Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2223106/?format=api
{ "id": 2223106, "url": "http://patchwork.ozlabs.org/api/patches/2223106/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260414131558.538656-4-yan.wang@softathome.com/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260414131558.538656-4-yan.wang@softathome.com>", "list_archive_url": null, "date": "2026-04-14T13:15:58", "name": "[v6,3/3] tools: binman: Test signing an encrypted FIT with a preload header", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "b5431ff3ddfbdb9251d43a3f9ab5b08e919aeede", "submitter": { "id": 90652, "url": "http://patchwork.ozlabs.org/api/people/90652/?format=api", "name": "Yan WANG", "email": "yan.wang@softathome.com" }, "delegate": { "id": 3651, "url": "http://patchwork.ozlabs.org/api/users/3651/?format=api", "username": "trini", "first_name": "Tom", "last_name": "Rini", "email": "trini@ti.com" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260414131558.538656-4-yan.wang@softathome.com/mbox/", "series": [ { "id": 499840, "url": "http://patchwork.ozlabs.org/api/series/499840/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=499840", "date": "2026-04-14T13:15:55", "name": "binman: Fix preload signing with encrypted FIT", "version": 6, "mbox": "http://patchwork.ozlabs.org/series/499840/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2223106/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2223106/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=czU4wN/2;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"czU4wN/2\";\n\tdkim-atps=neutral", "phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=yan.wang@softathome.com" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fw4Yk30xtz1yDF\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 14 Apr 2026 23:16:58 +1000 (AEST)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 1DCBF84223;\n\tTue, 14 Apr 2026 15:16:35 +0200 (CEST)", "by phobos.denx.de (Postfix, from userid 109)\n id BD71684236; Tue, 14 Apr 2026 15:16:33 +0200 (CEST)", "from MRZP264CU002.outbound.protection.outlook.com\n (mail-francesouthazlp170100001.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c207::1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id B4C4B84206\n for <u-boot@lists.denx.de>; Tue, 14 Apr 2026 15:16:31 +0200 (CEST)", "from PR1P264CA0087.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:345::9)\n by PR0P264MB1914.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:16b::8) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.48; Tue, 14 Apr\n 2026 13:16:25 +0000", "from PA2PEPF00019230.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:345:cafe::11) by PR1P264CA0087.outlook.office365.com\n (2603:10a6:102:345::9) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.48 via Frontend Transport; Tue,\n 14 Apr 2026 13:16:25 +0000", "from proxy.softathome.com (149.6.166.170) by\n PA2PEPF00019230.mail.protection.outlook.com (10.167.242.36) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.17\n via Frontend Transport; Tue, 14 Apr 2026 13:16:24 +0000", "from sah1lpt719.softathome.com (unknown [192.168.72.213])\n by proxy.softathome.com (Postfix) with ESMTPSA id B0872202C3;\n Tue, 14 Apr 2026 15:16:24 +0200 (CEST)" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Y71LtHmw8m6c3sNkVAJBMT4ESFFectWELVXDarvtrhx48QXe+Z/I15+BPsH0RMHbvyamAqUT6nUL8WFO+Af1hrlAJbTuoKak8K2fcmmbrHCP1vr16aeVZaitAW3x5vg3AO80jZHnXBDlKwhsH/nbkbkofsWMKKUbmlkb/uM+XXEEhOk4hPxss/Mviqwn7cwxBCObFx7OKLhsZa6wyq08MkoQaRoqPMvMXevcx/HLO2Uff+UHgZlFTry4vEC/ie9tD029ouj6pqCEv+p1RLtr8LgrjLOvgKfkoDMhJABN4n2Li8/INzVLIBekSKWm0WNsWQ5oz23D1fydTfMjl6UPQg==", "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=0fo8/fBTKKipFdE1SnLhC8eeIT7L+3UnUBY/bdknjBc=;\n