[{"id":3679183,"web_url":"http://patchwork.ozlabs.org/comment/3679183/","msgid":"<CAFLszThtrGC4KerPxM1jFtoycnbuYZYDvni6J+hsTF-Y=YONgQ@mail.gmail.com>","list_archive_url":null,"date":"2026-04-20T02:12:50","subject":"Re: [v4,00/14] add software ecdsa support","submitter":{"id":6170,"url":"http://patchwork.ozlabs.org/api/people/6170/","name":"Simon Glass","email":"sjg@chromium.org"},"content":"Hi Philippe,\n\nOn 2026-04-17T13:02:04, Philippe Reynes <philippe.reynes@softathome.com> wrote:\n\n> This serie adds the support of ecdsa with software using mbedtls.\n\nseries\n\n> ecdsa: fix support of secp521r1\n\nPatch 5 fixes secp521r1 support added in patches 1-4, suggesting the\ninitial implementation was incomplete. It would be cleaner to include\nfull secp521r1 support from the start in patches 2-4, making bisection\ncleaner and avoiding patches that claim ECDSA support but have broken\nsecp521r1.\n\nRegards,\nSimon","headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org header.a=rsa-sha256\n header.s=google header.b=oXLGPqn8;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)","phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org","phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de","phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org\n header.b=\"oXLGPqn8\";\n\tdkim-atps=neutral","phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org","phobos.denx.de;\n spf=pass smtp.mailfrom=sjg@chromium.org"],"Received":["from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzTYQ73Rqz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 12:13:30 +1000 (AEST)","from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 27A9F8419E;\n\tMon, 20 Apr 2026 04:13:28 +0200 (CEST)","by phobos.denx.de (Postfix, from userid 109)\n id 22B68842ED; Mon, 20 Apr 2026 04:13:27 +0200 (CEST)","from mail-pl1-x630.google.com (mail-pl1-x630.google.com\n [IPv6:2607:f8b0:4864:20::630])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 01DD484297\n for <u-boot@lists.denx.de>; Mon, 20 Apr 2026 04:13:25 +0200 (CEST)","by mail-pl1-x630.google.com with SMTP id\n d9443c01a7336-2b24fdac394so23764525ad.3\n for <u-boot@lists.denx.de>; Sun, 19 Apr 2026 19:13:24 -0700 (PDT)"],"X-Spam-Checker-Version":"SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2","ARC-Seal":"i=1; a=rsa-sha256; t=1776651203; cv=none;\n d=google.com; s=arc-20240605;\n b=i/hxJa9X/QeCOKAwiq7DSO0uevSDFb9c2jfuuG2g7LsPmCtANCfnsgobxJ0rqc+TG+\n 5l0fQwKjdWMpdqgX6ecFcwDv0cpWKXjzgvdbA+Hy7+BlsfLbAtYOc94mMPGkTwrHaIof\n ybWlPxF4OakaWwiZwouv0qUKy2fbcJKC/VGXGs46MKU6SqGCeCzThBuema1qul4JzLAp\n lRKwFm70Gj4X7EDCicH3yE4luBlD+S4LZ14JSWF66O24/WfPiE3ZNWAp/AHa20Lzd8ih\n m8W5r2zvRyleE8XMAKw/FUNJ9PItfvpANOJYFuM8/Xxpi2ILepNLwZkkxi/YyAfCtqYm\n JODg==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:dkim-signature;\n bh=GJePTvi5ZboAZzybOLsm8nqLucIGBjrnjzHzSqPf9kI=;\n fh=JdYuey8wYmmx/AtEosXUVTN8d8L/5S4NrdlkDKNw/io=;\n b=WqcfojoEkkTKx+KS5ylx9BSK3OKRjPVtmQ0AohuCW9j/moN7qtJhnOk4ck3FnGi9ZB\n J0GXt5huFVkfyybxdvyO3BWZHFp9fA7qGWnAJQarIC12dDXlfkrlNpwyGbShkoMM6VVI\n VVUvvOtgO3dB6+fD0E9Ee1t6wIIyhgLxwJiQBXH3XDKGxfNlgQ9t9lD2b6quEyIm3ruF\n 