f ## DEBUG BuildBpm -- BPM created **** BPM Generated **** ## DEBUG (VerifyBpm) start Start Bpm Verification... Bpm Verification...TempBuf: 88605890 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: 886058a4 0 0 0 0 Bpm Verification2...TempBuf: 886058a4 886058a4 0 0 0 0 Bpm Verification3...IbbElement: 886058a4 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFDE0000 [0xFB5D0000 = 0xFFDF0EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xFB7C8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xFB7CF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 88606c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606510 ##-- BigNumInit ##-- Created BigNumber Context @0x88606510 size: 823 ##-- pData: 886059c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: 886059be @@ -- Free 0x88606510 @@ -- Free 0x886064c0 ##-- Created RSA PubKey Context @0x88606C10 size: 2087 @@ malloc 88607440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x88606c10 @@ -- Free 0x88607440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Saving BPM to file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin WriteOutputFile: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BPM Buf: 88605890, Size: 439 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: 2f d0 1d d1 08 27 32 56 cb 8f 0c 95 f9 4e d6 f6 0070: 22 f8 e5 02 f3 9b c6 e6 86 0f cc 19 6c 91 6b bb 0080: e6 6d 26 45 84 8a e7 7b fe 4a 19 e0 94 92 e1 6b 0090: 04 00 14 00 d8 f8 a9 fc 0b cd 7c 72 b6 89 2c c2 00a0: 84 b2 29 22 f4 46 52 61 0b 00 20 00 93 d1 33 b0 00b0: 26 26 3f 2f e9 de 21 3a b0 f6 60 87 ab 78 c3 e9 00c0: dc e8 a8 50 14 23 ba e5 85 14 0b c1 12 00 20 00 00d0: cb 34 5f 86 27 26 fd 9a e4 24 62 16 9f fd f1 0c 00e0: 28 a4 15 a9 93 70 96 ed a1 93 0c d3 06 74 a6 10 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 de ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 10 01 00 10 00 0c 01 00 0130: 01 00 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 0140: 51 f6 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 0150: e5 4e 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 0160: 36 f9 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 0170: ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d 0180: b9 27 e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 0190: 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 01a0: c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 01b0: d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 01c0: 6a 96 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 01d0: 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 01e0: 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 01f0: c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 0200: 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 0210: 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d 0220: b0 48 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 0230: 1f 28 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 0240: 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 0250: 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 0260: b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 0270: 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 0280: af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 0290: 77 1a a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c 02a0: dc 25 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 02b0: 8c 9b 16 00 10 00 0c 0c 00 4b d9 87 c6 9a 5b 9f 02c0: f1 7b 32 a0 66 49 2f 88 ba 39 47 a6 c4 ec 5a 38 02d0: e4 3f 25 16 3f f3 c9 21 ac c9 13 f0 1c d5 3c 32 02e0: 45 d8 54 46 6c 0f 45 57 5d 47 e3 3d 96 c9 41 8a 02f0: 7e 21 d8 e8 cc 09 9a fc 08 e5 73 38 e0 95 f9 27 0300: 34 57 cb fa f0 0c 72 fe 73 dd 27 4e d0 41 6a 60 0310: e1 de 7f 47 71 10 1f ed f2 04 1a da 17 f7 c4 c1 0320: a3 2b c4 9b 08 89 0f e9 b5 04 a0 00 51 ae 2b 80 0330: e3 47 00 0b fa 56 f2 8a 5f fc f0 58 22 ee 94 79 0340: 2b 35 46 e4 35 60 c9 c2 ee 03 af 5f 8f d8 7c ab 0350: 1b 08 14 e1 0c d0 de b8 fe 92 03 b0 91 01 1e 7f 0360: 04 5f 52 cc e4 13 25 a9 15 15 0b 66 8c bf 09 fd 0370: 35 2e 38 f2 3e e4 94 ee 1e 17 07 60 6f e2 3b f5 0380: ef cd 5d 11 6a 47 17 ca 87 bf 06 6a 09 80 41 c5 0390: ee 3e fd 70 b9 ef 5e a6 f9 e6 86 99 e0 89 b8 ad 03a0: 41 69 b4 cc 07 1d 00 45 5c e9 21 cb c0 f5 e4 9e 03b0: b6 40 cd f6 84 64 c5 26 82 79 59 ec 52 cf 69 b7 03c0: 43 75 d4 de 5c c9 e0 76 cc e2 da b5 10 41 f9 c2 03d0: 63 fb b6 fb f4 45 4d d5 c1 e1 f7 77 70 3a 28 a5 03e0: 4c 9a f9 de 50 47 fc 73 5b a8 85 fc 29 a5 f7 85 03f0: c9 f2 ba 80 07 7f cc 02 9b 13 37 e0 fd 0e 82 67 0400: 47 d2 d0 aa f2 b5 18 d1 7c 57 83 3a 6b 95 a3 49 0410: 36 21 1f cc f1 f4 b7 8a a3 b0 6c 96 23 f0 5c ea 0420: 2e 4e ff 9a d2 bc 84 c2 a8 a5 3f 62 71 15 ba 89 0430: e1 84 70 47 75 cd b1 6f 8f ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BufAddress: 88605890, Size 0x439 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin (0x439 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end ## DEBUG (GenerateBpm) End of proceedure ###################### # BootPolicyManifest # ###################### BootPolicyManifestHeader: StructureID: __ACBP__ StructVersion: 0x21 HdrStructVer: 0x20 HdrSize: 0x0014 KeySigOffset: 0x0128 BpmRevision: 0x01 BpmRevocation: 0x01 AcmRevocation: 0x02 Reserved: 00 NEMPages: 0x0003 IbbElement: StructureID: __IBBS__ StructVersion: 0x20 Reserved: 00 Element Size: 0108 (264) Reserved: 00 SetType: 0x00 Reserved: 00 PBETValue: 0x0f Flags: 0x00000003 Enable VT-d: 1 InitMeasLoc3: 1 AuthorityMeas:0 TPM on Error: 0 Top Swap: 0 Force (MK)TME:0 SpiralEnforce:0 SRTM Attest: 0 Force CNB: 0 SVN_OVR: 0 IBB_MCHBAR: 0x00000000fec80000 VTD_BAR: 0x00000000fed91000 DmaProtBase0: 0x00000000 DmaProtLimit0: 0x00000000 DmaProtBase1: 0x0000000000000000 DmaProtLimit1: 0x0000000000000000 PostIbbHash: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: IbbEntry: 0xfffffff0 HashList (Number of Digests: 4, Total Size: 152) [0] HashAlg: 0x000c - 0x0C:SHA384 Size: 0x0030 HashBuffer: 2fd01dd108273256cb8f0c95f94ed6f622f8e502f39bc6e6860fcc196c916bbbe66d2645848ae77bfe4a19e09492e16b [1] HashAlg: 0x0004 - 0x04:SHA1 Size: 0x0014 HashBuffer: d8f8a9fc0bcd7c72b6892cc284b22922f4465261 [2] HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 93d133b026263f2fe9de213ab0f66087ab78c3e9dce8a8501423bae585140bc1 [3] HashAlg: 0x0012 - 0x12:SM3 Size: 0x0020 HashBuffer: cb345f862726fd9ae42462169ffdf10c28a415a9937096eda1930cd30674a610 OBB Digest: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: Reserved: 00 00 00 -- Debug (PrintpIbbElement -1- 0x88605924, pIbbEntry 0x886058E4, pDigest 0x88605980, pFlashSegment 0x88605988, Segment Count: 0x03 Seg# Base------ Size------ Flags- Reserved Measured Cache Type--- [ 0] 0xffde0000 0x00120000 0x0000 00, 00 Yes Write Protect [ 1] 0xfffd8000 0x000072c0 0x0000 00, 00 Yes Write Protect [ 2] 0xfffdf340 0x00020cc0 0x0000 00, 00 Yes Write Protect Boot Policy Manifest Signature Element: StructureID: __PMSG__ StructVersion: 0x20 Reserved: 0x00 00 00 Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 51 f6 0010: 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 e5 4e 0020: 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 36 f9 0030: 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 ce b9 0040: da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d b9 27 0050: e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 89 72 0060: 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 c0 79 0070: e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 d4 ca 0080: e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 6a 96 0090: 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 2b 41 00a0: 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 4b 29 00b0: c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 c5 28 00c0: 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 31 f2 00d0: e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 96 c4 00e0: eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d b0 48 00f0: 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 1f 28 0100: 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 7b 04 0110: 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 35 cb 0120: 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 b0 0e 0130: 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 5d 4a 0140: a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 af 5e 0150: 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 77 1a 0160: a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c dc 25 0170: 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 8c 9b SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000c 0x0C:SHA384 Signature: 0000: 4b d9 87 c6 9a 5b 9f f1 7b 32 a0 66 49 2f 88 ba 0010: 39 47 a6 c4 ec 5a 38 e4 3f 25 16 3f f3 c9 21 ac 0020: c9 13 f0 1c d5 3c 32 45 d8 54 46 6c 0f 45 57 5d 0030: 47 e3 3d 96 c9 41 8a 7e 21 d8 e8 cc 09 9a fc 08 0040: e5 73 38 e0 95 f9 27 34 57 cb fa f0 0c 72 fe 73 0050: dd 27 4e d0 41 6a 60 e1 de 7f 47 71 10 1f ed f2 0060: 04 1a da 17 f7 c4 c1 a3 2b c4 9b 08 89 0f e9 b5 0070: 04 a0 00 51 ae 2b 80 e3 47 00 0b fa 56 f2 8a 5f 0080: fc f0 58 22 ee 94 79 2b 35 46 e4 35 60 c9 c2 ee 0090: 03 af 5f 8f d8 7c ab 1b 08 14 e1 0c d0 de b8 fe 00a0: 92 03 b0 91 01 1e 7f 04 5f 52 cc e4 13 25 a9 15 00b0: 15 0b 66 8c bf 09 fd 35 2e 38 f2 3e e4 94 ee 1e 00c0: 17 07 60 6f e2 3b f5 ef cd 5d 11 6a 47 17 ca 87 00d0: bf 06 6a 09 80 41 c5 ee 3e fd 70 b9 ef 5e a6 f9 00e0: e6 86 99 e0 89 b8 ad 41 69 b4 cc 07 1d 00 45 5c 00f0: e9 21 cb c0 f5 e4 9e b6 40 cd f6 84 64 c5 26 82 0100: 79 59 ec 52 cf 69 b7 43 75 d4 de 5c c9 e0 76 cc 0110: e2 da b5 10 41 f9 c2 63 fb b6 fb f4 45 4d d5 c1 0120: e1 f7 77 70 3a 28 a5 4c 9a f9 de 50 47 fc 73 5b 0130: a8 85 fc 29 a5 f7 85 c9 f2 ba 80 07 7f cc 02 9b 0140: 13 37 e0 fd 0e 82 67 47 d2 d0 aa f2 b5 18 d1 7c 0150: 57 83 3a 6b 95 a3 49 36 21 1f cc f1 f4 