b=URDps/65MGknZcJVAYDbaO1h8lQv/EkXxrbDr5LIVN62kHVngmDd9H5BQ0HwYfNRnlLfexBEsRo1yyv+yA+tU8jsX1y20E+n30zm6JvjgNbDljB0qq6QPT7Z5QAvWkCnkvKSWsEz3P6FcSLBACh7zVgVvlJ8RCVPEzY/Uzmx6kLLS+A++gTUcVPHxFoGLyjWFEOcyJ1Twvt9opX6+Iz+BC/FhATD+qpR2y3uzxGSFbuDQ5VS4g4oSar4bzd2m1nrYlhmQm4p8m9oNkj2SB2uaJcxxKXdpyevqxJWQkTtRR7MJTnaGZJ13G7ubE3C38S1LvJnTqTCo5Kq15/fRWaEaw==", "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=chromium.org smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=0fo8/fBTKKipFdE1SnLhC8eeIT7L+3UnUBY/bdknjBc=;\n b=czU4wN/2rnKstFuHwHQFCm0422dJfBNWfNnC5OJk42XhlUnvGRYPHXnhuQt8ExQ2S4lHsBZuDjoVmxJ2zWa+7FASG29y7+KUpA5duOsp/K2i6fvfzIbBpWNeKGft3wqp25t/NGDlKYdAIyda7nRNoiNq61I7Wca1Cx1O4WRY8lo0vhVmurw/o0sgX2X5bZtqA4WvrOgG7nlPFZBhgzCw2Z0jU4B1ohbuJjD7QKu+0+oC9tIQ0qXmXIcjpPJLl4rgmWCcbwnWODrA9/K1i1RhVgTLHuaEKNPNxGS3Di8KYr+jl+3mVJFRcZf4LVAk6cGoN8DOWAyuugaKgeI8a36itw==", "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;", "Received-SPF": "Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C", "From": "Yan WANG <yan.wang@softathome.com>", "To": "trini@konsulko.com,\n\tsjg@chromium.org,\n\talpernebiyasak@gmail.com", "Cc": "paul.henrys_ext@softathome.com,\n\tu-boot@lists.denx.de", "Subject": "[PATCH v6 3/3] tools: binman: Test signing an encrypted FIT with a\n preload header", "Date": "Tue, 14 Apr 2026 15:15:58 +0200", "Message-Id": "<20260414131558.538656-4-yan.wang@softathome.com>", "X-Mailer": "git-send-email 2.25.1", "In-Reply-To": "<20260414131558.538656-1-yan.wang@softathome.com>", "References": "<20260408150201.217942-3-paul.henrys_ext@softathome.com>\n <20260414131558.538656-1-yan.wang@softathome.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-EOPAttributedMessage": "0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "PA2PEPF00019230:EE_|PR0P264MB1914:EE_", "Content-Type": "text/plain", "X-MS-Office365-Filtering-Correlation-Id": "ac157da6-9863-4e89-062b-08de9a28079f", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|36860700016|376014|82310400026|56012099003|18002099003|17002099007|22082099003;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(1800799024)(36860700016)(376014)(82310400026)(56012099003)(18002099003)(17002099007)(22082099003);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n 0MepdVelE+PUPTP+BNXHCJ762wCSCcfD4XsiS2adEX4PdJbedfrqWFIhN9oILc18Oigp283DiI5tbAsJPRWgYVzNR+yPIyMsA5gDsotg8qAt6HANrhVFMnT0WdmAeD4GujEu6I/E/eP7rjAj6ytL5FOYsU3k6YwgkaLCpK6bJ+zLzIU3tDY+mq1zb7HUPRaw/jknqtPwmaWbXfq5NJlDq63/yuCBJPjU8wzDPRo7lpMZrjCLV7Njt/Ojpk/v/jKM+j5eE4P30kQ+NjMt8l9ujFJFw7kXU76KHz8gLIuiQEANiEUKRgZT4+z/jYjif8KL3fp1YwV03Puk8ns61z4QWsab6hJyKRqaSkuYyY0bmEyUqXvUfhciY4VUvmYnDjqL8vPT+w6i5TOYjHWhI5ztxAzoKQ+t4JnstzWX7Au7Xsv5kINvzsgwtNdB9vB+uRbO", "X-OriginatorOrg": "softathome.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "14 Apr 2026 13:16:24.9615 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n ac157da6-9863-4e89-062b-08de9a28079f", "X-MS-Exchange-CrossTenant-Id": "aa10e044-e405-4c10-8353-36b4d0cce511", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]", "X-MS-Exchange-CrossTenant-AuthSource": "PA2PEPF00019230.FRAP264.PROD.OUTLOOK.COM", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "PR0P264MB1914", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "From: Paul HENRYS <paul.henrys_ext@softathome.com>\n\nAdd a test to verify the preload header correctly signs an encrypted\nFIT. This test exercises the case where encryption uses random IVs that\nwould change between mkimage calls.