654dPcMMPh1jhMvSp6BloJY+51XOIpfADv7/F3n4QH08q9QpIdvvgN9d3PqCh/6x4lKS\n vnPWN8eMLWhEGf7gaYmrzR2oTmziq9udArp5p1zNinMw4/KuiAipXjSbwjyMZpSaOB5q\n 15Ew==; darn=lists.denx.de","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=chromium.org; s=google; t=1776651203; x=1777256003; darn=lists.denx.de;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:from:to:cc:subject:date:message-id:reply-to;\n bh=GJePTvi5ZboAZzybOLsm8nqLucIGBjrnjzHzSqPf9kI=;\n b=oXLGPqn8ey5EGs43y6vvuSe3HAfFggMzj862Zc5X7qDxvc4Ovjet+HMCazDhzykxSQ\n lATjNlYwYmKQc+a05YsxSo4OiZVgPw+9kj5JSLmRBmAssAl2ugDP1zuWpRbbHiXEWSEz\n tXkT0gMIuQ4Xe0c5Baf4PLh8wa6i6A1DK5CJU=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776651203; x=1777256003;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=GJePTvi5ZboAZzybOLsm8nqLucIGBjrnjzHzSqPf9kI=;\n b=ZcKwIBRZO+XtJE+Y0nAQT1bONVmi0F5dMoR0t/+DodCxwicgQflI0jR/pfUrXExFF8\n FnX1neEX9x1KBEHAghGq4tzFjwqngLNh3k8kWCu4/c+Ia0euYH1VhGJ+ZR81sge9h6t9\n i3r1GR5TKdceQ+cp3k7q96vICR9w3U1UVTeGr4POhs9RDEK8kFY+nevtSVObyWlS1NHO\n nRP2rgKFCf2SZIa4CjwpCoFIiWJXwlV4NSQ7k+9GmA6Da2siHn3LqtqT5/XCQvSKQpKR\n ilK1ZChwaTJW5HwDxLsa8EoqrfgvKr2IGtOD8e6BlC7UJl9l92VooWkqNb66roOMfAfF\n vluA==","X-Gm-Message-State":"AOJu0Yz/Lu17t9odbMeETxTVWTzBNElzszieyuNQBsfsanip6+SIRU9O\n 9yiz29E/0Up2gAXPmntHh9/wcVnU1zPOOFpoRnHcWlIeBU5Wkzmuu4SDjJD8f2s3S5cAtVT8jb/\n DxV+frOe7fNDJrf1+zDMRoyYBIj9uBdI2Ie3kCp0SImpH2w6DbrbDMQ==","X-Gm-Gg":"AeBDiesM5l5sG+Hth2Tuu9csbNwCyAlpMfL8+jvjSIXLM0cVi9YnRBFf3NwBkiwVARX\n xgGmoM9wFsYR2Hv0HoCuVjQdMhfy+3MD3el4wU+MQe2+68Q/SUx86nWbhEA8zpmHmKF6ByfK++3\n M3DF8i/N86MQWZLeHXNbOphsnYUSvjMqKd9lf+ZcM8cJBzR5TNz/CiPG3xFk6jIHii5AKFfY/J6\n sDO6oiyIHuDS6e2gGs0RlJe/zU2kVK/F8iI7LB+ZS8/bnnL0o9zVZkoO2KKl/0SRhjC2Eare2B+\n jDug1oJORvJoq9VbPT07ktdueJq1o2Y=","X-Received":"by 2002:a17:902:e746:b0:2b2:42da:25c4 with SMTP id\n d9443c01a7336-2b5f9ef6877mr139861405ad.14.1776651203482; Sun, 19 Apr 2026\n 19:13:23 -0700 (PDT)","MIME-Version":"1.0","References":"<20260417130204.49896-1-philippe.reynes@softathome.com>","In-Reply-To":"<20260417130204.49896-1-philippe.reynes@softathome.com>","From":"Simon Glass <sjg@chromium.org>","Date":"Mon, 20 Apr 2026 14:12:50 +1200","X-Gm-Features":"AQROBzDakq2nArwXfYl-yY_GJEz9fZyw2J9nDXBRURqr10VypoCGtOXse23xXzY","Message-ID":"\n <CAFLszThtrGC4KerPxM1jFtoycnbuYZYDvni6J+hsTF-Y=YONgQ@mail.gmail.com>","Subject":"Re: [v4,00/14] add software ecdsa support","To":"philippe.reynes@softathome.com","Cc":"u-boot@lists.denx.de","Content-Type":"text/plain; charset=\"UTF-8\"","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.39","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<https://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>","X-Virus-Scanned":"clamav-milter 0.103.8 at phobos.denx.de","X-Virus-Status":"Clean"}},{"id":3679489,"web_url":"http://patchwork.ozlabs.org/comment/3679489/","msgid":"<CAMDkj5y2tqyx2ZXbsup_OqcTG36L0g+PSE_90W0zUxBuKAH4pQ@mail.gmail.com>","list_archive_url":null,"date":"2026-04-20T17:13:14","subject":"Re: [PATCH v4 00/14] add software ecdsa support","submitter":{"id":91989,"url":"http://patchwork.ozlabs.org/api/people/91989/","name":"Raymond Mao","email":"raymondmaoca@gmail.com"},"content":"Hi Philippe,\n\nOn Fri, Apr 17, 2026 at 9:02 AM Philippe Reynes\n<philippe.reynes@softathome.com> wrote:\n>\n> This serie adds the support of ecdsa with software\n> using mbedtls. So boards without ecdsa hardware may\n> also use signature with ecdsa.