b7 8a a3 0160: b0 6c 96 23 f0 5c ea 2e 4e ff 9a d2 bc 84 c2 a8 0170: a5 3f 62 71 15 ba 89 e1 84 70 47 75 cd b1 6f 8f BPM Body Size: 0x128, Signature Element Size: 0x31D ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f # FYI: Public Key Hash Digest # Algorithm: 0x0B:SHA256 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateHash) size=32 0000: 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 0010: 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f # FYI: Public Key Hash Digest # Algorithm: 0x12:SM3 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d 0010: b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 0020: 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 # FYI: Public Key Hash Digest # Algorithm: 0x0C:SHA384 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 88606c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606510 ##-- BigNumInit ##-- Created BigNumber Context @0x88606510 size: 823 ##-- pData: 886059c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: 886059be @@ -- Free 0x88606510 @@ -- Free 0x886064c0 ##-- Created RSA PubKey Context @0x88606C10 size: 2087 @@ malloc 88607440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x88606c10 @@ -- Free 0x88607440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process Debug (PrintBootPolicyManifest) - End of proceedure ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: c1 2f 96 4d 2b b4 c6 7a ef ea 6a 2f ce 91 6a cb 0010: 1c 22 93 d7 da 17 74 74 e5 e7 cc 5a 4c 36 1b 52 0020: 71 9b 77 94 29 a4 54 f9 7e f8 ec 1f fd 69 ba d6 0030: ba 7b 5f ee 8a 26 14 e1 ea eb b5 25 5c 68 85 73 0040: 86 34 be ea 2f d6 d9 a6 96 1f 0c d6 92 2c 26 ac 0050: 9f 37 2c 63 84 89 e5 2f ec fe da ca 9e b3 b6 80 0060: 89 ed 37 3e 5b 92 3a 71 26 0c 70 71 3e 66 af fa 0070: 50 43 fc 7f cf c5 93 92 22 fc 3d c1 5c e1 44 13 0080: c7 70 b7 08 1f bc ca 3a 13 96 16 9f 3e bf 19 16 0090: d8 91 f1 49 5a a8 a7 e5 5e 11 f3 ed 64 ee 99 1d 00a0: 96 7c 5b 8d 25 f2 9e 9a 32 94 bd 44 32 bd 50 75 00b0: 83 02 64 27 07 f7 25 f1 0d 97 ff bb 44 ac 13 c6 00c0: 3c a1 8b 4d 11 37 15 a0 9c c1 f8 2c f6 e2 b5 4f 00d0: 1f c0 67 c9 5f 36 6b 29 9f 27 fe 95 cf 48 5d ad 00e0: be 35 fe 28 3d ea 1f 31 b5 29 0f 63 61 4e 03 21 00f0: d6 77 18 d6 08 a1 5f aa 76 12 ad 6e eb 38 a0 29 0100: fe d0 57 f0 43 40 84 7e cc c5 ec 05 2c ea 6f 37 0110: 19 fd f8 d7 3a 7f c4 38 84 86 7b 99 83 69 f3 d5 0120: 00 29 ea ce 42 da 64 ba d4 2d 98 b7 5e fe 1d fa 0130: 09 78 4b 6e ec 6c 94 6c fd a2 08 4f 7f 7a 9d fb 0140: 1b ed 6b 1f 77 3c 60 b0 90 e1 ab 29 7a 59 4e 0f 0150: 63 67 e0 8d 44 e7 92 0a 7e cc 6f 1e a2 79 4b f0 0160: c1 5c cb cb 6c 63 56 7e 95 15 82 c3 35 c4 08 a5 0170: 6f 34 b6 0c ed fb 1d 39 43 23 4a f9 8c ec 95 dd Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Updating BIOS Image with new BPM(BPM Size=0x439) ## DEBUG (UpdateBIOS) Updating BIOS with new KM (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) Version 2.x RSA sigend KM Updating FIT KM size to 0x355 (853) 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 dd updating FIT Checksum 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 52 Final FIT table ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 52 01: 00000000ffd1e000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffde0000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000355 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000439 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Verifying BPM and KM ## DEBUG (VerifyBpm) start ## FitTableFlashAddr: fffdf2c0 Start Bpm Verification... Bpm Verification...TempBuf: fb7c7a00 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: fb7c7a14 0 0 0 0 Bpm Verification2...TempBuf: fb7c7a14 fb7c7a14 0 0 0 0 Bpm Verification3...IbbElement: fb7c7a14 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFDE0000 [0xFB5D0000 = 0xFFDF0EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xFB7C8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xFB7CF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 88606c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606510 ##-- BigNumInit ##-- Created BigNumber Context @0x88606510 size: 823 ##-- pData: fb7c7b32 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: fb7c7b2e @@ -- Free 0x88606510 @@ -- Free 0x886064c0 ##-- Created RSA PubKey Context @0x88606C10 size: 2087 @@ malloc 88607440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x88606c10 @@ -- Free 0x88607440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Start Key Manifest Verification... ## FitTableFlashAddr: fffdf2c0 ## DEBUG (VerifyKeyManifest) -Verify BP Keyhash ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f --PASS: BPM KeyHash Digest Verification ## DEBUG (VerifyKmSignature) - start KeyManifest Signature Verification... 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f KM addr: fb7c7600, KmSig Addr: fb7c7644 0000: 10 01 00 10 00 0c 01 00 01 00 75 2a f2 18 e9 5d 0010: 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb c6 00 08 1a 0020: fe b1 3b 34 c6 26 7d 77 06 6f a3 40 71 8e 3f 00 0030: 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 e9 c5 a0 44 0040: 23 29 6d 5a c5 a8 60 17 53 48 ea 79 6e b3 f4 18 0050: 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb e4 dc 49 1b 0060: fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 c0 3c 86 85 0070: 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 b7 f9 7b 79 0080: 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 ad 14 e1 e1 0090: d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 84 82 8c 05 00a0: 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 30 18 e8 08 00b0: aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 40 eb 57 39 00c0: f1 dd ea d9 94 d1 10 de cd 12 ab 18 7e 6d 67 f5 00d0: ae da db 0a dc 1b 40 b1 7e d9 dd ac ba 44 3b d3 00e0: 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0d 62 cd 7b 00f0: 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 c2 13 d0 5e 0100: cd 36 ae df 61 ee c6 65 84 4c 1a f9 b6 23 ca 54 0110: 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 61 b2 fb af 0120: c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 22 f9 d4 e6 0130: db 72 c0 28 d4 1d 99 20 cd cf 06 d6 fb 5e 80 c7 0140: e4 46 6c a6 ff dd ed cb 44 80 d4 23 e4 41 e7 d3 0150: 83 28 54 a4 5b bf 1c 90 02 44 b8 74 ba 83 49 d3 0160: 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 27 36 2c e1 0170: d4 03 30 37 da 43 b9 09 02 a1 96 28 ad 8f 74 48 0180: 52 05 39 3c 7f 61 db 26 bb d8 16 00 10 00 0c 0b 0190: 00 c1 2f 96 4d 2b b4 c6 7a ef ea 6a 2f ce 91 6a 01a0: cb 1c 22 93 d7 da 17 74 74 e5 e7 cc 5a 4c 36 1b 01b0: 52 71 9b 77 94 29 a4 54 f9 7e f8 ec 1f fd 69 ba 01c0: d6 ba 7b 5f ee 8a 26 14 e1 ea eb b5 25 5c 68 85 01d0: 73 86 34 be ea 2f d6 d9 a6 96 1f 0c d6 92 2c 26 01e0: ac 9f 37 2c 63 84 89 e5 2f ec fe da ca 9e b3 b6 01f0: 80 89 ed 37 3e 5b 92 3a 71 26 0c 70 71 3e 66 af 0200: fa 50 43 fc 7f cf c5 93 92 22 fc 3d c1 5c e1 44 0210: 13 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 88606c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc 88606510 ##-- BigNumInit ##-- Created BigNumber Context @0x88606510 size: 823 ##-- pData: fb7c764e ## Creating BigNumber Context - NumBytes: 4 @@ malloc 886064c0 ##-- BigNumInit ##-- Created BigNumber Context @0x886064C0 size: 71 ##-- pData: fb7c764a @@ -- Free 0x88606510 @@ -- Free 0x886064c0 ##-- Created RSA PubKey Context @0x88606C10 size: 2087 @@ malloc 88607440 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0x88606c10 @@ -- Free 0x88607440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process ## DEBUG (VerifyKmSignature) - end of proceedure --Verify Key Manifest - PASS **** Writing BIOS Image to file (/home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin) **** ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin, BufAddress: faaf0000, Size 0xd00000 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin (0xd00000 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end @@ -- Free (BootPolicyManifest) 0x88605890 @@ -- Free (KeyManifest) 0x886068a0 @@ -- Free (FileBufferRaw) 0xfaaef010 ###################################### # BPM / BIOS generated successfully! # ###################################### ## DEBUG (BpmGenMain) - end (Status: 0) writing RSA key Swap top swap block.... Swapping Top Swap Blocks.... Sign backup partition.... /home/sadashiva/SBL/Stitching/BpmGen2/keys Generating Btg KeyManifest.bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 KMGEN -KEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem BPM -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -SIGNKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -SIGNPUBKEY /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem -KMID 0x01 -KMKHASH sha384 -SCHEME RSAPSS -SVN 0 -d:2 Start KM Gen function Adding Public Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem, Producing KM binary output file /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin KM Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem, KM Public Signing Key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem, Key Manifest ID: 1, KM Key Hash: 12, Signing Scheme: 22, KMSVN: 0, pKmOutFileName /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin || KeyCount 1 || SigSource 1 Generating KM - Get Public Keys (1) Usage: 1, Alg: 0xB ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc 621a98a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x621a98a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 621a98a0 ## Base64 data starting address: 621a98bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 621a8890 ## Placing result in DER Buffer at address: 621a8890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 621a98bb, B64Length: 0x23d pDecodeLocation: 621a8890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x621a98a0 @@ -- Free 0x621a8890 ## DEBUG (ReadKey) end - Calcualting Public Keyhash -- an RSA key 384 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f - Creating KM signature ## DEBUG (KmGenMain) Addr KM: 1de84d20, pSignature: 1de84d64 - RSA signature ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem @@ malloc 621a98a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x621a98a0 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 621a98a0 ## Base64 data starting address: 621a98bb ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 621a8890 ## Placing result in DER Buffer at address: 621a8890 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 621a98bb, B64Length: 0x23d pDecodeLocation: 621a8890 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x621a98a0 @@ -- Free 0x621a8890 ## DEBUG (ReadKey) end ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc 621a8a50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x621a8a50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 621a8a50 ## Base64 data starting address: 621a8a6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 621a9b20 ## Placing result in DER Buffer at address: 621a9b20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 621a8a6c, B64Length: 0x97e pDecodeLocation: 621a9b20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x621a8a50 @@ -- Free 0x621a9b20 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem @@ malloc 621a8a50 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x621a8a50 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 621a8a50 ## Base64 data starting address: 621a8a6c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 621a9b20 ## Placing result in DER Buffer at address: 621a9b20 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 621a8a6c, B64Length: 0x97e pDecodeLocation: 621a9b20 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1794 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fe ## [0] Adjust (2), Type: 0x30, Length: 1790, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1790 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e8 ## [5] Adjust (2), Type: 0x4, Length: 1768, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1768 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e4 ## [6] Adjust (2), Type: 0x30, Length: 1764, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1764 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 17 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c1 0 ## [13] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 14, Offset: 0x55d :: 2 81 c0 5a ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 5a ## DEBUG Index: 15, Offset: 0x620 :: 2 81 c1 0 ## [15] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1790, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1768, Value[0] = 30 82 06 e4 ... [6] Type: 0x30, Length: 1764, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = d8 bb 26 db ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 17 71 12 b0 ... [11] Type: 0x02, Length: 192, Value[0] = ff df 4d 39 ... [12] Type: 0x02, Length: 192, Value[0] = d8 d6 d9 23 ... [13] Type: 0x02, Length: 192, Value[0] = b4 6a 3d 47 ... [14] Type: 0x02, Length: 192, Value[0] = 5a 24 ef 3e ... [15] Type: 0x02, Length: 192, Value[0] = d2 13 c2 06 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x621a8a50 @@ -- Free 0x621a9b20 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 621a8a50 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc 621a9280 ##-- BigNumInit ##-- Created BigNumber Context @0x621A9280 size: 823 ##-- pData: 1de848d0 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 621a95c0 ##-- BigNumInit ##-- Created BigNumber Context @0x621A95C0 size: 71 ##-- pData: 1de84884 @@ -- Free 0x621a9280 @@ -- Free 0x621a95c0 ##-- Created RSA PubKey Context @0x621A8A50 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 621a9b20 ##-- Setting Modulus: 0000: 75 2a f2 18 e9 5d 82 6f ##-- Setting PrivateExp: 0000: f1 25 cb 4a 0f 38 f3 09 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 621a9280 ##-- BigNumInit ##-- Created BigNumber Context @0x621A9280 size: 823 ##-- pData: 1de848d0 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 621aa500 ##-- BigNumInit ##-- Created BigNumber Context @0x621AA500 size: 823 ##-- pData: 1de84a50 @@ -- Free 0x621a9280 @@ -- Free 0x621aa500 ##-- Created RSA PrivateKey Context @0x621A9B20 size: 2511 @@ malloc 621aa840 Random Number (256 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 621a9610 ## -- Randomize the seed ## -- seed: 501762036 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 621a95c0 ##-- BigNumInit ##-- Created BigNumber Context @0x621A95C0 size: 71 ##-- pData: 1de847f4 @@ -- Free 0x621a95c0 @@ -- Free 0x621a9610 Random Number (256 bits): 9a ca 7f 1 ca 92 84 5a a0 de b0 d1 8e d3 a5 e8 8e 82 a9 ff 2d 1e 6c 2a da 3d b1 49 fb 48 aa 21 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0x621a8a50 @@ -- Free 0x621a9b20 @@ -- Free 0x621aa840 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f 10 01 00 10 00 0c 01 00 01 00 75 2a 0050: f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb 0060: c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f a3 40 0070: 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 0080: e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 ea 79 0090: 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb 00a0: e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 00b0: c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 00c0: b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 00d0: ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 00e0: 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 00f0: 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 0100: 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 ab 18 0110: 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 dd ac 0120: ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0130: 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 0140: c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 1a f9 0150: b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 0160: 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 0170: 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 06 d6 0180: fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 d4 23 0190: e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 b8 74 01a0: ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 01b0: 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 96 28 01c0: ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 16 00 01d0: 10 00 0c 0b 00 7f 01 cf 9c f0 a9 db 4e 02 18 4b 01e0: 17 e2 af 1c 9c 7f 9b de 6b 3a 09 0e 94 fd a4 7e 01f0: 0f af 85 65 86 fe ff 70 0f 7b 45 06 21 4a 0d 19 0200: 64 7c 2d bd 19 4a 82 0e 1c fe 83 e6 f1 0b b7 d6 0210: d2 82 ed 12 af b7 ee 53 c6 45 9f c6 bc d9 42 26 0220: 36 c2 bf 45 ad 81 65 0a b8 97 c6 55 fd 9b 23 53 0230: 93 70 06 b6 93 bd 7e 5c 63 d5 c9 e3 44 83 4d 63 0240: 26 f6 55 61 86 b8 ed b5 13 07 5b 1d 8c 7e 52 a6 0250: 75 08 3a 19 93 ba 4f a4 3c 96 6f f6 1b eb be f0 0260: d3 ea 17 98 0b 72 9e 9a 63 5b 29 a5 97 3f 03 e5 0270: 24 13 56 df 75 93 95 18 c6 5d 68 7d 8b c3 e9 bd 0280: ff 5a 3b 6b 64 eb 01 9b d8 bb aa 65 9b b1 88 2a 0290: be a2 0f 33 8b ef 69 4c 47 8c 74 32 90 47 ce 25 02a0: 75 ca 7b ff f8 30 24 6c 82 06 1e 97 34 89 bc 4a 02b0: 04 01 3a 44 64 d3 c3 3f 91 65 54 a0 cb 64 61 c5 02c0: 78 b8 6a 5a 58 63 9f f1 f7 76 5a 1b 6b f8 78 c5 02d0: 80 3f 94 6a b4 5f b3 ce 0c f0 e4 ae d1 2b d9 2b 02e0: 31 94 60 58 f4 1c 1c 9a 91 9e 51 cb b6 8b 1b 91 02f0: 0e f4 ed 4d d1 1a f5 56 e9 a2 a9 e8 fc 21 26 0f 0300: ba c7 81 53 a1 ea 48 63 a7 d1 22 14 38 34 b6 27 0310: 71 27 9c 01 37 ac a6 37 34 39 0f 29 17 7c 65 a4 0320: 38 6c 0a 59 11 33 5d 1c 44 cd 7e 2c 4c 6a 4d 42 0330: 7d b2 03 2a df ea d4 14 19 74 9d fe 6e 13 15 b1 0340: 8d 48 d2 a9 68 c3 d0 c0 d3 eb 76 ea 56 7c 38 68 0350: 3c 83 b7 e2 83 ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 7f 01 cf 9c f0 a9 db 4e 02 18 4b 17 e2 af 1c 9c 0010: 7f 9b de 6b 3a 09 0e 94 fd a4 7e 0f af 85 65 86 0020: fe ff 70 0f 7b 45 06 21 4a 0d 19 64 7c 2d bd 19 0030: 4a 82 0e 1c fe 83 e6 f1 0b b7 d6 d2 82 ed 12 af 0040: b7 ee 53 c6 45 9f c6 bc d9 42 26 36 c2 bf 45 ad 0050: 81 65 0a b8 97 c6 55 fd 9b 23 53 93 70 06 b6 93 0060: bd 7e 5c 63 d5 c9 e3 44 83 4d 63 26 f6 55 61 86 0070: b8 ed b5 13 07 5b 1d 8c 7e 52 a6 75 08 3a 19 93 0080: ba 4f a4 3c 96 6f f6 1b eb be f0 d3 ea 17 98 0b 0090: 72 9e 9a 63 5b 29 a5 97 3f 03 e5 24 13 56 df 75 00a0: 93 95 18 c6 5d 68 7d 8b c3 e9 bd ff 5a 3b 6b 64 00b0: eb 01 9b d8 bb aa 65 9b b1 88 2a be a2 0f 33 8b 00c0: ef 69 4c 47 8c 74 32 90 47 ce 25 75 ca 7b ff f8 00d0: 30 24 6c 82 06 1e 97 34 89 bc 4a 04 01 3a 44 64 00e0: d3 c3 3f 91 65 54 a0 cb 64 61 c5 78 b8 6a 5a 58 00f0: 63 9f f1 f7 76 5a 1b 6b f8 78 c5 80 3f 94 6a b4 0100: 5f b3 ce 0c f0 e4 ae d1 2b d9 2b 31 94 60 58 f4 0110: 1c 1c 9a 91 9e 51 cb b6 8b 1b 91 0e f4 ed 4d d1 0120: 1a f5 56 e9 a2 a9 e8 fc 21 26 0f ba c7 81 53 a1 0130: ea 48 63 a7 d1 22 14 38 34 b6 27 71 27 9c 01 37 0140: ac a6 37 34 39 0f 29 17 7c 65 a4 38 6c 0a 59 11 0150: 33 5d 1c 44 cd 7e 2c 4c 6a 4d 42 7d b2 03 2a df 0160: ea d4 14 19 74 9d fe 6e 13 15 b1 8d 48 d2 a9 68 0170: c3 d0 c0 d3 eb 76 ea 56 7c 38 68 3c 83 b7 e2 83 Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Writing KM to file (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin, BufAddress: 1de84d20, Size 0x355 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin (0x355 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end Generating Btg Boot Policy Manifest (BPM).bin.... ################################################################################## BpmGen2 - Tiano IA32/X64 Bpm generation Utility. Version 2.7.17 (Nov 2 2023) ################################################################################## BpmGen Tool Version (Linux x64) 2.7.17 