Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2206461/?format=api
{ "id": 2206461, "url": "http://patchwork.ozlabs.org/api/patches/2206461/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260306181304.2426352-20-sjg@chromium.org/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260306181304.2426352-20-sjg@chromium.org>", "list_archive_url": null, "date": "2026-03-06T18:12:47", "name": "[v2,19/23] binman: test: Move shared key files to test/security/", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "31aeb37e53e919ec0e17fda8d872bc23dbc46cf9", "submitter": { "id": 6170, "url": "http://patchwork.ozlabs.org/api/people/6170/?format=api", "name": "Simon Glass", "email": "sjg@chromium.org" }, "delegate": { "id": 3184, "url": "http://patchwork.ozlabs.org/api/users/3184/?format=api", "username": "sjg", "first_name": "Simon", "last_name": "Glass", "email": "sjg@chromium.org" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260306181304.2426352-20-sjg@chromium.org/mbox/", "series": [ { "id": 494765, "url": "http://patchwork.ozlabs.org/api/series/494765/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=494765", "date": "2026-03-06T18:12:28", "name": "binman: test: Organise test files into subdirectories", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/494765/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2206461/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2206461/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org header.a=rsa-sha256\n header.s=google header.b=aMzweBsT;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=chromium.org header.i=@chromium.org\n header.b=\"aMzweBsT\";\n\tdkim-atps=neutral", "phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=chromium.org", "phobos.denx.de;\n spf=pass smtp.mailfrom=sjg@chromium.org" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fSF3m6mJ1z1xw1\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 07 Mar 2026 05:16:52 +1100 (AEDT)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 831498404A;\n\tFri, 6 Mar 2026 19:14:21 +0100 (CET)", "by phobos.denx.de (Postfix, from userid 109)\n id 8E63A8404A; Fri, 6 Mar 2026 19:14:20 +0100 (CET)", "from mail-qk1-x732.google.com (mail-qk1-x732.google.com\n [IPv6:2607:f8b0:4864:20::732])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 4F41D8401A\n for <u-boot@lists.denx.de>; Fri, 6 Mar 2026 19:14:18 +0100 (CET)", "by mail-qk1-x732.google.com with SMTP id\n af79cd13be357-8cd75abd09dso18498485a.0\n for <u-boot@lists.denx.de>; Fri, 06 Mar 2026 10:14:18 -0800 (PST)", "from chromium.org ([73.34.74.121]) by smtp.gmail.com with ESMTPSA id\n af79cd13be357-8cd6f5736c0sm155930885a.49.2026.03.06.10.14.14\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 06 Mar 2026 10:14:16 -0800 (PST)" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=chromium.org; s=google; t=1772820857; x=1773425657; darn=lists.denx.de;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=ydmNE+6dEBPZqSZVUsUndXRqv3iG1hBQkQxuJtm9Rh4=;\n b=aMzweBsTyYLJtjMBBDSfVcB9JxuYJAV+PCMhJqivl7fe9ZCNxtFSI1H1iUCvczW7K0\n qALzeL8++ZQ/eNQpW6WmgEZEr0WMjkMwvuUT5zaONrEgMJI5ZVIYxFdFTeFPse2+QULR\n xtSDeYT0FfmQxwMv6G77y7k6qYek3SuIkqp1U=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1772820857; x=1773425657;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=ydmNE+6dEBPZqSZVUsUndXRqv3iG1hBQkQxuJtm9Rh4=;\n b=SPFdjHY32y1uI1gGgaG6GCDnbjr5YQyuK0rZDq5kRHepEP3S+eJrWUAuPHJG0iyq13\n 6KOKVH5rs4D+wYgKlGwSct0IW2+QSeVEa1U5HJJ0pmB6Ozhw6G49Hdbs97IEaEBzcJg5\n GuEVKtHt9aWuT6FfxvyKv77C1vLwIEzG5KTlbqC1OzB0dSNNvBU8RoDH3103J+AF5OvI\n 4IPZqEZOyCvZDVUjhWY6tYaDow/Jc53uu8rnvDqehHcnrBEFLxY/OqkqiiohvYj79wcY\n ZeSD1n/q3sLCNVbYucothteoaVHp5rciyrPmM4A5PjTaMXZJVJt2/E/kjRiFENSQe1tX\n