\n>\n> To add the support of ecdsa with mbedtls, I have:\n> - enabled ecdsa in mbedtls\n> - add a function sw_ecdsa_verify that uses mbedtls\n> - add a driver sw_ecdsa that call sw_ecdsa_verify\n>\n> I have tested this code with sandbox, and I have\n> followed those steps:\n>\n> 0) build u-boot using sandbox_defconfig and adding those options:\n> CONFIG_ECDSA_SW=y\n\nI think this kconfig is already removed from v4, please double check.\n\nRegards,\nRaymond\n\n> CONFIG_ECDSA_MBEDTLS=y\n> CONFIG_ECDSA=y\n> CONFIG_ECDSA_VERIFY=y\n>\n> 1) add a signature node to an its file\n>         signature-256 {\n>                 algo = \"sha256,ecdsa256\";\n>                 key-name-hint = \"private-key-256\";\n>         };\n>\n> 2) generate an ecdsa key\n> openssl ecparam -name prime256v1 -genkey -noout -out private-key-256.pem\n>\n> 3) create the itb file\n> ./tools/mkimage -f <file.its> -k . -K arch/sandbox/dts/test.dtb <file.itb>\n>\n> 4) launch sandbox u-boot\n>\n> ./u-boot -d arch/sandbox/dts/test.dtb\n>\n> 5) on sandbox u-boot prompt, load the itb and launch bootm on it\n>\n> => host load hostfs - 1000000 uboot-ecdsa.itb\n> 4628674 bytes read in 1 ms (4.3 GiB/s)\n> => bootm 1000000\n> ...\n> ...\n>    Verifying Hash Integrity ... sha256,ecdsa256:private-key-256+ OK\n>\n>\n> I have tested with success ecdsa256 and ecdsa384,\n> but there is an issue with secp521r1.\n>\n> Changes in v2:\n> - move ECDSA_MBEDTLS to MBEDTLS_LIB_X509\n> - rename lib/mbedtls/sw_ecdsa.c to lib/mbedtls/ecdsa.c\n> - enhance dependancies for ECDSA_MBEDTLS\n> - fix support of ecdsa521/secp521r1\n> - add vboot test using ecdsa\n>\n> Changes in v3:\n> - do not use _MBEDTLS in mbedtls_def_config.h\n> - check returns and remove mem leak in lib/mbedtls/ecdsa.c\n> - remove useless field  *k in struct ecdsa_test_vector_s\n> - check returns in test/lib/ecdsa.c\n> - fix third parameter when calling sha*_csum_wd()\n> - add support of ecdsa in pre-load header\n>\n> Changes in v4:\n> - change some dependencies to enable ecc\n> - use ECDSA_MBEDTLS to build the ecdsa driver\n> - support ecdsa521 and secp521r1\n> - add a test calling ecdsa_verify for the ecdsa class\n> - merge patch 10 and 11 (support ecdsa pre-load for binman and tests)\n> - several code cleanup\n>\n>\n> Philippe Reynes (14):\n>   mbedtls: enable support of ecc\n>   ecdsa: initial support of ecdsa using mbedtls\n>   test: lib: ecdsa: add initial test\n>   drivers: crypto: add software ecdsa support\n>   ecdsa: fix support of secp521r1\n>   test: dm: ecdsa.c: clean this test as software ecdsa is now\n>     implemented\n>   test: py: vboot: prepare integration test for ecdsa\n>   test: vboot: add test for ecdsa\n>   tools: mkimage: pre-load: add support of ecdsa\n>   tools: binman: pre-load: add