Command Line: /home/sadashiva/SBL/Stitching/BpmGen2/bpmgen2 GEN /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params -BPM /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin -U /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin -KM /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin -d:2 Start BPM Gen function --Will Produce BPM binary output file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin --Will generate modified BIOS file /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin with updated BPM and with KM from /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin --Verbose level 2 ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin @@ malloc (FileBufferRaw) fb0ef010 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec_temp.bin Opened BIOS File 13312 KBytes (0xD00000) ## DEBUG (ReadInputFile) start - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin @@ malloc 07cd38a0 ## DEBUG (ReadInputFile) End - Filename: /home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin Parsing input parameter file Processing BPM parameter file /home/sadashiva/SBL/Stitching/Temp/bpmgen2.params --readBuffer: FileVersion pValue: 1 Header valid -- Parsing rest of the file 0: ToolVersion '7' 0: ToolDate '20000101' 0: FileDate '20240618' 0: # BPM_DEF '# BPM_DEF' Processing BPM Header section 1: PlatformRules 'EHL Embedded' 1: BpmStrutVersion '0x20' 1: BpmRevision '0x01' 1: BpmRevocation '1' 1: AcmRevocation '2' 1: NEMPages '3' 1: IbbSetCount '1' 1: CurrentIbbSet '0' 1: # IBB_SET '# IBB_SET' Processing IBB Elements section 2: IbbSetType '0:ColdBoot' 2: IbbSetInclude 'TRUE' 2: PBETValue '0xF' 2: MCHBAR '0x00000000FEC80000' 2: VTD_BAR '0x00000000FED91000' 2: DmaProtBase0 '0x0' 2: DmaProtLimit0 '0x0' 2: DmaProtBase1 '0x0' 2: DmaProtLimit1 '0x0' 2: IbbFlags '0x2' 2: DmaProtAutoCalc 'FALSE' 2: IbbHashAlgID '0x0C:SHA384' 2: IbbEntry '0xFFFFFFF0' 2: PostIbbHashAlgID '0x10' 2: PostIBBHashSource 'Calculate' 2: PostIbbHashFile '' 2: IbbSegSource 'FIT' 2: IbbSegFile '' 2: IbbGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 2: ObbHashAlgID '0x10' 2: ObbFullFvHash 'FALSE' 2: ObbHashSource 'File' 2: ObbHashFile '' 2: # TXT_ELEMENT '# TXT_ELEMENT' Processing TXT Element section 3: TxtInclude 'FALSE' 3: MinSvn '0x0' 3: TxtFlags '0x0' 3: StrideSize '0x0' 3: AcpiBase '0x400' 3: PwrmBase '0xFE000000' 3: PdUseDefault 'TRUE' 3: PdMinutes '5' 3: PdSeconds '0' 3: PttCmosOffset0 '0x7E' 3: PttCmosOffset1 '0x7F' 3: TxtSegSource 'IBB' 3: TxtSegGuid '4a4ca1c6-871c-45bb-8801-6910a7aa5807' 3: TxtSegHashAlgID '0x10' 3: # PLATFORM_CONFIG_ELEMENT '# PLATFORM_CONFIG_ELEMENT' Processing Platform Config Data Element section 4: PcdInclude 'FALSE' 4: PdReqLocation 'TPM' 4: CmosIndexRegister '0x70' 4: CmosDataRegister '0x71' 4: CmosIndexOffset '125' 4: CmosBitFieldWidth '3' 4: CmosBitFieldPosition '0' 4: # TPM1.2_LOCATION '# TPM1.2_LOCATION' 4: TpmIndexHandle '0x50000004' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # TPM2.0_LOCATION '# TPM2.0_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # PTT_LOCATION '# PTT_LOCATION' 4: TpmIndexHandle '0x1C10104' 4: TpmByteOffset '7' 4: TpmBitFieldWidth '3' 4: TpmBitFieldPosition '0' 4: # COMMUNICATION_NEM_BUFFER '# COMMUNICATION_NEM_BUFFER' 4: CnbsInclude 'False' 4: CnbsBase '0xFF000000' 4: CnbsSize '0x1000' 4: # PLATFORM_MANUFACTURERS_ELEMENT '# PLATFORM_MANUFACTURERS_ELEMENT' Processing Platfrom Manufacturer's Element section 5: PmdeInclude 'FALSE' 5: PmdeFile '' 5: # PLATFORM_FIRMWARE_RESILIENCY_ELEMENT '# PLATFORM_FIRMWARE_RESILIENCY_ELEMENT' Processing Platform Firmware Resiliency Element Section 7: PfrsInclude 'FALSE' 7: PfrsControlFlags '0x00000000' 7: PfrsCpldSmbusAddr '0x0' 7: PfrsPchActiveOffset '0x0' 7: PfrsPchRecoveryOffset '0x0' 7: PfrsPchStagingOffset '0x0' 7: PfrsBmcActiveOffset '0x0' 7: PfrsBmcRecoveryOffset '0x0' 7: PfrsBmcStagingOffset '0x0' 7: # BPM_SIGNATURE '# BPM_SIGNATURE' Processing Signature Element section 6: BpmSigSource 'Internal' 6: BpmSigHashAlgID '0x0C:SHA384' 6: BpmSigKeyType '0x01' 6: BpmSigScheme '0x16:RSAPSS' 6: BpmKeySizeBits '3072' 6: BpmSigPubKey 'BpmGen2/keys/bpm_pubkey_3072.pem' 6: BpmSigPrivKey 'BpmGen2/keys/bpm_privkey_3072.pem' 6: BpmSigBatch '' 6: BpmSigData '' 6: BpmSigDataType 'BPM Body' 6: BpmSigXSig '' 6: #EOF '#EOF' Parsing FIT Table fb0f0000 d00000 ## DEBUG (ParseFitIntoContext) start ## FitTableFlashAddr: fffdf2c0 ## Actual FIT Addr: fbdcf2c0 ## DEBUG ACM Size: 17e80 (97920) ## FIT BIOS Module 0, Addr: 0xFFFDF340, Size: 0x20CC0, Next Addr: 0x0 ## FIT BIOS Module 1, Addr: 0xFFFD8000, Size: 0x72C0, Next Addr: 0xFFFDF2C0 ## FIT BIOS Module 2, Addr: 0xFFA80000, Size: 0x120000, Next Addr: 0xFFBA0000 ## DEBUG - GetFillCount at FFFDF340 = 88 ## DEBUG - GetFillCount at FFFDF340 = 0 ## DEBUG (ParseFitIntoContext) FitCount: 8 and 5 spare ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 49 01: 00000000ff9be000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffa80000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000400 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000600 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) ## DEBUG - BPM Address: 0xfffd7a00, Max Size: 0x0600, KM Address: 0xfffd7600, Max Size: 0x0400 Generating BPM ## DEBUG (GenerateBpm) START ## Added FIT and ACM, now adding other regions to exclusion arrray: ## 0: FIT Type: 0xB -- Added to exclusion range ## 1: FIT Type: 0xC -- Added to exclusion range ## Adding uCode patch region @ FF9BE000 Size: 5000 ## Regions to be excluded from IBB Segments: Base: FFFDF2C0 Size 0x80 Base: FFFA0000 Size 0x17E80 Base: FFFD7600 Size 0x400 Base: FFFD7A00 Size 0x600 Base: FF9BE000 Size 0x5000 --Processing IBB set 0 Set Type: 0:ColdBoot IbbSegSource: FIT IBB segments from FIT --Checking IBB Segments for Overlap with excluded regions Checking Base:FFFDF340, Size: 0x20cc0 OK OK OK OK OK Checking Base:FFFD8000, Size: 0x72c0 OK OK OK OK OK Checking Base:FFA80000, Size: 0x120000 OK OK OK OK OK ## Checking for 0-length segments: SegCount = 3 ## IBB Segments after removing any overlaps Base: FFFDF340, Size: 0x20CC0 Base: FFFD8000, Size: 0x72C0 Base: FFA80000, Size: 0x120000 ## DEBUG (GenerateBpm) Size of IBB Set: 264, PostIBB Segments: 0, IBB Segments: 3 ## DEBUG Sorting Segments ## DEBUG (GenerateBpm) IBB Set processing done --Processing signature info Creating the BPM ## DEBUG (BuildBpm) START @@ malloc 07cd2890 Generating BPM Header ## DEBUG (BuildBpm) Buffer address = 0x7CD2890, Size: 0x439 Generating IBB Elements ## DEBUG IBB Set address = 0x7CD28A4 Number of IBB Sets: 1 --IBB Set: 0 **** WARNING **** DMA protect flag must be set -- Setting DMA Protect bit in IBB Flags Getting OBB, IBB & Post IBB hash digests ## DEBUG (BuildBpm) - PostIBB HashAlg 0x10 ## DEBUG (BuildBpm) - Calculate IBB Digest ## DEBUG - Selected IBB digest size 48, at 0x7CD28EE ## DEBUG - calc IBB digest gpBufOrigBIOS: 0xFB0F0000; Hashbuffer: 0x7CD28F0; HashAlg: 0xc; Set: 0 ## DEBUG (CreateIbbBiosHash) - 0xFB0F0000, 0xD00000, 0x7CD28F0, 0xC, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xFB870000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFBDC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFBDCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0010: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFB0F0000, 0xD00000, 0x7CD2924, 0x4, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x4 ## -- SHA1 is 1 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xFB870000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFBDC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFBDCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 61 1e 9a b3 0010: 19 df 07 61 00 00 00 00 00 00 00 00 00 00 00 00 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFB0F0000, 0xD00000, 0x7CD293C, 0xB, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xFB870000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFBDC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFBDCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 37 6b a9 e8 e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 0010: c5 88 23 a8 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (CreateIbbBiosHash) - 0xFB0F0000, 0xD00000, 0x7CD2960, 0x12, 0x0 ## DEBUG (CreateIbbBiosHash - IPP) Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateIbbBiosHash - IPP) Module count: 0x3 ## DEBUG -- Flash Addr: 0xFFA80000 (0xFB870000): [0xE0 0E ... FF FF] Size: 0x120000 ## DEBUG -- Flash Addr: 0xFFFD8000 (0xFBDC8000): [0x00 00 ... FF FF] Size: 0x72C0 ## DEBUG -- Flash Addr: 0xFFFDF340 (0xFBDCF340): [0xFF FF ... FD FF] Size: 0x20CC0 ## DEBUG (CreateIbbBiosHash) -2 Ready to get Digest 0000: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 0010: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 ## DEBUG (CreateIbbBiosHash) -End of function ## DEBUG (BuildBpm) - Obb HashAlg 0x10 ## DEBUG (GetObbBHash) - BIOS Addr: 0xFB0F0000, Size: 0xD00000, Set: 0x0 ## DEBUG (GetObbBHash) - Obb HashAlg 0x10 Signing the BPM Generated BPM Body to be signed -- 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0070: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 0080: 4f 52 5c 4b 76 ac 26 ae 44 96 54 c8 a3 c8 02 0b 0090: 04 00 14 00 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 00a0: 61 1e 9a b3 19 df 07 61 0b 00 20 00 37 6b a9 e8 00b0: e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 c5 88 23 a8 00c0: 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 12 00 20 00 00d0: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 00e0: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 a8 ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 ## DEBUG (PrepareRsaSignature) - 0 BpmGen2/keys/bpm_pubkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_pubkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_pubkey_3072.pem @@ malloc 07cd2d40 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_pubkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 26 (0x1a) -- pPemHeader: 0x7cd2d40 -- pPemHeader: -----BEGIN PUBLIC KEY----- ## processing header at 7cd2d40 ## Base64 data starting address: 7cd2d5b ## Found '-' at offset 600 (0x258) - start of trailer ## Base64 data length: 0x23d (0x23d) @@ malloc 07cd2fc0 ## Placing result in DER Buffer at address: 7cd2fc0 (size=429 0x1ad) ## DEBUG (Base64Decode) pB64String: 7cd2d5b, B64Length: 0x23d pDecodeLocation: 7cd2fc0 ## PEM Type = 9 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 9 ## DEBUG (ParseASN1) ASN.1 Size: 422 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 1 a2 ## [0] Adjust (2), Type: 0x30, Length: 418, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 418 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 30 d 6 9 ## [1] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 2 ## DEBUG Index: 2, Offset: 0x0 :: 6 9 2a 86 ## [2] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 3, Offset: 0xb :: 5 0 3 82 ## [3] Adjust (0), Type: 0x5, Length: 0, Value[0] = 3 ## DEBUG Index: 4, Offset: 0xf :: 3 82 1 8f ## [4] Adjust (2), Type: 0x3, Length: 399, Value[0] = 0 ## Processing embedded Sequence in BitString ## DEBUG (ParseASN1) ASN.1 Size: 398 Starting Index: 5 ## DEBUG Index: 5, Offset: 0x0 :: 30 82 1 8a ## [5] Adjust (2), Type: 0x30, Length: 394, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 394 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 2 82 1 81 ## [6] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 7, Offset: 0x185 :: 2 3 1 0 ## [7] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 DER ASN.1 Decode (8 elements) [0] Type: 0x30, Length: 418, Value[0] = 30 0d 06 09 ... [1] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [2] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [3] Type: 0x05, Length: 0 [4] Type: 0x03, Length: 399, Value[0] = 00 30 82 01 ... [5] Type: 0x30, Length: 394, Value[0] = 02 82 01 81 ... [6] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [7] Type: 0x02, Length: 3, Value[0] = 01 00 01 ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x07cd2d40 @@ -- Free 0x07cd2fc0 ## DEBUG (ReadKey) end Signing Internally ## DEBUG (CreateRsaSignatureIpp) - Start (PrivateKey: BpmGen2/keys/bpm_privkey_3072.pem ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Public Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 07cd4c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7cd4c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7cd4c20 ## Base64 data starting address: 7cd4c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 07cd3c10 ## Placing result in DER Buffer at address: 7cd3c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7cd4c3c, B64Length: 0x97e pDecodeLocation: 7cd3c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Public): KeySizeBytes = 0x180 @@ -- Free 0x07cd4c20 @@ -- Free 0x07cd3c10 ## DEBUG (ReadKey) end ## DEBUG (ReadKey) - 0 BpmGen2/keys/bpm_privkey_3072.pem - looking for Private Key ## DEBUG (ReadInputFile) start - Filename: BpmGen2/keys/bpm_privkey_3072.pem @@ malloc 07cd4c20 ## DEBUG (ReadInputFile) End - Filename: BpmGen2/keys/bpm_privkey_3072.pem ## Opened Key file ## FileData = 2d 2d 2d 2d ## DEBUG (GetDerFromPEM) -- Found 0x0A at offset 27 (0x1b) -- pPemHeader: 0x7cd4c20 -- pPemHeader: -----BEGIN PRIVATE KEY----- ## processing header at 7cd4c20 ## Base64 data starting address: 7cd4c3c ## Found '-' at offset 2458 (0x99a) - start of trailer ## Base64 data length: 0x97e (0x97e) @@ malloc 07cd3c10 ## Placing result in DER Buffer at address: 7cd3c10 (size=1822 0x71e) ## DEBUG (Base64Decode) pB64String: 7cd4c3c, B64Length: 0x97e pDecodeLocation: 7cd3c10 ## PEM Type = 7 ## DEBUG (ReadKey) - Processing DER ## Debug (GetKeyFromDER) - 0 PEM Type = 7 ## DEBUG (ParseASN1) ASN.1 Size: 1792 Starting Index: 0 ## DEBUG Index: 0, Offset: 0x0 :: 30 82 6 fc ## [0] Adjust (2), Type: 0x30, Length: 1788, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1788 Starting Index: 1 ## DEBUG Index: 1, Offset: 0x0 :: 2 1 0 30 ## [1] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 2, Offset: 0x3 :: 30 d 6 9 ## [2] Adjust (0), Type: 0x30, Length: 13, Value[0] = 6 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 13 Starting Index: 3 ## DEBUG Index: 3, Offset: 0x0 :: 6 9 2a 86 ## [3] Adjust (0), Type: 0x6, Length: 9, Value[0] = 2a ## DEBUG Index: 4, Offset: 0xb :: 5 0 4 82 ## [4] Adjust (0), Type: 0x5, Length: 0, Value[0] = 4 ## DEBUG Index: 5, Offset: 0x12 :: 4 82 6 e6 ## [5] Adjust (2), Type: 0x4, Length: 1766, Value[0] = 30 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1766 Starting Index: 6 ## DEBUG Index: 6, Offset: 0x0 :: 30 82 6 e2 ## [6] Adjust (2), Type: 0x30, Length: 1762, Value[0] = 2 ## Processing embedded Sequence ## DEBUG (ParseASN1) ASN.1 Size: 1762 Starting Index: 7 ## DEBUG Index: 7, Offset: 0x0 :: 2 1 0 2 ## [7] Adjust (0), Type: 0x2, Length: 1, Value[0] = 0 ## DEBUG Index: 8, Offset: 0x3 :: 2 82 1 81 ## [8] Adjust (2), Type: 0x2, Length: 385, Value[0] = 0 ## DEBUG Index: 9, Offset: 0x188 :: 2 3 1 0 ## [9] Adjust (0), Type: 0x2, Length: 3, Value[0] = 1 ## DEBUG Index: 10, Offset: 0x18d :: 2 82 1 80 ## [10] Adjust (2), Type: 0x2, Length: 384, Value[0] = 7 ## DEBUG Index: 11, Offset: 0x311 :: 2 81 c1 0 ## [11] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 12, Offset: 0x3d5 :: 2 81 c1 0 ## [12] Adjust (1), Type: 0x2, Length: 193, Value[0] = 0 ## DEBUG Index: 13, Offset: 0x499 :: 2 81 c0 a ## [13] Adjust (1), Type: 0x2, Length: 192, Value[0] = a ## DEBUG Index: 14, Offset: 0x55c :: 2 81 c0 43 ## [14] Adjust (1), Type: 0x2, Length: 192, Value[0] = 43 ## DEBUG Index: 15, Offset: 0x61f :: 2 81 c0 20 ## [15] Adjust (1), Type: 0x2, Length: 192, Value[0] = 20 DER ASN.1 Decode (16 elements) [0] Type: 0x30, Length: 1788, Value[0] = 02 01 00 30 ... [1] Type: 0x02, Length: 1, Value[0] = 00 [2] Type: 0x30, Length: 13, Value[0] = 06 09 2a 86 ... [3] Type: 0x06, Length: 9, Value[0] = 2a 86 48 86 ... [4] Type: 0x05, Length: 0 [5] Type: 0x04, Length: 1766, Value[0] = 30 82 06 e2 ... [6] Type: 0x30, Length: 1762, Value[0] = 02 01 00 02 ... [7] Type: 0x02, Length: 1, Value[0] = 00 [8] Type: 0x02, Length: 384, Value[0] = 9b 8c 7c 75 ... [9] Type: 0x02, Length: 3, Value[0] = 01 00 01 [10] Type: 0x02, Length: 384, Value[0] = 07 cc 61 9f ... [11] Type: 0x02, Length: 192, Value[0] = b5 56 0b 8e ... [12] Type: 0x02, Length: 192, Value[0] = db 98 4b 81 ... [13] Type: 0x02, Length: 192, Value[0] = 0a 28 4a b7 ... [14] Type: 0x02, Length: 192, Value[0] = 43 03 97 07 ... [15] Type: 0x02, Length: 192, Value[0] = 20 b9 6b e0 ... ## DEBUG - Extracting RSA key ## DEBUG (GetKeyFromDER) - end /key RSA Key Size: 384 ## Result of GetKeyFromDER(Private): KeySizeBytes = 0x180 @@ -- Free 0x07cd4c20 @@ -- Free 0x07cd3c10 ## DEBUG (ReadKey) end ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 07cd3c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3180 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3180 size: 823 ##-- pData: 15009610 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: 150095c4 @@ -- Free 0x07cd3180 @@ -- Free 0x07cd34c0 ##-- Created RSA PubKey Context @0x 7CD3C10 size: 2087 ## Creating RSA PrivateKey Context - KeyLength: 3072 @@ malloc 07cd4440 ##-- Setting Modulus: 0000: 4d 3d b0 31 70 0f 65 13 ##-- Setting PrivateExp: 0000: 21 11 cb 85 26 95 d4 35 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3180 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3180 size: 823 ##-- pData: 15009610 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3510 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3510 size: 823 ##-- pData: 15009790 @@ -- Free 0x07cd3180 @@ -- Free 0x07cd3510 ##-- Created RSA PrivateKey Context @0x 7CD4440 size: 2511 @@ malloc 07cd4e20 Random Number (384 bits): 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ## Creating PRNG Context @@ malloc 07cd8f80 ## -- Randomize the seed ## -- seed: 352359732 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: 15009534 @@ -- Free 0x07cd34c0 @@ -- Free 0x07cd8f80 Random Number (384 bits): a2 e0 c5 c2 e9 e 2b 58 fd c2 b8 15 82 1b 83 64 58 6b 1b 9b e3 a5 b8 a4 46 4b dd a1 81 83 bd bd 65 35 ae fb 40 f8 cd 4b 17 5d 3 c8 d9 7a c3 8f ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x07cd3c10 @@ -- Free 0x07cd4440 @@ -- Free 0x07cd4e20 Generating the KeyAndSignature structure 0000: 5f 5f 50 4d 53 47 5f 5f 20 00 00 00 10 01 00 10 0010: 00 0c 01 00 01 00 4d 3d b0 31 70 0f 65 13 41 23 0020: ed 38 58 b5 51 f6 41 95 7d 7a 8c ea ee 21 15 51 0030: 36 8f ed 98 e5 4e 31 e1 82 db 86 8a 0d bd 72 9d 0040: d4 dd dd 5f 36 f9 0a 67 de a7 27 94 09 e1 fc 11 0050: 75 f8 58 92 ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 0060: 2f 4e d7 4d b9 27 e1 49 90 83 3d 10 0b f2 11 31 0070: 3a c3 60 39 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 0080: 48 bc 96 69 c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 0090: 26 80 ff b7 d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f 00a0: c4 ee 23 aa 6a 96 47 56 3d 0c 5f ec 54 59 31 25 00b0: 13 98 82 aa 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e 00c0: ac cc 8c d9 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 00d0: 38 cf 86 a6 c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 00e0: 4e b2 06 dc 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 00f0: be aa 9c b7 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa 0100: bb 11 e1 3d b0 48 70 db 1f 58 42 48 73 71 38 3b 0110: 92 4c 1b 6e 1f 28 74 09 ec 24 8d 19 6d 02 21 68 0120: 5e 77 74 eb 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e 0130: dc 1b 27 6f 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 0140: 52 03 c2 d1 b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 