get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2206461/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2206461,
    "url": "http://patchwork.ozlabs.org/api/patches/2206461/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260306181304.2426352-20-sjg@chromium.org/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260306181304.2426352-20-sjg@chromium.org>",
    "list_archive_url": null,
    "date": "2026-03-06T18:12:47",
    "name": "[v2,19/23] binman: test: Move shared key files to test/security/",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "31aeb37e53e919ec0e17fda8d872bc23dbc46cf9",
    "submitter": {
        "id": 6170,
        "url": "http://patchwork.ozlabs.org/api/people/6170/?format=api",
        "name": "Simon Glass",
        "email": "sjg@chromium.org"
    },
    "delegate": {
        "id": 3184,
        "url": "http://patchwork.ozlabs.org/api/users/3184/?format=api",
        "username": "sjg",
        "first_name": "Simon",
        "last_name": "Glass",
        "email": "sjg@chromium.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260306181304.2426352-20-sjg@chromium.org/mbox/",
    "series": [
        {
            "id": 494765,
            "url": "http://patchwork.ozlabs.org/api/series/494765/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=494765",
            "date": "2026-03-06T18:12:28",
            "name": "binman: test: Organise test files into subdirectories",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/494765/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2206461/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2206461/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org header.a=rsa-sha256\n header.s=google header.b=aMzweBsT;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org\n header.b=\"aMzweBsT\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=sjg@chromium.org"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fSF3m6mJ1z1xw1\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 07 Mar 2026 05:16:52 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 831498404A;\n\tFri,  6 Mar 2026 19:14:21 +0100 (CET)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 8E63A8404A; Fri,  6 Mar 2026 19:14:20 +0100 (CET)",
            "from mail-qk1-x732.google.com (mail-qk1-x732.google.com\n [IPv6:2607:f8b0:4864:20::732])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 4F41D8401A\n for <u-boot@lists.denx.de>; Fri,  6 Mar 2026 19:14:18 +0100 (CET)",
            "by mail-qk1-x732.google.com with SMTP id\n af79cd13be357-8cd75abd09dso18498485a.0\n for <u-boot@lists.denx.de>; Fri, 06 Mar 2026 10:14:18 -0800 (PST)",
            "from chromium.org ([73.34.74.121]) by smtp.gmail.com with ESMTPSA id\n af79cd13be357-8cd6f5736c0sm155930885a.49.2026.03.06.10.14.14\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 06 Mar 2026 10:14:16 -0800 (PST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=chromium.org; s=google; t=1772820857; x=1773425657; darn=lists.denx.de;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=ydmNE+6dEBPZqSZVUsUndXRqv3iG1hBQkQxuJtm9Rh4=;\n b=aMzweBsTyYLJtjMBBDSfVcB9JxuYJAV+PCMhJqivl7fe9ZCNxtFSI1H1iUCvczW7K0\n qALzeL8++ZQ/eNQpW6WmgEZEr0WMjkMwvuUT5zaONrEgMJI5ZVIYxFdFTeFPse2+QULR\n xtSDeYT0FfmQxwMv6G77y7k6qYek3SuIkqp1U=",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1772820857; x=1773425657;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=ydmNE+6dEBPZqSZVUsUndXRqv3iG1hBQkQxuJtm9Rh4=;\n b=SPFdjHY32y1uI1gGgaG6GCDnbjr5YQyuK0rZDq5kRHepEP3S+eJrWUAuPHJG0iyq13\n 6KOKVH5rs4D+wYgKlGwSct0IW2+QSeVEa1U5HJJ0pmB6Ozhw6G49Hdbs97IEaEBzcJg5\n GuEVKtHt9aWuT6FfxvyKv77C1vLwIEzG5KTlbqC1OzB0dSNNvBU8RoDH3103J+AF5OvI\n 4IPZqEZOyCvZDVUjhWY6tYaDow/Jc53uu8rnvDqehHcnrBEFLxY/OqkqiiohvYj79wcY\n ZeSD1n/q3sLCNVbYucothteoaVHp5rciyrPmM4A5PjTaMXZJVJt2/E/kjRiFENSQe1tX\n AU3g==",
        "X-Gm-Message-State": "AOJu0YwLFtoYUJuBgZTJ4Vyt1OSmB5SPQEqd6S/K3O1iapfspa+43cji\n JkUz/mS9fP35EulXFY+ec2l3Iyi7F/jQY6kkr5hHAZXjXNxear1zjJImAXbigERWq8Byu9uIqtW\n 3Eog=",