support of ecdsa\n>   boot: pre-load: add support of ecdsa\n>   tools: preload_check_sign: add support of ecdsa\n>   test: py: vboot: prepare test for global signature with ecdsa\n>   test: py: vboot: add test for global signature with ecdsa\n>\n>  boot/image-pre-load.c                         |  56 ++-\n>  configs/sandbox_defconfig                     |   1 +\n>  drivers/crypto/Makefile                       |   1 +\n>  drivers/crypto/ecdsa/Makefile                 |   6 +\n>  drivers/crypto/ecdsa/ecdsa-sw.c               |  33 ++\n>  include/crypto/ecdsa-uclass.h                 |  15 +-\n>  include/crypto/internal/ecdsa.h               |  28 ++\n>  include/u-boot/sha256.h                       |   2 +\n>  include/u-boot/sha512.h                       |   3 +\n>  lib/ecdsa/Kconfig                             |   1 +\n>  lib/ecdsa/ecdsa-libcrypto.c                   |  83 +++-\n>  lib/ecdsa/ecdsa-verify.c                      |  64 ++-\n>  lib/fdt-libcrypto.c                           |   2 +-\n>  lib/mbedtls/Kconfig                           |  14 +\n>  lib/mbedtls/Makefile                          |  20 +-\n>  lib/mbedtls/ecdsa.c                           | 146 ++++++\n>  lib/mbedtls/mbedtls_def_config.h              |  17 +\n>  test/dm/ecdsa.c                               | 104 +++-\n>  test/lib/Makefile                             |   1 +\n>  test/lib/ecdsa.c                              | 453 ++++++++++++++++++\n>  test/py/tests/test_fit_ecdsa.py               |   2 +-\n>  test/py/tests/test_vboot.py                   | 143 +++---\n>  .../tests/vboot/sandbox-binman-ecdsa256.dts   |  24 +\n>  .../tests/vboot/sandbox-binman-ecdsa384.dts   |  24 +\n>  .../tests/vboot/sandbox-binman-ecdsa521.dts   |  24 +\n>  ...pss.dts => sandbox-binman-rsa2048-pss.dts} |   0\n>  ...-binman.dts => sandbox-binman-rsa2048.dts} |   0\n>  .../vboot/sandbox-u-boot-global-ecdsa256.dts  |  27 ++\n>  .../vboot/sandbox-u-boot-global-ecdsa384.dts  |  27 ++\n>  .../vboot/sandbox-u-boot-global-ecdsa521.dts  |  27 ++\n>  ... => sandbox-u-boot-global-rsa2048-pss.dts} |   0\n>  ....dts => sandbox-u-boot-global-rsa2048.dts} |   0\n>  ....its => sign-configs-sha1-rsa2048-pss.its} |   0\n>  ...sha1.its => sign-configs-sha1-rsa2048.its} |   0\n>  .../vboot/sign-configs-sha256-ecdsa256.its    |  45 ++\n>  .../vboot/sign-configs-sha256-ecdsa384.its    |  45 ++\n>  .../vboot/sign-configs-sha256-ecdsa521.its    |  45 ++\n>  ... sign-configs-sha256-rsa2048-pss-prod.its} |   0\n>  ...ts => sign-configs-sha256-rsa2048-pss.its} |   0\n>  ...56.its => sign-configs-sha256-rsa2048.its} |   0\n>  ...84.its => sign-configs-sha384-rsa3072.its} |   0\n>  ...s.its => sign-images-sha1-rsa2048-pss.its} |   0\n>  ...