\n\nSigned-off-by: Paul HENRYS <paul.henrys_ext@softathome.com>\n---\n\nChanges in v6:\n- No changes\n\n tools/binman/ftest.py | 21 +++++++\n .../test/security/pre_load_fit_encrypted.dts | 63 +++++++++++++++++++\n 2 files changed, 84 insertions(+)\n create mode 100644 tools/binman/test/security/pre_load_fit_encrypted.dts", "diff": "diff --git a/tools/binman/ftest.py b/tools/binman/ftest.py\nindex ca5149ee654..da8325f820a 100644\n--- a/tools/binman/ftest.py\n+++ b/tools/binman/ftest.py\n@@ -5895,6 +5895,27 @@ fdt fdtmap Extract the devicetree blob from the fdtmap\n data = self._DoReadFileDtb('security/pre_load_invalid_key.dts',\n entry_args=entry_args)\n \n+ def testPreLoadEncryptedFit(self):\n+ \"\"\"Test an encrypted FIT image with a pre-load header\"\"\"\n+ entry_args = {\n+ 'pre-load-key-path': os.path.join(self._binman_dir, 'test'),\n+ }\n+ data = tools.read_file(self.TestFile(\"fit/aes256.bin\"))\n+ self._MakeInputFile(\"keys/aes256.bin\", data)\n+\n+ keys_subdir = os.path.join(self._indir, \"keys\")\n+ data = self._DoReadFileDtb(\n+ 'security/pre_load_fit_encrypted.dts', entry_args=entry_args,\n+ extra_indirs=[keys_subdir])[0]\n+\n+ image_fname = tools.get_output_filename('image.bin')\n+ is_signed = self._CheckPreload(image_fname, self.TestFile(\"dev.key\"))\n+\n+ self.assertEqual(PRE_LOAD_MAGIC, data[:len(PRE_LOAD_MAGIC)])\n+ self.assertEqual(PRE_LOAD_VERSION, data[4:4 + len(PRE_LOAD_VERSION)])\n+ self.assertEqual(PRE_LOAD_HDR_SIZE, data[8:8 + len(PRE_LOAD_HDR_SIZE)])\n+ self.assertEqual(is_signed, True)\n+\n def _CheckSafeUniqueNames(self, *images):\n \"\"\"Check all entries of given images for unsafe unique names\"\"\"\n for image in images:\ndiff --git a/tools/binman/test/security/pre_load_fit_encrypted.dts b/tools/binman/test/security/pre_load_fit_encrypted.dts\nnew file mode 100644\nindex 00000000000..f5e9bf9426c\n--- /dev/null\n+++ b/tools/binman/test/security/pre_load_fit_encrypted.dts\n@@ -0,0 +1,63 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\t#address-cells = <1>;\n+\t#size-cells = <1>;\n+\n+\tbinman {\n+\t\tpre-load {\n+\t\t\tcontent = <&image>;\n+\t\t\talgo-name = \"sha256,rsa2048\";\n+\t\t\tkey-name = \"dev.key\";\n+\t\t\theader-size = <4096>;\n+\t\t\tversion = <0x11223344>;\n+\t\t};\n+\n+\t\timage: fit {\n+\t\t\tfit,encrypt;\n+\t\t\tdescription = \"Test a FIT with encrypted data and signed with a preload\";\n+\t\t\t#address-cells = <1>;\n+\n+\t\t\timages {\n+\t\t\t\tu-boot {\n+\t\t\t\t\tdescription = \"U-Boot\";\n+\t\t\t\t\ttype = \"firmware\";\n+\t\t\t\t\tarch = \"arm64\";\n+\t\t\t\t\tos = \"U-Boot\";\n+\t\t\t\t\tcompression = \"none\";\n+\t\t\t\t\tload = <00000000>;\n+\t\t\t\t\tentry = <00000000>;\n+\t\t\t\t\tcipher {\n+\t\t\t\t\t\talgo = \"aes256\";\n+\t\t\t\t\t\tkey-name-hint = \"aes256\";\n+\t\t\t\t\t};\n+\t\t\t\t\tu-boot-nodtb {\n+\t\t\t\t\t};\n+\t\t\t\t};\n+\t\t\t\tfdt-1 {\n+\t\t\t\t\tdescription = \"Flattened Device Tree blob\";\n+\t\t\t\t\ttype = \"flat_dt\";\n+\t\t\t\t\tarch = \"arm64\";\n+\t\t\t\t\tcompression = \"none\";\n+\t\t\t\t\tcipher {\n+\t\t\t\t\t\talgo = \"aes256\";\n+\t\t\t\t\t\tkey-name-hint = \"aes256\";\n+\t\t\t\t\t};\n+\t\t\t\t\tu-boot-dtb {\n+\t\t\t\t\t};\n+\t\t\t\t};\n+\t\t\t};\n+\n+\t\t\tconfigurations {\n+\t\t\t\tdefault = \"conf-1\";\n+\t\t\t\tconf-1 {\n+\t\t\t\t\tdescription = \"Boot U-Boot with FDT blob\";\n+\t\t\t\t\tfirmware = \"u-boot\";\n+\t\t\t\t\tfdt = \"fdt-1\";\n+\t\t\t\t};\n+\t\t\t};\n+\t\t};\n+\t};\n+};\n", "prefixes": [ "v6", "3/3" ] }