0150: 7a 9a fc 29 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 0160: 8d 95 e8 86 af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 0170: 1a 61 d2 5b 77 1a a4 66 33 4f 74 6f 90 92 a9 63 0180: 94 2e 66 1c dc 25 63 9f f2 7d fb fe bf c0 bc fe 0190: a8 5c 75 7c 8c 9b 16 00 10 00 0c 0c 00 6a e1 8d 01a0: a1 05 55 21 87 e7 b4 d6 eb 06 73 29 f8 35 de ff 01b0: 32 fd 2e 32 7b 98 cc 33 a6 a7 0b 1b a7 35 5d c0 01c0: 94 4d e7 8f a3 b1 22 81 16 97 5f 81 3e 59 5a c7 01d0: 8c 5d b9 84 ce 1a 04 a4 9a e4 53 cb 2e fd c2 1e 01e0: f9 a7 1e 2a c6 8c 73 f7 8a 99 6e b8 cd 39 2f c2 01f0: 03 c3 0d 7c 2f b2 35 5f 4b 45 d8 34 5a ec 27 22 0200: 1a d0 88 a3 c7 c7 88 ba 3c 22 38 8e dc 29 b4 0b 0210: 81 0c 9f 2d 01 56 b8 95 98 ea dc 05 c2 78 80 7c 0220: ea 9a dc f3 8a 3d 5d e7 18 fc 06 ca 20 cb 15 b7 0230: fd 3f 00 0d 06 bd c0 9c 21 71 1d f5 7b eb 64 2e 0240: cd 71 6b ec 5c 0c f8 c0 0a 7c f3 ac aa 9d c4 b8 0250: d1 97 93 d2 92 f1 c0 ac 97 dc e3 52 c7 42 75 f0 0260: 74 9d f5 21 2c 45 1d 72 7e a7 a6 19 84 36 8f a1 0270: 6f 4e 85 fb 02 0e 01 2d ef 43 19 b1 0e 72 cb 02 0280: 65 6d ba 48 9d b2 92 78 57 e4 97 a6 37 22 d3 c5 0290: 87 4a d2 e4 34 33 60 62 fc 5d 52 47 f3 2f 18 57 02a0: 04 f2 33 d3 72 cf 0e ad 67 2b b5 a1 30 90 e8 f5 02b0: bd 17 7d a2 d0 a9 e3 2e e0 6e 4c 9e c5 e6 31 e9 02c0: c4 ca dd 17 43 bb 76 cc 1c 6b ca 1d 4f a4 ea c4 02d0: c5 25 bc cd 6e a1 59 07 5c 5b ed ec 12 f2 e2 bd 02e0: c8 98 a4 f8 2e 09 f3 d9 e7 db 33 4d 00 95 69 6f 02f0: 01 97 c3 bf 41 52 1c 74 25 7b 7c 29 b1 86 22 93 0300: c2 d3 65 32 3d 72 9a 22 d6 d0 c5 f8 38 b6 3b 9b 0310: 1d 01 11 a6 f6 56 df a2 fe 82 b7 ef e8 ## DEBUG BuildBpm -- BPM created **** BPM Generated **** ## DEBUG (VerifyBpm) start Start Bpm Verification... Bpm Verification...TempBuf: 7cd2890 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: 7cd28a4 0 0 0 0 Bpm Verification2...TempBuf: 7cd28a4 7cd28a4 0 0 0 0 Bpm Verification3...IbbElement: 7cd28a4 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFA80000 [0xFB870000 = 0xFFA90EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xFBDC8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xFBDCF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 07cd3c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3510 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3510 size: 823 ##-- pData: 7cd29c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: 7cd29be @@ -- Free 0x07cd3510 @@ -- Free 0x07cd34c0 ##-- Created RSA PubKey Context @0x 7CD3C10 size: 2087 @@ malloc 07cd4440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x07cd3c10 @@ -- Free 0x07cd4440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Saving BPM to file /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin WriteOutputFile: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BPM Buf: 7cd2890, Size: 439 0000: 5f 5f 41 43 42 50 5f 5f 21 20 14 00 28 01 01 01 0010: 02 00 03 00 5f 5f 49 42 42 53 5f 5f 20 00 08 01 0020: 00 00 00 0f 03 00 00 00 00 00 c8 fe 00 00 00 00 0030: 00 10 d9 fe 00 00 00 00 00 00 00 00 00 00 00 00 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0050: 10 00 00 00 f0 ff ff ff 98 00 04 00 0c 00 30 00 0060: e3 87 65 f0 08 65 a2 24 ea 35 e4 d0 bf bd 04 70 0070: f9 64 ed 0d 1e 75 5a f0 13 ec 67 22 17 16 4c a0 0080: 4f 52 5c 4b 76 ac 26 ae 44 96 54 c8 a3 c8 02 0b 0090: 04 00 14 00 73 1b 7d 1b 9f 2d 45 b2 fa b6 e8 4f 00a0: 61 1e 9a b3 19 df 07 61 0b 00 20 00 37 6b a9 e8 00b0: e9 4b f5 0b c7 d4 7b 44 99 21 4c f4 c5 88 23 a8 00c0: 73 9b 0e 65 f5 f6 c5 76 d8 5b be 20 12 00 20 00 00d0: 91 d5 91 bb e1 fc 3d 1d 56 94 ea 33 ac 3b 7e 96 00e0: 55 c1 00 ca 0d 5e 62 0f 27 f5 3e 4d a4 54 22 51 00f0: 10 00 00 00 00 00 00 03 00 00 00 00 00 00 a8 ff 0100: 00 00 12 00 00 00 00 00 00 80 fd ff c0 72 00 00 0110: 00 00 00 00 40 f3 fd ff c0 0c 02 00 5f 5f 50 4d 0120: 53 47 5f 5f 20 00 00 00 10 01 00 10 00 0c 01 00 0130: 01 00 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 0140: 51 f6 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 0150: e5 4e 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 0160: 36 f9 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 0170: ce b9 da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d 0180: b9 27 e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 0190: 89 72 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 01a0: c0 79 e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 01b0: d4 ca e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 01c0: 6a 96 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 01d0: 2b 41 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 01e0: 4b 29 c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 01f0: c5 28 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 0200: 31 f2 e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 0210: 96 c4 eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d 0220: b0 48 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 0230: 1f 28 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 0240: 7b 04 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 0250: 35 cb 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 0260: b0 0e 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 0270: 5d 4a a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 0280: af 5e 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 0290: 77 1a a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c 02a0: dc 25 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 02b0: 8c 9b 16 00 10 00 0c 0c 00 6a e1 8d a1 05 55 21 02c0: 87 e7 b4 d6 eb 06 73 29 f8 35 de ff 32 fd 2e 32 02d0: 7b 98 cc 33 a6 a7 0b 1b a7 35 5d c0 94 4d e7 8f 02e0: a3 b1 22 81 16 97 5f 81 3e 59 5a c7 8c 5d b9 84 02f0: ce 1a 04 a4 9a e4 53 cb 2e fd c2 1e f9 a7 1e 2a 0300: c6 8c 73 f7 8a 99 6e b8 cd 39 2f c2 03 c3 0d 7c 0310: 2f b2 35 5f 4b 45 d8 34 5a ec 27 22 1a d0 88 a3 0320: c7 c7 88 ba 3c 22 38 8e dc 29 b4 0b 81 0c 9f 2d 0330: 01 56 b8 95 98 ea dc 05 c2 78 80 7c ea 9a dc f3 0340: 8a 3d 5d e7 18 fc 06 ca 20 cb 15 b7 fd 3f 00 0d 0350: 06 bd c0 9c 21 71 1d f5 7b eb 64 2e cd 71 6b ec 0360: 5c 0c f8 c0 0a 7c f3 ac aa 9d c4 b8 d1 97 93 d2 0370: 92 f1 c0 ac 97 dc e3 52 c7 42 75 f0 74 9d f5 21 0380: 2c 45 1d 72 7e a7 a6 19 84 36 8f a1 6f 4e 85 fb 0390: 02 0e 01 2d ef 43 19 b1 0e 72 cb 02 65 6d ba 48 03a0: 9d b2 92 78 57 e4 97 a6 37 22 d3 c5 87 4a d2 e4 03b0: 34 33 60 62 fc 5d 52 47 f3 2f 18 57 04 f2 33 d3 03c0: 72 cf 0e ad 67 2b b5 a1 30 90 e8 f5 bd 17 7d a2 03d0: d0 a9 e3 2e e0 6e 4c 9e c5 e6 31 e9 c4 ca dd 17 03e0: 43 bb 76 cc 1c 6b ca 1d 4f a4 ea c4 c5 25 bc cd 03f0: 6e a1 59 07 5c 5b ed ec 12 f2 e2 bd c8 98 a4 f8 0400: 2e 09 f3 d9 e7 db 33 4d 00 95 69 6f 01 97 c3 bf 0410: 41 52 1c 74 25 7b 7c 29 b1 86 22 93 c2 d3 65 32 0420: 3d 72 9a 22 d6 d0 c5 f8 38 b6 3b 9b 1d 01 11 a6 0430: f6 56 df a2 fe 82 b7 ef e8 ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin, BufAddress: 7cd2890, Size 0x439 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/BpmManifest.bin (0x439 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end ## DEBUG (GenerateBpm) End of proceedure ###################### # BootPolicyManifest # ###################### BootPolicyManifestHeader: StructureID: __ACBP__ StructVersion: 0x21 HdrStructVer: 0x20 HdrSize: 0x0014 KeySigOffset: 0x0128 BpmRevision: 0x01 BpmRevocation: 0x01 AcmRevocation: 0x02 Reserved: 00 NEMPages: 0x0003 IbbElement: StructureID: __IBBS__ StructVersion: 0x20 Reserved: 00 Element Size: 0108 (264) Reserved: 00 SetType: 0x00 Reserved: 00 PBETValue: 0x0f Flags: 0x00000003 Enable VT-d: 1 InitMeasLoc3: 1 AuthorityMeas:0 TPM on Error: 0 Top Swap: 0 Force (MK)TME:0 SpiralEnforce:0 SRTM Attest: 0 Force CNB: 0 SVN_OVR: 0 IBB_MCHBAR: 0x00000000fec80000 VTD_BAR: 0x00000000fed91000 DmaProtBase0: 0x00000000 DmaProtLimit0: 0x00000000 DmaProtBase1: 0x0000000000000000 DmaProtLimit1: 0x0000000000000000 PostIbbHash: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: IbbEntry: 0xfffffff0 HashList (Number of Digests: 4, Total Size: 152) [0] HashAlg: 0x000c - 0x0C:SHA384 Size: 0x0030 HashBuffer: e38765f00865a224ea35e4d0bfbd0470f964ed0d1e755af013ec672217164ca04f525c4b76ac26ae449654c8a3c8020b [1] HashAlg: 0x0004 - 0x04:SHA1 Size: 0x0014 HashBuffer: 731b7d1b9f2d45b2fab6e84f611e9ab319df0761 [2] HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 376ba9e8e94bf50bc7d47b4499214cf4c58823a8739b0e65f5f6c576d85bbe20 [3] HashAlg: 0x0012 - 0x12:SM3 Size: 0x0020 HashBuffer: 91d591bbe1fc3d1d5694ea33ac3b7e9655c100ca0d5e620f27f53e4da4542251 OBB Digest: HashAlg: 0x0010 - 0x10:NULL Size: 0x0000 HashBuffer: Reserved: 00 00 00 -- Debug (PrintpIbbElement -1- 0x7CD2924, pIbbEntry 0x7CD28E4, pDigest 0x7CD2980, pFlashSegment 0x7CD2988, Segment Count: 0x03 Seg# Base------ Size------ Flags- Reserved Measured Cache Type--- [ 0] 0xffa80000 0x00120000 0x0000 00, 00 Yes Write Protect [ 1] 0xfffd8000 0x000072c0 0x0000 00, 00 Yes Write Protect [ 2] 0xfffdf340 0x00020cc0 0x0000 00, 00 Yes Write Protect Boot Policy Manifest Signature Element: StructureID: __PMSG__ StructVersion: 0x20 Reserved: 0x00 00 00 Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 4d 3d b0 31 70 0f 65 13 41 23 ed 38 58 b5 51 f6 0010: 41 95 7d 7a 8c ea ee 21 15 51 36 8f ed 98 e5 4e 0020: 31 e1 82 db 86 8a 0d bd 72 9d d4 dd dd 5f 36 f9 0030: 0a 67 de a7 27 94 09 e1 fc 11 75 f8 58 92 ce b9 0040: da a2 22 d3 dc f5 1d 1a 80 a1 2f 4e d7 4d b9 27 0050: e1 49 90 83 3d 10 0b f2 11 31 3a c3 60 39 89 72 0060: 7f 4d 49 5e 0f ac 89 dd 83 6c 48 bc 96 69 c0 79 0070: e7 fa 52 7b 36 5c 77 fb be 3f 26 80 ff b7 d4 ca 0080: e0 bf a7 2e 24 01 ed 3b e1 6f c4 ee 23 aa 6a 96 0090: 47 56 3d 0c 5f ec 54 59 31 25 13 98 82 aa 2b 41 00a0: 4c 10 3f aa 0a 76 65 f6 c5 7e ac cc 8c d9 4b 29 00b0: c2 d8 26 a0 80 95 a5 73 d9 1a 38 cf 86 a6 c5 28 00c0: 41 a7 1a 9b c5 a8 b2 b7 93 ee 4e b2 06 dc 31 f2 00d0: e9 76 13 86 ad 43 13 ff 43 b8 be aa 9c b7 96 c4 00e0: eb 