-sha1.its => sign-images-sha1-rsa2048.its} |   0\n>  .../vboot/sign-images-sha256-ecdsa256.its     |  42 ++\n>  .../vboot/sign-images-sha256-ecdsa384.its     |  42 ++\n>  .../vboot/sign-images-sha256-ecdsa521.its     |  42 ++\n>  ...its => sign-images-sha256-rsa2048-pss.its} |   0\n>  ...256.its => sign-images-sha256-rsa2048.its} |   0\n>  ...384.its => sign-images-sha384-rsa3072.its} |   0\n>  tools/binman/etype/pre_load.py                |  76 ++-\n>  tools/binman/ftest.py                         |  50 ++\n>  tools/binman/test/ecdsa521.pem                |   7 +\n>  tools/binman/test/security/pre_load_ecdsa.dts |  22 +\n>  .../security/pre_load_ecdsa_invalid_algo.dts  |  22 +\n>  .../security/pre_load_ecdsa_invalid_key.dts   |  22 +\n>  .../security/pre_load_ecdsa_invalid_sha.dts   |  22 +\n>  tools/image-host.c                            |  79 ++-\n>  tools/image-sig-host.c                        |   7 +\n>  tools/preload_check_sign.c                    |  29 ++\n>  59 files changed, 1810 insertions(+), 135 deletions(-)\n>  create mode 100644 drivers/crypto/ecdsa/Makefile\n>  create mode 100644 drivers/crypto/ecdsa/ecdsa-sw.c\n>  create mode 100644 include/crypto/internal/ecdsa.h\n>  create mode 100644 lib/mbedtls/ecdsa.c\n>  create mode 100644 test/lib/ecdsa.c\n>  create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa256.dts\n>  create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa384.dts\n>  create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa521.dts\n>  rename test/py/tests/vboot/{sandbox-binman-pss.dts => sandbox-binman-rsa2048-pss.dts} (100%)\n>  rename test/py/tests/vboot/{sandbox-binman.dts => sandbox-binman-rsa2048.dts} (100%)\n>  create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa256.dts\n>  create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa384.dts\n>  create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa521.dts\n>  rename test/py/tests/vboot/{sandbox-u-boot-global-pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} (100%)\n>  rename test/py/tests/vboot/{sandbox-u-boot-global.dts => sandbox-u-boot-global-rsa2048.dts} (100%)\n>  rename test/py/tests/vboot/{sign-configs-sha1-pss.its => sign-configs-sha1-rsa2048-pss.its} (100%)\n>  rename test/py/tests/vboot/{sign-configs-sha1.its => sign-configs-sha1-rsa2048.its} (100%)\n>  create mode 100644 test/py/tests/vboot/sign-configs-sha256-ecdsa256.its\n>  create mode 100644 test/py/tests/vboot/sign-configs-sha256-ecdsa384.its\n>  create mode 100644 test/py/tests/vboot/sign-configs-sha256-ecdsa521.its\n>  rename test/py/tests/vboot/{sign-configs-sha256-pss-prod.its => sign-configs-sha256-rsa2048-pss-prod.its} (100%)\n>  rename test/py/tests/vboot/{sign-configs-sha256-pss.its => sign-configs-sha256-rsa2048-pss.its} (100%)\n>  rename test/py/tests/vboot/{sign-configs-sha256.its => sign-configs-sha256-rsa2048.its} (100%)\n>  rename test/py/tests/vboot/{sign-configs-sha384.its => sign-configs-sha384-rsa3072.its} (100%)\n>  rename test/py/tests/vboot/{sign-images-sha1-pss.its => sign-images-sha1-rsa2048-pss.its} (100%)\n>  rename test/py/tests/vboot/{sign-images-sha1.its => sign-images-sha1-rsa2048.its} (100%)\n>  create mode 100644 test/py/tests/vboot/sign-images-sha256-ecdsa256.its\n>  create mode 100644 test/py/tests/vboot/sign-images-sha256-ecdsa384.its\n>  create mode 100644 test/py/tests/vboot/sign-images-sha256-ecdsa521.its\n>  rename test/py/tests/vboot/{sign-images-sha256-pss.its => sign-images-sha256-rsa2048-pss.its} (100%)\n>  