AU3g==", "X-Gm-Message-State": "AOJu0YwLFtoYUJuBgZTJ4Vyt1OSmB5SPQEqd6S/K3O1iapfspa+43cji\n JkUz/mS9fP35EulXFY+ec2l3Iyi7F/jQY6kkr5hHAZXjXNxear1zjJImAXbigERWq8Byu9uIqtW\n 3Eog=", "X-Gm-Gg": "ATEYQzygP0pjOw04XP1sKqKcB+IZO0xy0mM+aNveWDFjM2bnpfdwD+Kv/eBG0xCTA7h\n h49m3xJ5MRsT8X60mVW5tXZjasCz/NakAcSUuTn1q7C2WC82OV27nV3iv6Ku7aepESxlHqByQEl\n jxHz7UaNp1cXFnYGNrsAxBz1+iCUWVC6XE2GxUCc1npFPd470GFFT6AInEGKxEoOCioq1/sZDZC\n mM5HLdzrsApQ2sCh6jBO5QzW5Qp5NWSdmfD1h3oORpuz2uF/x5dl598kxIo8Hssy4kC8Zc8uLOZ\n f3eCxjtP+Bsug89wjljDcKJ9ZjxQVJ5rB4gCq3ZpMbDzvfW1pvI6/c0qfoSi9OC/1eGwqig+SAB\n 89LN+UQ81K7JzxrrjmRM3EGN6ab9xZhmoEa10JfmWjemTRyENWuiv6qR5bWiRPcQ+NWuA43R3cp\n QLil3ahVul8TgmgN5Baw==", "X-Received": "by 2002:a05:620a:254e:b0:85c:bb2:ad9c with SMTP id\n af79cd13be357-8cd6d4b4ee3mr404013585a.53.1772820856626;\n Fri, 06 Mar 2026 10:14:16 -0800 (PST)", "From": "Simon Glass <sjg@chromium.org>", "To": "u-boot@lists.denx.de", "Cc": "Tom Rini <trini@konsulko.com>, Quentin Schulz <quentin.schulz@cherry.de>,\n Simon Glass <simon.glass@canonical.com>,\n Alper Nebi Yasak <alpernebiyasak@gmail.com>, Bryan Brattlof <bb@ti.com>,\n Neha Malcom Francis <n-francis@ti.com>, Peng Fan <peng.fan@nxp.com>,\n Philippe Reynes <philippe.reynes@softathome.com>,\n Simon Glass <sjg@chromium.org>,\n Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com>,\n Yannic Moog <y.moog@phytec.de>", "Subject": "[PATCH v2 19/23] binman: test: Move shared key files to\n test/security/", "Date": "Fri, 6 Mar 2026 11:12:47 -0700", "Message-ID": "<20260306181304.2426352-20-sjg@chromium.org>", "X-Mailer": "git-send-email 2.43.0", "In-Reply-To": "<20260306181304.2426352-1-sjg@chromium.org>", "References": "<20260306181304.2426352-1-sjg@chromium.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "From: Simon Glass <simon.glass@canonical.com>\n\nMove key.key and key.pem into the security/ subdirectory. These are\nused by security, vendor, and capsule tests but security is the most\nnatural home for key material. Update all references.\n\nSigned-off-by: Simon Glass <simon.glass@canonical.com>\n---\n\nChanges in v2:\n- Add new patch to move shared key files\n\n tools/binman/ftest.py | 32 ++++++++++++------------\n tools/binman/test/{ => security}/key.key | 0\n tools/binman/test/{ => security}/key.pem | 0\n 3 files changed, 16 insertions(+), 16 deletions(-)\n rename tools/binman/test/{ => security}/key.key (100%)\n rename tools/binman/test/{ => security}/key.pem (100%)", "diff": "diff --git a/tools/binman/ftest.py b/tools/binman/ftest.py\nindex 76d17e6d986..612237d0b41 100644\n--- a/tools/binman/ftest.py\n+++ b/tools/binman/ftest.py\n@@ -6859,7 +6859,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testX509Cert(self):\n \"\"\"Test creating an X509 certificate\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -6872,7 +6872,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testX509CertMissing(self):\n \"\"\"Test that binman still produces an image if openssl is missing\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': 'keyfile',\n }\n@@ -7198,7 +7198,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testPackTiSecure(self):\n \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7208,7 +7208,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testPackTiSecureFirewall(self):\n \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7220,7 +7220,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testPackTiSecureFirewallMissingProperty(self):\n \"\"\"Test that an image with a TI secured binary can be created\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7232,7 +7232,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n def testPackTiSecureMissingTool(self):\n \"\"\"Test that an image with a TI secured binary (non-functional) can be created\n when openssl is missing\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7245,7 +7245,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testPackTiSecureROM(self):\n \"\"\"Test that a ROM image with a TI secured binary can be created\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7261,7 +7261,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testPackTiSecureROMCombined(self):\n \"\"\"Test that a ROM image with a TI secured binary can be created\"\"\"\n- keyfile = self.TestFile('key.key')\n+ keyfile = self.TestFile('security/key.key')\n entry_args = {\n 'keyfile': keyfile,\n }\n@@ -7331,7 +7331,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testSplPubkeyDtb(self):\n \"\"\"Test u_boot_spl_pubkey_dtb etype\"\"\"\n- data = tools.read_file(self.TestFile(\"key.pem\"))\n+ data = tools.read_file(self.TestFile(\"security/key.pem\"))\n self._MakeInputFile(\"key.crt\", data)\n self._DoReadFileRealDtb('security/spl_pubkey_dtb.dts')\n image = control.images['image']\n@@ -7353,7 +7353,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \"\"\"Test xilinx-bootgen etype\"\"\"\n bootgen = bintool.Bintool.create('bootgen')\n self._CheckBintool(bootgen)\n- data = tools.read_file(self.TestFile(\"key.key\"))\n+ data = tools.read_file(self.TestFile(\"security/key.key\"))\n self._MakeInputFile(\"psk.pem\", data)\n self._MakeInputFile(\"ssk.pem\", data)\n self._SetupPmuFwlElf()\n@@ -7382,7 +7382,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \"\"\"Test xilinx-bootgen etype\"\"\"\n bootgen = bintool.Bintool.create('bootgen')\n self._CheckBintool(bootgen)\n- data = tools.read_file(self.TestFile(\"key.key\"))\n+ data = tools.read_file(self.TestFile(\"security/key.key\"))\n self._MakeInputFile(\"psk.pem\", data)\n self._MakeInputFile(\"ssk.pem\", data)\n self._SetupPmuFwlElf()\n@@ -7414,7 +7414,7 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testXilinxBootgenMissing(self):\n \"\"\"Test that binman still produces an image if bootgen is missing\"\"\"\n- data = tools.read_file(self.TestFile(\"key.key\"))\n+ data = tools.read_file(self.TestFile(\"security/key.key\"))\n self._MakeInputFile(\"psk.pem\", data)\n self._MakeInputFile(\"ssk.pem\", data)\n self._SetupPmuFwlElf()\n@@ -7523,9 +7523,9 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testSignedCapsuleGen(self):\n \"\"\"Test generation of EFI capsule\"\"\"\n- data = tools.read_file(self.TestFile(\"key.key\"))\n+ data = tools.read_file(self.TestFile(\"security/key.key\"))\n self._MakeInputFile(\"key.key\", data)\n- data = tools.read_file(self.TestFile(\"key.pem\"))\n+ data = tools.read_file(self.TestFile(\"security/key.pem\"))\n self._MakeInputFile(\"key.crt\", data)\n \n data = self._DoReadFile('capsule/signed.dts')\n@@ -7540,9 +7540,9 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n \n def testCapsuleGenSignedVer(self):\n \"\"\"Test generation of signed EFI capsule with version information\"\"\"\n- data = tools.read_file(self.TestFile(\"key.key\"))\n+ data = tools.read_file(self.TestFile(\"security/key.key\"))\n self._MakeInputFile(\"key.key\", data)\n- data = tools.read_file(self.TestFile(\"key.pem\"))\n+ data = tools.read_file(self.TestFile(\"security/key.pem\"))\n self._MakeInputFile(\"key.crt\", data)\n \n data = self._DoReadFile('capsule/signed_ver.dts')\ndiff --git a/tools/binman/test/key.key b/tools/binman/test/security/key.key\nsimilarity index 100%\nrename from tools/binman/test/key.key\nrename to tools/binman/test/security/key.key\ndiff --git a/tools/binman/test/key.pem b/tools/binman/test/security/key.pem\nsimilarity index 100%\nrename from tools/binman/test/key.pem\nrename to tools/binman/test/security/key.pem\n", "prefixes": [ "v2", "19/23" ] }