0d 78 53 3f 6c 75 eb a4 aa bb 11 e1 3d b0 48 00f0: 70 db 1f 58 42 48 73 71 38 3b 92 4c 1b 6e 1f 28 0100: 74 09 ec 24 8d 19 6d 02 21 68 5e 77 74 eb 7b 04 0110: 2d 8b f9 c1 25 5a 79 fe 76 6e dc 1b 27 6f 35 cb 0120: 21 d9 61 1f 2e c6 2f 51 c3 d5 52 03 c2 d1 b0 0e 0130: 8e 38 27 5c ee 2d 7f 6e 58 af 7a 9a fc 29 5d 4a 0140: a4 f1 7c 46 97 bb df 3c 70 08 8d 95 e8 86 af 5e 0150: 07 f6 d4 6d 5d 20 e3 ed 13 7a 1a 61 d2 5b 77 1a 0160: a4 66 33 4f 74 6f 90 92 a9 63 94 2e 66 1c dc 25 0170: 63 9f f2 7d fb fe bf c0 bc fe a8 5c 75 7c 8c 9b SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000c 0x0C:SHA384 Signature: 0000: 6a e1 8d a1 05 55 21 87 e7 b4 d6 eb 06 73 29 f8 0010: 35 de ff 32 fd 2e 32 7b 98 cc 33 a6 a7 0b 1b a7 0020: 35 5d c0 94 4d e7 8f a3 b1 22 81 16 97 5f 81 3e 0030: 59 5a c7 8c 5d b9 84 ce 1a 04 a4 9a e4 53 cb 2e 0040: fd c2 1e f9 a7 1e 2a c6 8c 73 f7 8a 99 6e b8 cd 0050: 39 2f c2 03 c3 0d 7c 2f b2 35 5f 4b 45 d8 34 5a 0060: ec 27 22 1a d0 88 a3 c7 c7 88 ba 3c 22 38 8e dc 0070: 29 b4 0b 81 0c 9f 2d 01 56 b8 95 98 ea dc 05 c2 0080: 78 80 7c ea 9a dc f3 8a 3d 5d e7 18 fc 06 ca 20 0090: cb 15 b7 fd 3f 00 0d 06 bd c0 9c 21 71 1d f5 7b 00a0: eb 64 2e cd 71 6b ec 5c 0c f8 c0 0a 7c f3 ac aa 00b0: 9d c4 b8 d1 97 93 d2 92 f1 c0 ac 97 dc e3 52 c7 00c0: 42 75 f0 74 9d f5 21 2c 45 1d 72 7e a7 a6 19 84 00d0: 36 8f a1 6f 4e 85 fb 02 0e 01 2d ef 43 19 b1 0e 00e0: 72 cb 02 65 6d ba 48 9d b2 92 78 57 e4 97 a6 37 00f0: 22 d3 c5 87 4a d2 e4 34 33 60 62 fc 5d 52 47 f3 0100: 2f 18 57 04 f2 33 d3 72 cf 0e ad 67 2b b5 a1 30 0110: 90 e8 f5 bd 17 7d a2 d0 a9 e3 2e e0 6e 4c 9e c5 0120: e6 31 e9 c4 ca dd 17 43 bb 76 cc 1c 6b ca 1d 4f 0130: a4 ea c4 c5 25 bc cd 6e a1 59 07 5c 5b ed ec 12 0140: f2 e2 bd c8 98 a4 f8 2e 09 f3 d9 e7 db 33 4d 00 0150: 95 69 6f 01 97 c3 bf 41 52 1c 74 25 7b 7c 29 b1 0160: 86 22 93 c2 d3 65 32 3d 72 9a 22 d6 d0 c5 f8 38 0170: b6 3b 9b 1d 01 11 a6 f6 56 df a2 fe 82 b7 ef e8 BPM Body Size: 0x128, Signature Element Size: 0x31D ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f # FYI: Public Key Hash Digest # Algorithm: 0x0B:SHA256 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f ## DEBUG (GetIppHashAlgID)- Alg: 0x12 ## -- SM3 is 7 ## DEBUG (CreateHash) size=32 0000: 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 0010: 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f # FYI: Public Key Hash Digest # Algorithm: 0x12:SM3 63 ca 3e a7 9b 76 a8 83 e1 91 03 6d b3 24 51 49 41 5a 61 be 0a 1b 0b 7b 78 8e 8a f5 f2 39 98 8f ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d 0010: b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 0020: 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 # FYI: Public Key Hash Digest # Algorithm: 0x0C:SHA384 79 33 4b 99 69 ea ff ae a7 ed 5e 01 5e ef 3f 6d b7 71 7d 8e 69 36 ba 14 3a 60 32 cb c1 af 69 fa 8d 7e ed 2f 5e 26 67 59 fc 6b 7e e9 1c 1d 0c e1 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 07cd3c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3510 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3510 size: 823 ##-- pData: 7cd29c2 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: 7cd29be @@ -- Free 0x07cd3510 @@ -- Free 0x07cd34c0 ##-- Created RSA PubKey Context @0x 7CD3C10 size: 2087 @@ malloc 07cd4440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x07cd3c10 @@ -- Free 0x07cd4440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process Debug (PrintBootPolicyManifest) - End of proceedure ################ # Key Manifest # ################ StructureID: __KEYM__ StructVersion: 0x21 Reserved: 0x00 00 00 KeySigOffset: 0x0044 Reserved: 0x00 00 00 KeyManifestVer: 0x01 KMSVN: 0x00 KeyManifestID: 0x01 KmPubKey Alg: 0x000c - 0x0C:SHA384 Number of Manifest Key Digests: 1 KeyHashes: [1] Usage: 0x1 For: Boot Policy Manifest, HashAlg: 0x000b - 0x0B:SHA256 Size: 0x0020 HashBuffer: 8f28da884656a4e9793fda6c0da0412ebf5a546877b95c22fba4baefd607267f Signature Structure: Version: 0x10 KeyAlg: 0x0001 0x01:RSA RsaPublicKeyStructure: Version: 0x10 KeySize: 0x0c00 Exponent: 0x00010001 Modulus: 0000: 75 2a f2 18 e9 5d 82 6f 2d 9d f7 b5 b8 b5 a1 5f 0010: 19 eb c6 00 08 1a fe b1 3b 34 c6 26 7d 77 06 6f 0020: a3 40 71 8e 3f 00 80 e1 a2 d7 1b 1d b2 9f 2d 74 0030: a0 35 e9 c5 a0 44 23 29 6d 5a c5 a8 60 17 53 48 0040: ea 79 6e b3 f4 18 27 af 8e bf 67 e6 8a 55 e6 bd 0050: 98 bb e4 dc 49 1b fd 82 71 5b a5 bf 9c 55 69 3d 0060: 7f 00 c0 3c 86 85 40 9b 4d b2 ba 27 fb 26 51 45 0070: 3f 65 b7 f9 7b 79 3a 3a 46 a9 43 41 fb fe 6b 4e 0080: f6 53 ad 14 e1 e1 d6 f4 eb 46 b3 b0 37 59 36 90 0090: 69 f6 84 82 8c 05 29 88 fe d8 1a 2a 5a 38 39 52 00a0: d0 7f 30 18 e8 08 aa c0 f7 aa 65 ee 0a 59 4b e4 00b0: 9a 08 40 eb 57 39 f1 dd ea d9 94 d1 10 de cd 12 00c0: ab 18 7e 6d 67 f5 ae da db 0a dc 1b 40 b1 7e d9 00d0: dd ac ba 44 3b d3 7d ee 54 34 79 54 1e 82 b0 8b 00e0: 01 30 0d 62 cd 7b 29 c5 57 fa ec 3c 5c 53 e7 60 00f0: 31 38 c2 13 d0 5e cd 36 ae df 61 ee c6 65 84 4c 0100: 1a f9 b6 23 ca 54 11 2e dc 90 06 2a 72 b8 fe 2e 0110: fa 5f 61 b2 fb af c4 30 23 50 f9 c9 31 8c 53 a7 0120: 1d a2 22 f9 d4 e6 db 72 c0 28 d4 1d 99 20 cd cf 0130: 06 d6 fb 5e 80 c7 e4 46 6c a6 ff dd ed cb 44 80 0140: d4 23 e4 41 e7 d3 83 28 54 a4 5b bf 1c 90 02 44 0150: b8 74 ba 83 49 d3 35 13 e0 7f c7 a7 3a 59 d6 c8 0160: a3 9c 27 36 2c e1 d4 03 30 37 da 43 b9 09 02 a1 0170: 96 28 ad 8f 74 48 52 05 39 3c 7f 61 db 26 bb d8 SigScheme: 0x0016 0x16:RSAPSS RsaSsaSigStructure: Version: 0x10 KeySize: 0x0c00 HashAlg: 0x000b 0x0B:SHA256 Signature: 0000: 7f 01 cf 9c f0 a9 db 4e 02 18 4b 17 e2 af 1c 9c 0010: 7f 9b de 6b 3a 09 0e 94 fd a4 7e 0f af 85 65 86 0020: fe ff 70 0f 7b 45 06 21 4a 0d 19 64 7c 2d bd 19 0030: 4a 82 0e 1c fe 83 e6 f1 0b b7 d6 d2 82 ed 12 af 0040: b7 ee 53 c6 45 9f c6 bc d9 42 26 36 c2 bf 45 ad 0050: 81 65 0a b8 97 c6 55 fd 9b 23 53 93 70 06 b6 93 0060: bd 7e 5c 63 d5 c9 e3 44 83 4d 63 26 f6 55 61 86 0070: b8 ed b5 13 07 5b 1d 8c 7e 52 a6 75 08 3a 19 93 0080: ba 4f a4 3c 96 6f f6 1b eb be f0 d3 ea 17 98 0b 0090: 72 9e 9a 63 5b 29 a5 97 3f 03 e5 24 13 56 df 75 00a0: 93 95 18 c6 5d 68 7d 8b c3 e9 bd ff 5a 3b 6b 64 00b0: eb 01 9b d8 bb aa 65 9b b1 88 2a be a2 0f 33 8b 00c0: ef 69 4c 47 8c 74 32 90 47 ce 25 75 ca 7b ff f8 00d0: 30 24 6c 82 06 1e 97 34 89 bc 4a 04 01 3a 44 64 00e0: d3 c3 3f 91 65 54 a0 cb 64 61 c5 78 b8 6a 5a 58 00f0: 63 9f f1 f7 76 5a 1b 6b f8 78 c5 80 3f 94 6a b4 0100: 5f b3 ce 0c f0 e4 ae d1 2b d9 2b 31 94 60 58 f4 0110: 1c 1c 9a 91 9e 51 cb b6 8b 1b 91 0e f4 ed 4d d1 0120: 1a f5 56 e9 a2 a9 e8 fc 21 26 0f ba c7 81 53 a1 0130: ea 48 63 a7 d1 22 14 38 34 b6 27 71 27 9c 01 37 0140: ac a6 37 34 39 0f 29 17 7c 65 a4 38 6c 0a 59 11 0150: 33 5d 1c 44 cd 7e 2c 4c 6a 4d 42 7d b2 03 2a df 0160: ea d4 14 19 74 9d fe 6e 13 15 b1 8d 48 d2 a9 68 0170: c3 d0 c0 d3 eb 76 ea 56 7c 38 68 3c 83 b7 e2 83 Key Manifest Size: 0x355 ## DEBUG (PrintKmKeyHash) ## Hash Ctx Size: 240 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 # FYI: KM Public Key Hash Digest (Modulus+Exponent)# 49 76 2f 03 89 dc 21 0f a4 f4 cf 55 73 15 57 9c f0 eb a6 13 8e c1 b1 b4 cf ad c2 80 16 5d 76 26 ed 36 e9 a7 b9 3a b5 6b b2 81 26 9b 2d 3a 0d be # FYI: KM Public Key Hash Digest (Modulus Only)# ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG (CreateHash) size=48 0000: cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 0010: 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 0020: 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 cc ac 30 e0 f3 ae 70 be ef 68 e3 45 e8 d8 40 59 37 46 b1 e6 bb 5a bc 7b a3 65 0b 8f ff 03 1c 55 09 66 8a 42 91 c2 f7 1b ab e8 3e a8 22 3a df 50 Updating BIOS Image with new BPM(BPM Size=0x439) ## DEBUG (UpdateBIOS) Updating BIOS with new KM (/home/sadashiva/SBL/Stitching/Temp/KeyManifest.bin) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) ## FitTableFlashAddr: fffdf2c0 ## DEBUG (GetKmSize) Version 2.x RSA sigend KM Updating FIT KM size to 0x355 (853) 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 49 updating FIT Checksum 0000: 5f 46 49 54 5f 20 20 20 08 00 00 00 00 01 80 be Final FIT table ############## # FIT Table: # ############## FIT Pointer Offset: 0x40 FIT Table Address: 0xfffdf2c0 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) 00: 2020205f5449465f 000008 0100 00-'_FIT_ ' 01 be 01: 00000000ff9be000 000000 0100 01-MICROCODE 00 00 02: 00000000fffa0000 000000 0100 02-STARTUP_ACM 00 00 03: 00000000fffdf340 0020cc 0100 07-BIOS_MODULE 00 00 04: 00000000fffd8000 00072c 0100 07-BIOS_MODULE 00 00 05: 00000000ffa80000 012000 0100 07-BIOS_MODULE 00 00 06: 00000000fffd7600 000355 0100 0b-KEYMANIFEST 00 00 07: 00000000fffd7a00 000439 0100 0c-BP_MANIFEST 00 00 ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Index: Address Size Version Type C_V Checksum (Index Data Width Bit Offset) ====== ================ ====== ======== ============== ==== ======== (====== ==== ====== ==== ======) Verifying BPM and KM ## DEBUG (VerifyBpm) start ## FitTableFlashAddr: fffdf2c0 Start Bpm Verification... Bpm Verification...TempBuf: fbdc7a00 Bpm Verification...BpmVersion: 0x21 HdrStructVersion: 0x20 Bpm Verification1...IbbElement: fbdc7a14 0 0 0 0 Bpm Verification2...TempBuf: fbdc7a14 fbdc7a14 0 0 0 0 Bpm Verification3...IbbElement: fbdc7a14 IbbEntry: 40 pHashList: 44 Digest: 48 pObbHash: dc pSegmentCount: e3 SegCount: 3 Checking Digest for IBB Set Type:: 00 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 ## DEBUG - IBB Segment [0] 0xFFA80000 [0xFB870000 = 0xFFA90EE0 - 001200DC] 0x120000 ## DEBUG - IBB Segment [1] 0xFFFD8000 [0xFBDC8000 = 0x00000000 - 000072BC] 0x72C0 ## DEBUG - IBB Segment [2] 0xFFFDF340 [0xFBDCF340 = 0xFFFFFFFF - 00020DBB] 0x20CC0 --PASS: IBB Set Digest Verification Checking BPM signature ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 07cd3c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 4d 3d b0 31 70 0f 65 13 ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3510 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3510 size: 823 ##-- pData: fbdc7b32 ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: fbdc7b2e @@ -- Free 0x07cd3510 @@ -- Free 0x07cd34c0 ##-- Created RSA PubKey Context @0x 7CD3C10 size: 2087 @@ malloc 07cd4440 ## DEBUG (GetIppHashAlgID)- Alg: 0xC ## -- SHA384 is 5 @@ -- Free 0x07cd3c10 @@ -- Free 0x07cd4440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process --Verify Bpm - PASS Start Key Manifest Verification... ## FitTableFlashAddr: fffdf2c0 ## DEBUG (VerifyKeyManifest) -Verify BP Keyhash ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 ## DEBUG (CreateHash) size=32 0000: 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0d a0 41 2e 0010: bf 5a 54 68 77 b9 5c 22 fb a4 ba ef d6 07 26 7f --PASS: BPM KeyHash Digest Verification ## DEBUG (VerifyKmSignature) - start KeyManifest Signature Verification... 