rename test/py/tests/vboot/{sign-images-sha256.its => sign-images-sha256-rsa2048.its} (100%)\n>  rename test/py/tests/vboot/{sign-images-sha384.its => sign-images-sha384-rsa3072.its} (100%)\n>  create mode 100644 tools/binman/test/ecdsa521.pem\n>  create mode 100644 tools/binman/test/security/pre_load_ecdsa.dts\n>  create mode 100644 tools/binman/test/security/pre_load_ecdsa_invalid_algo.dts\n>  create mode 100644 tools/binman/test/security/pre_load_ecdsa_invalid_key.dts\n>  create mode 100644 tools/binman/test/security/pre_load_ecdsa_invalid_sha.dts\n>\n> --\n> 2.43.0\n>","headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=lQ+YVRxj;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=85.214.62.61; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)","phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=gmail.com","phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de","phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.b=\"lQ+YVRxj\";\n\tdkim-atps=neutral","phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=gmail.com","phobos.denx.de;\n spf=pass smtp.mailfrom=raymondmaoca@gmail.com"],"Received":["from phobos.denx.de (phobos.denx.de [85.214.62.61])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzsWx0L5jz1yD4\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 03:13:33 +1000 (AEST)","from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 60997842E1;\n\tMon, 20 Apr 2026 19:13:30 +0200 (CEST)","by phobos.denx.de (Postfix, from userid 109)\n id 488E18430F; Mon, 20 Apr 2026 19:13:29 +0200 (CEST)","from mail-vs1-xe31.google.com (mail-vs1-xe31.google.com\n [IPv6:2607:f8b0:4864:20::e31])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EFB048419E\n for <u-boot@lists.denx.de>; Mon, 20 Apr 2026 19:13:26 +0200 (CEST)","by mail-vs1-xe31.google.com with SMTP id\n ada2fe7eead31-6102bac3752so2527895137.3\n for <u-boot@lists.denx.de>; Mon, 20 Apr 2026 10:13:26 -0700 (PDT)"],"X-Spam-Checker-Version":"SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-1.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_GMAIL_RCVD,FREEMAIL_FROM,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=no\n autolearn_force=no version=3.4.2","ARC-Seal":"i=1; a=rsa-sha256; t=1776705206; cv=none;\n d=google.com; s=arc-20240605;\n b=Khh9AMdWmwGgJjQXeqGDiGYlW+gt5Cuni6BaNfGLhl2OxurbT9i3nWWHxJgyLwGkvl\n ooPiS5pKx1e145LSlUF9Wbax1v66DK3UmnmsCYICAPhfbjKFQVpAS2Pzd4SfvBqBZHf6\n PR1kXAXpr4DQrJcxXitcq97x7SchZurkuk/rHHDdtQIXDX6ORWdswuWGbuT1/ehLC1ZR\n 1LDt4M0/+ubqNHVoTybyivd/hEOx6+xmsfvXMSrbxqe8qm1F3m+THEvCooN1+hYkaT/i\n eS4QUjYxtPsNo0NtcSRsTI4b+CNLQEd4NoAs/v8q1SMLQbjY30TuMiZyd5o3Cd3zy21V\n KhYg==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:dkim-signature;\n bh=ZqoGMDwSX7LaU0i6wEkhP48iZgpKySb1iU5CihQtDH8=;\n fh=ZQCni4AQQQR19bbjvDTjIK+Rh6IKTeCpbTQI3cSQZYU=;\n b=lnHJOubvKHvEb13zEHZ3Gc56WHoQk6qyM9M9dKIiviWVRlX93oYSV/PHvwOMvBu2rg\n zj0VmmOrjI3Ynjq2dyieK7xYcYrE1R2welOmfleuj3EJR1NYHJukqwB69YEWuzX7OZCV\n Kq1yFlgHHOmSK6pZjrM6/NkSaXLVBLFwGu0RDKlbgc6iFcMr5Le2ftTSBjAeNrsxYGSy\n mOyTOWLPUBpRnlGVBh7fybtE5uYewlq4naR0kxrgbpb7/EcH7bK6y6tFJg8lvBQxQeAA\n 