        "X-Gm-Gg": "ATEYQzygP0pjOw04XP1sKqKcB+IZO0xy0mM+aNveWDFjM2bnpfdwD+Kv/eBG0xCTA7h\n h49m3xJ5MRsT8X60mVW5tXZjasCz/NakAcSUuTn1q7C2WC82OV27nV3iv6Ku7aepESxlHqByQEl\n jxHz7UaNp1cXFnYGNrsAxBz1+iCUWVC6XE2GxUCc1npFPd470GFFT6AInEGKxEoOCioq1/sZDZC\n mM5HLdzrsApQ2sCh6jBO5QzW5Qp5NWSdmfD1h3oORpuz2uF/x5dl598kxIo8Hssy4kC8Zc8uLOZ\n f3eCxjtP+Bsug89wjljDcKJ9ZjxQVJ5rB4gCq3ZpMbDzvfW1pvI6/c0qfoSi9OC/1eGwqig+SAB\n 89LN+UQ81K7JzxrrjmRM3EGN6ab9xZhmoEa10JfmWjemTRyENWuiv6qR5bWiRPcQ+NWuA43R3cp\n QLil3ahVul8TgmgN5Baw==",
        "X-Received": "by 2002:a05:620a:254e:b0:85c:bb2:ad9c with SMTP id\n af79cd13be357-8cd6d4b4ee3mr404013585a.53.1772820856626;\n Fri, 06 Mar 2026 10:14:16 -0800 (PST)",
        "From": "Simon Glass <sjg@chromium.org>",
        "To": "u-boot@lists.denx.de",
        "Cc": "Tom Rini <trini@konsulko.com>, Quentin Schulz <quentin.schulz@cherry.de>,\n Simon Glass <simon.glass@canonical.com>,\n Alper Nebi Yasak <alpernebiyasak@gmail.com>, Bryan Brattlof <bb@ti.com>,\n Neha Malcom Francis <n-francis@ti.com>, Peng Fan <peng.fan@nxp.com>,\n Philippe Reynes <philippe.reynes@softathome.com>,\n Simon Glass <sjg@chromium.org>,\n Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com>,\n Yannic Moog <y.moog@phytec.de>",
        "Subject": "[PATCH v2 19/23] binman: test: Move shared key files to\n test/security/",
        "Date": "Fri,  6 Mar 2026 11:12:47 -0700",
        "Message-ID": "<20260306181304.2426352-20-sjg@chromium.org>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<20260306181304.2426352-1-sjg@chromium.org>",
        "References": "<20260306181304.2426352-1-sjg@chromium.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "From: Simon Glass <simon.glass@canonical.com>\n\nMove key.key and key.pem into the security/ subdirectory. These are\nused by security, vendor, and capsule tests but security is the most\nnatural home for key material. Update all references.\n\nSigned-off-by: Simon Glass <simon.glass@canonical.com>\n---\n\nChanges in v2:\n- Add new patch to move shared key files\n\n tools/binman/ftest.py                    | 32 ++++++++++++------------\n tools/binman/test/{ => security}/key.key |  0\n tools/binman/test/{ => security}/key.pem |  0\n 3 files changed, 16 insertions(+), 16 deletions(-)\n rename tools/binman/test/{ => security}/key.key (100%)\n rename tools/binman/test/{ => security}/key.pem (100%)",
    "diff": "diff --git a/tools/binman/ftest.py b/tools/binman/ftest.py\nindex 76d17e6d986..612237d0b41 100644\n--- a/tools/binman/ftest.py\n+++ b/tools/binman/ftest.py\n@@ -6859,7 +6859,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testX509Cert(self):\n         \"\"\"Test creating an X509 certificate\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -6872,7 +6872,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testX509CertMissing(self):\n         \"\"\"Test that binman still produces an image if openssl is missing\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': 'keyfile',\n         }\n@@ -7198,7 +7198,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testPackTiSecure(self):\n         \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7208,7 +7208,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testPackTiSecureFirewall(self):\n         \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7220,7 +7220,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testPackTiSecureFirewallMissingProperty(self):\n         \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7232,7 +7232,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n     def testPackTiSecureMissingTool(self):\n         \"\"\"Test that an image with a TI secured binary (non-functional) can be created\n         when openssl is missing\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7245,7 +7245,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testPackTiSecureROM(self):\n         \"\"\"Test that a ROM image with a TI secured binary can be created\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7261,7 +7261,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testPackTiSecureROMCombined(self):\n         \"\"\"Test that a ROM image with a TI secured binary can be created\"\"\"\n-        keyfile = self.TestFile('key.key')\n+        keyfile = self.TestFile('security/key.key')\n         entry_args = {\n             'keyfile': keyfile,\n         }\n@@ -7331,7 +7331,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testSplPubkeyDtb(self):\n         \"\"\"Test u_boot_spl_pubkey_dtb etype\"\"\"\n-        data = tools.read_file(self.TestFile(\"key.pem\"))\n+        data = tools.read_file(self.TestFile(\"security/key.pem\"))\n         self._MakeInputFile(\"key.crt\", data)\n         self._DoReadFileRealDtb('security/spl_pubkey_dtb.dts')\n         image = control.images['image']\n@@ -7353,7 +7353,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n         \"\"\"Test xilinx-bootgen etype\"\"\"\n         bootgen = bintool.Bintool.create('bootgen')\n         self._CheckBintool(bootgen)\n-        data = tools.read_file(self.TestFile(\"key.key\"))\n+        data = tools.read_file(self.TestFile(\"security/key.key\"))\n         self._MakeInputFile(\"psk.pem\", data)\n         self._MakeInputFile(\"ssk.pem\", data)\n         self._SetupPmuFwlElf()\n@@ -7382,7 +7382,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n         \"\"\"Test xilinx-bootgen etype\"\"\"\n         bootgen = bintool.Bintool.create('bootgen')\n         self._CheckBintool(bootgen)\n-        data = tools.read_file(self.TestFile(\"key.key\"))\n+        data = tools.read_file(self.TestFile(\"security/key.key\"))\n         self._MakeInputFile(\"psk.pem\", data)\n         self._MakeInputFile(\"ssk.pem\", data)\n         self._SetupPmuFwlElf()\n@@ -7414,7 +7414,7 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testXilinxBootgenMissing(self):\n         \"\"\"Test that binman still produces an image if bootgen is missing\"\"\"\n-        data = tools.read_file(self.TestFile(\"key.key\"))\n+        data = tools.read_file(self.TestFile(\"security/key.key\"))\n         self._MakeInputFile(\"psk.pem\", data)\n         self._MakeInputFile(\"ssk.pem\", data)\n         self._SetupPmuFwlElf()\n@@ -7523,9 +7523,9 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testSignedCapsuleGen(self):\n         \"\"\"Test generation of EFI capsule\"\"\"\n-        data = tools.read_file(self.TestFile(\"key.key\"))\n+        data = tools.read_file(self.TestFile(\"security/key.key\"))\n         self._MakeInputFile(\"key.key\", data)\n-        data = tools.read_file(self.TestFile(\"key.pem\"))\n+        data = tools.read_file(self.TestFile(\"security/key.pem\"))\n         self._MakeInputFile(\"key.crt\", data)\n \n         data = self._DoReadFile('capsule/signed.dts')\n@@ -7540,9 +7540,9 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n \n     def testCapsuleGenSignedVer(self):\n         \"\"\"Test generation of signed EFI capsule with version information\"\"\"\n-        data = tools.read_file(self.TestFile(\"key.key\"))\n+        data = tools.read_file(self.TestFile(\"security/key.key\"))\n         self._MakeInputFile(\"key.key\", data)\n-        data = tools.read_file(self.TestFile(\"key.pem\"))\n+        data = tools.read_file(self.TestFile(\"security/key.pem\"))\n         self._MakeInputFile(\"key.crt\", data)\n \n         data = self._DoReadFile('capsule/signed_ver.dts')\ndiff --git a/tools/binman/test/key.key b/tools/binman/test/security/key.key\nsimilarity index 100%\nrename from tools/binman/test/key.key\nrename to tools/binman/test/security/key.key\ndiff --git a/tools/binman/test/key.pem b/tools/binman/test/security/key.pem\nsimilarity index 100%\nrename from tools/binman/test/key.pem\nrename to tools/binman/test/security/key.pem\n",
    "prefixes": [
        "v2",
        "19/23"
    ]
}