0000: 5f 5f 4b 45 59 4d 5f 5f 21 00 00 00 44 00 00 00 0010: 00 01 00 01 0c 00 01 00 01 00 00 00 00 00 00 00 0020: 0b 00 20 00 8f 28 da 88 46 56 a4 e9 79 3f da 6c 0030: 0d a0 41 2e bf 5a 54 68 77 b9 5c 22 fb a4 ba ef 0040: d6 07 26 7f KM addr: fbdc7600, KmSig Addr: fbdc7644 0000: 10 01 00 10 00 0c 01 00 01 00 75 2a f2 18 e9 5d 0010: 82 6f 2d 9d f7 b5 b8 b5 a1 5f 19 eb c6 00 08 1a 0020: fe b1 3b 34 c6 26 7d 77 06 6f a3 40 71 8e 3f 00 0030: 80 e1 a2 d7 1b 1d b2 9f 2d 74 a0 35 e9 c5 a0 44 0040: 23 29 6d 5a c5 a8 60 17 53 48 ea 79 6e b3 f4 18 0050: 27 af 8e bf 67 e6 8a 55 e6 bd 98 bb e4 dc 49 1b 0060: fd 82 71 5b a5 bf 9c 55 69 3d 7f 00 c0 3c 86 85 0070: 40 9b 4d b2 ba 27 fb 26 51 45 3f 65 b7 f9 7b 79 0080: 3a 3a 46 a9 43 41 fb fe 6b 4e f6 53 ad 14 e1 e1 0090: d6 f4 eb 46 b3 b0 37 59 36 90 69 f6 84 82 8c 05 00a0: 29 88 fe d8 1a 2a 5a 38 39 52 d0 7f 30 18 e8 08 00b0: aa c0 f7 aa 65 ee 0a 59 4b e4 9a 08 40 eb 57 39 00c0: f1 dd ea d9 94 d1 10 de cd 12 ab 18 7e 6d 67 f5 00d0: ae da db 0a dc 1b 40 b1 7e d9 dd ac ba 44 3b d3 00e0: 7d ee 54 34 79 54 1e 82 b0 8b 01 30 0d 62 cd 7b 00f0: 29 c5 57 fa ec 3c 5c 53 e7 60 31 38 c2 13 d0 5e 0100: cd 36 ae df 61 ee c6 65 84 4c 1a f9 b6 23 ca 54 0110: 11 2e dc 90 06 2a 72 b8 fe 2e fa 5f 61 b2 fb af 0120: c4 30 23 50 f9 c9 31 8c 53 a7 1d a2 22 f9 d4 e6 0130: db 72 c0 28 d4 1d 99 20 cd cf 06 d6 fb 5e 80 c7 0140: e4 46 6c a6 ff dd ed cb 44 80 d4 23 e4 41 e7 d3 0150: 83 28 54 a4 5b bf 1c 90 02 44 b8 74 ba 83 49 d3 0160: 35 13 e0 7f c7 a7 3a 59 d6 c8 a3 9c 27 36 2c e1 0170: d4 03 30 37 da 43 b9 09 02 a1 96 28 ad 8f 74 48 0180: 52 05 39 3c 7f 61 db 26 bb d8 16 00 10 00 0c 0b 0190: 00 7f 01 cf 9c f0 a9 db 4e 02 18 4b 17 e2 af 1c 01a0: 9c 7f 9b de 6b 3a 09 0e 94 fd a4 7e 0f af 85 65 01b0: 86 fe ff 70 0f 7b 45 06 21 4a 0d 19 64 7c 2d bd 01c0: 19 4a 82 0e 1c fe 83 e6 f1 0b b7 d6 d2 82 ed 12 01d0: af b7 ee 53 c6 45 9f c6 bc d9 42 26 36 c2 bf 45 01e0: ad 81 65 0a b8 97 c6 55 fd 9b 23 53 93 70 06 b6 01f0: 93 bd 7e 5c 63 d5 c9 e3 44 83 4d 63 26 f6 55 61 0200: 86 b8 ed b5 13 07 5b 1d 8c 7e 52 a6 75 08 3a 19 0210: 93 ## DEBUG (VerifyRsaSignatureIpp) - 0 ## Creating RSA PubKey Context - KeyLength: 3072 (exp: 0x00010001) @@ malloc 07cd3c10 ##-- Setting Modulus and Exponent (0x00010001) 0000: 75 2a f2 18 e9 5d 82 6f ## Creating BigNumber Context - NumBytes: 384 @@ malloc 07cd3510 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD3510 size: 823 ##-- pData: fbdc764e ## Creating BigNumber Context - NumBytes: 4 @@ malloc 07cd34c0 ##-- BigNumInit ##-- Created BigNumber Context @0x 7CD34C0 size: 71 ##-- pData: fbdc764a @@ -- Free 0x07cd3510 @@ -- Free 0x07cd34c0 ##-- Created RSA PubKey Context @0x 7CD3C10 size: 2087 @@ malloc 07cd4440 ## DEBUG (GetIppHashAlgID)- Alg: 0xB ## --SHA256 is 2 @@ -- Free 0x07cd3c10 @@ -- Free 0x07cd4440 --PASS: Manifest RSA Signature Valid ## DEBUG (VerifyRsaSignatureIpp) - End of process ## DEBUG (VerifyKmSignature) - end of proceedure --Verify Key Manifest - PASS **** Writing BIOS Image to file (/home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin) **** ## DEBUG (WriteOutputFile) start Filename: /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin, BufAddress: fb0f0000, Size 0xd00000 ## DEBUG (WriteOutputFile) opened Writing to /home/sadashiva/SBL/Stitching/Temp/sbl_sec.bin (0xd00000 bytes) ## DEBUG (WriteOutputFile) written ## DEBUG (WriteOutputFile) end @@ -- Free (BootPolicyManifest) 0x07cd2890 @@ -- Free (KeyManifest) 0x07cd38a0 @@ -- Free (FileBufferRaw) 0xfb0ef010 ###################################### # BPM / BIOS generated successfully! # ###################################### ## DEBUG (BpmGenMain) - end (Status: 0) writing RSA key Swap to original top swap block.... Swapping Top Swap Blocks.... Generate Oem Key Manifest.... Generate and sigm OemKeyManifest binary.... =============================================================================== Intel(R) Manifest Extension Utility. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:35 am =============================================================================== Command Line: /home/sadashiva/SBL/Stitching/Meu/meu -gen meu_config -save /home/sadashiva/SBL/Stitching/Temp/meu_config.xml Log file written to /home/sadashiva/SBL/Stitching/meu.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/meu_config.xml Program terminated. ------------------- =============================================================================== Intel(R) Manifest Extension Utility. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:36 am =============================================================================== Command Line: /home/sadashiva/SBL/Stitching/Meu/meu -gen OEMKeyManifest -save /home/sadashiva/SBL/Stitching/Temp/oemkeymanifest_sample_config.xml Log file written to /home/sadashiva/SBL/Stitching/meu.log Saving XML ... XML file written to /home/sadashiva/SBL/Stitching/Temp/oemkeymanifest_sample_config.xml Program terminated. ------------------- =============================================================================== Intel(R) Manifest Extension Utility. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:37 am =============================================================================== Command Line: /home/sadashiva/SBL/Stitching/Meu/meu -f /home/sadashiva/SBL/Stitching/Temp/oemkeymanifest_sample_config.xml -o /home/sadashiva/SBL/Stitching/Temp/OemExtInputFile.bin -key /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem -cfg /home/sadashiva/SBL/Stitching/Temp/meu_config.xml -stp /usr/bin/openssl Log file written to /home/sadashiva/SBL/Stitching/meu.log Loading XML file: /home/sadashiva/SBL/Stitching/Temp/meu_config.xml Loading XML file: /home/sadashiva/SBL/Stitching/Temp/oemkeymanifest_sample_config.xml Calling signing tool to get key modulus size Signing Tool: OpenSSL 3.0.2 15 Mar 2022 (Library: OpenSSL 3.0.2 15 Mar 2022) Signing Tool Path: /usr/bin/openssl Key Path: /home/sadashiva/SBL/Stitching/BpmGen2/keys/oem_privkey_3072.pem Executing pre-build actions Building objects Processing attribute: OEMKeyManifest Executing post-build actions Calling signing tool to generate signature Verifying signature OEMKeyManifest binary written to /home/sadashiva/SBL/Stitching/Temp/OemExtInputFile.bin Program terminated. ------------------- Boot Guard is NOT enabled..... oemkeyhash: 49 76 2F 03 89 DC 21 0F A4 F4 CF 55 73 15 57 9C F0 EB A6 13 8E C1 B1 B4 CF AD C2 80 16 5D 76 26 ED 36 E9 A7 B9 3A B5 6B B2 81 26 9B 2D 3A 0D BE [INFO] TPM device type enabled for Measured Boot: ptt Run fit tool to generate ifwi......... QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root' =============================================================================== Intel (R) Flash Image Tool. Version: 15.40.30.2889 Copyright (c) 2013 - 2023, Intel Corporation. All rights reserved. 6/19/2024 - 11:19:38 am =============================================================================== Using vsccommn.bin with timestamp 18:40:42 01/18/2023 GMT Command Line: /home/sadashiva/SBL/Stitching/Fit/fit -b -o Temp/Ifwi.bin -f /home/sadashiva/SBL/Stitching/Temp/updated.xml -s /home/sadashiva/SBL/Stitching/Temp -w /home/sadashiva/SBL/Stitching/Temp -d /home/sadashiva/SBL/Stitching/Temp Log file written to /home/sadashiva/SBL/Stitching/Temp/fit.log Loading XML file: /home/sadashiva/SBL/Stitching/Temp/updated.xml Loading XML file: /home/sadashiva/SBL/Stitching/Temp/updated.xml Start Building Image Executing pre-build actions Warning: CSE FW version: 15.40.30.2879 is not the same as the FIT version: 15.40.30.2889 If pre-locking is not set, closemnf will revert back master access settings to 'golden master access settings'. To set master access post locking, use -CLOSEMNF command of the Intel(R) Flash Programming Tool (FPT). Committing ME configuration. Unable to set Platform Id in ME configuration. ME provided image does not have support for Platform Id configuration. Committing ME configuration. Building objects Processing attribute: BuildSettings Processing attribute: HarnessInfo Processing attribute: FlashLayout Processing attribute: FlashSettings Processing attribute: IntelMeKernel Processing attribute: PlatformProtection Processing attribute: Icc Processing attribute: NetworkingConnectivity Processing attribute: InternalPchBuses Processing attribute: Power Processing attribute: Debug Processing attribute: CpuStraps Processing attribute: IfwiBinaryLayout Processing attribute: StrapsDifferences Processing attribute: FlexIO Processing attribute: Gpio Processing attribute: Dnx Processing attribute: (Disabled) FWUpdateImage Executing post-build actions Full Flash Image written to /home/sadashiva/SBL/Stitching/Temp/Ifwi.bin Writing map file /home/sadashiva/SBL/Stitching/Temp/Ifwi.map Program terminated. ------------------- IFWI Stitching completed successfully ! Boot Guard Profile: LEGACY IFWI image: sbl_ifwi_ehl.bin sadashiva@SVR33U:~/SBL$