8Tm6d1T6VVqE8FZVJkhLXJNUclALwmN2JZVM0N6zbXBfZYryrb2suSbBJpJd/9vyb9Qt\n /SPg==; darn=lists.denx.de","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1776705206; x=1777310006; darn=lists.denx.de;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:from:to:cc:subject:date\n :message-id:reply-to;\n bh=ZqoGMDwSX7LaU0i6wEkhP48iZgpKySb1iU5CihQtDH8=;\n b=lQ+YVRxjdmidh2VuMFIyXjLa9DkO4KvJ1AsHBNr1mOIf1QACaVxrD0DgMHjsilHqaD\n ruiu3tTpD8b/GkgMU24uoOQMv6MpinNRxmpuTtSQ+j1KS1auQfjEIfbJeExfG56EmEMo\n XQ6aMs5nXUxjadeOCmlWG5iXyBG8dzvFzTBd4zECNnxV2PYd130CTlXEk7XMgEvEEEXm\n B/Gynylydt31e+11vnv1S1db8bTCCCFqaiTlmNAOeOTQuTvShtaaTTkCpgAby3YZWPe7\n cbMYvl8pwXpTEn5K7XZ/sqR3drY1yZv9XrL3dQ617fSWHvpjx0s2UJMezQD7P+2LhDxH\n Q/PA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776705206; x=1777310006;\n h=content-transfer-encoding:cc:to:subject:message-id:date:from\n :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=ZqoGMDwSX7LaU0i6wEkhP48iZgpKySb1iU5CihQtDH8=;\n b=Pyup1sd4vDeHebxaFpjz6WanYh3yl/aJDinBTzk6GG4D+zqSe52ULp7LXWrJbUXiJp\n krdIjJPF8BIkTidJotKAY2e584x89jGg6sG8pGbcLl5M+u3lzcoU4IX8NTp26gGoVvC0\n u8b5w/b/UrmLcwTyHGPyjNjT6oypT3JO29zF7Bs+3KVyItmzYim0e/vFJPgajfbuVjoa\n RqdJxyITb0rPDlwQJf1o3/ShI/UN/zsca/eRI2qAHW01gZ6mNuZvTgfp8wAndVTiEI1a\n yCHrZN2gTofmLnG4uOql/y9VsSXbYupqoOCLhZ7CVM9XklW5slvcK6Mq6x0g4+zD8rRg\n EWag==","X-Forwarded-Encrypted":"i=1;\n AFNElJ/f66qJvsLgSk9Cgow4SBHxvyV2PGk9bkb8PFHM+TFbPd/lf/865cGLXL8lJsYnl7kufX8WCEE=@lists.denx.de","X-Gm-Message-State":"AOJu0YzdPiUa9lWa0Cl8xCLXKXTuYTe/J5jZmDWIE7I5y9WnDJ2ym8z4\n pn2tgmebrjB2pL307bcmZX/WMnpY4RmsK/74GJqh6b5gIDa11FHEGCCjUttufljYCiz7bvvfyam\n Bop0H2p+41HXDPfqziiOf3A9czsv8Wo0=","X-Gm-Gg":"AeBDiesxz4QeL4oSbsq7HC3SnyEMr+KoxmeQ2djz5VKnWBleNSTMpMLLef44HSurXMD\n 2yxtZeo6koJik/5rYvIT4m2TF7pr6vRwwex+XUUUI8DsLInn/pn9YSWIL64s7UpkgojUCHk3cmt\n Y4PTZJvdzfyOKwBIiE4uQqSCuN5xSDM88WgbdEtFX/N8UXSHQgBm7Raq+JAxjA3EgDxoCRPVFqu\n 1xq2LYx6SYTkbHXgkBEq94JKRWSt69CtCiVt+l0gO0XsLhWZEtb3AgFzCiIjzj367mc2TPuE+Xj\n FPc684DDWtasSWJfS/g=","X-Received":"by 2002:a05:6102:2c0c:b0:612:13af:f5e9 with SMTP id\n ada2fe7eead31-616f7945bafmr7341905137.29.1776705205650; Mon, 20 Apr 2026\n 10:13:25 -0700 (PDT)","MIME-Version":"1.0","References":"<20260417130204.49896-1-philippe.reynes@softathome.com>","In-Reply-To":"<20260417130204.49896-1-philippe.reynes@softathome.com>","From":"Raymond Mao <raymondmaoca@gmail.com>","Date":"Mon, 20 Apr 2026 13:13:14 -0400","X-Gm-Features":"AQROBzBVUd_2I-ZB0cOalW74VDgUdwWhJtzeq_-u6NLMuN0K9iGQBHJt6IVOtVU","Message-ID":"\n <CAMDkj5y2tqyx2ZXbsup_OqcTG36L0g+PSE_90W0zUxBuKAH4pQ@mail.gmail.com>","Subject":"Re: [PATCH v4 00/14] add software ecdsa support","To":"Philippe Reynes <philippe.reynes@softathome.com>","Cc":"marko.makela@iki.fi, jonny.green@keytechinc.com, trini@konsulko.com,\n simon.glass@canonical.com, u-boot@lists.denx.de","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.39","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<https://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>","X-Virus-Scanned":"clamav-milter 0.103.8 at phobos.denx.de","X-Virus-Status":"Clean"}}]