get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2225952/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2225952,
    "url": "http://patchwork.ozlabs.org/api/patches/2225952/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-16-philippe.reynes@softathome.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260421210954.1170437-16-philippe.reynes@softathome.com>",
    "list_archive_url": null,
    "date": "2026-04-21T21:09:54",
    "name": "[v5,15/15] test: py: vboot: add test for global signature with ecdsa",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "a79da3e0e1b42e7c8595e1f083a8a08b3986f32f",
    "submitter": {
        "id": 74351,
        "url": "http://patchwork.ozlabs.org/api/people/74351/?format=api",
        "name": "Philippe Reynes",
        "email": "philippe.reynes@softathome.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-16-philippe.reynes@softathome.com/mbox/",
    "series": [
        {
            "id": 500895,
            "url": "http://patchwork.ozlabs.org/api/series/500895/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=500895",
            "date": "2026-04-21T21:09:51",
            "name": "add software ecdsa support",
            "version": 5,
            "mbox": "http://patchwork.ozlabs.org/series/500895/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2225952/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2225952/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=PMiMo0Um;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"PMiMo0Um\";\n\tdkim-atps=neutral",
            "phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=philippe.reynes@softathome.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Zlh4pRWz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 07:11:12 +1000 (AEST)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 38179842B7;\n\tTue, 21 Apr 2026 23:10:28 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 59BED84198; Tue, 21 Apr 2026 23:10:13 +0200 (CEST)",
            "from MRZP264CU002.outbound.protection.outlook.com\n (mail-francesouthazlp170100001.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c207::1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id C2D9D842C7\n for <u-boot@lists.denx.de>; Tue, 21 Apr 2026 23:10:02 +0200 (CEST)",
            "from MR1P264CA0160.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:55::11)\n by PR0P264MB3673.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:148::11) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 21:09:58 +0000",
            "from MR1PEPF00000D58.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:501:55:cafe::3) by MR1P264CA0160.outlook.office365.com\n (2603:10a6:501:55::11) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 21:09:58 +0000",
            "from proxy.softathome.com (149.6.166.170) by\n MR1PEPF00000D58.mail.protection.outlook.com (10.167.241.5) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Tue, 21 Apr 2026 21:09:58 +0000",
            "from sah1lpt726.softathome.com (unknown [192.168.72.32])\n by proxy.softathome.com (Postfix) with ESMTPSA id 4FA32202C3;\n Tue, 21 Apr 2026 23:09:58 +0200 (CEST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Ijf5Br5yLiwFkKhbZRcOP/IPDqhEOr7FSLb6xht2UkLD7uzoW+jc8hVglYlPMzskf6wG+rbg5a2C4/YcfIXyQl6HOptqWF9dCUqkrMa6UCtpX4JYjcKx5PSD9vUPXZAuAz59n7VDFy647WIN7UEiNA7KLfihvzgwi9gzC6+3bSe/TYJwx1xfXgxL2M22agycgqVLFsKX7hEEI3FKkEN8WAlYEp7JmVkU6gTiZ2+xyvEhjCSH/deGbClbBgzJ5aRlHSAGdYGxa5DXMuCocselFf807vdEZKcO0FZfA4wVlixmbhoFkWps48kPqQqrWlrGiAI6V4MhUFERgKdD/zjTHg==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=QHTYsHxzYJ3yzFLBch2r9BuVuz8BIYsfeRvbDezlHso=;\n b=IfW9/s+3vIkd8fFpfHutpszhHr5jkDNblU624NRRpl8kMv50DMN2R/QA4qgfdDsl/CDUJ++Ui5jyHfWlj9xT+ukmO3yL9sU9dRw2uB275yl5RWWLeiqZn+ENtZrz73U0TSh1N2hiz91WrSU8zeejbLOpVuO8to9pWRHuFmvNJaSzC8CnN7twWng+tOUrBnhp8aiSMGXRBfhcFX9RmSAbq5fMBOSKVLA4RAiislEsswpJICKJK/VB7Wn+Z0AsuYS/ZYX0i8KqQJM4Z7+3PxX3BZuOw9ZGAzmXFj8p/uBTWmIRTShsdTEfVqyDGmmksmzgu580sH0aFhSrOD4UifXI9A==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=canonical.com smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=QHTYsHxzYJ3yzFLBch2r9BuVuz8BIYsfeRvbDezlHso=;\n b=PMiMo0UmE4x9Wg27Oze/6g6hl3IwCzsiyvYM/DcBN9cqtB9zR29I47aA7V0t6fWGQ0vSwLGA2JQJzbVKwqpKneXOqkqW1Jxwv91waRpfpzphzxvSGIx46sYDIIHAHuWo464DQWnerUse7eoYZ6SnfCUIdGQjm13pz+sB3YzNs/2IjJiWSPBEnuUtiBvOoFaPAmg4epZYEs9gXKwKSPbXboQ08792HLuop4nFoKKgUhma7E4ddo+C2ycbPl+X0w/sk8wl+rrEi0ukkrbYTfa2eNS1oQHAPTRbzsUjIoF+UfhPu+NkOmpsAIkCvWmBRiv4dqlPYjsq4AKCUQOxyypZbA==",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C",
        "From": "Philippe Reynes <philippe.reynes@softathome.com>",
        "To": "marko.makela@iki.fi, jonny.green@keytechinc.com, raymondmaoca@gmail.com,\n trini@konsulko.com, simon.glass@canonical.com",
        "Cc": "u-boot@lists.denx.de, Philippe Reynes <philippe.reynes@softathome.com>,\n Simon Glass <sjg@chromium.org>",
        "Subject": "[PATCH v5 15/15] test: py: vboot: add test for global signature with\n ecdsa",
        "Date": "Tue, 21 Apr 2026 23:09:54 +0200",
        "Message-ID": "<20260421210954.1170437-16-philippe.reynes@softathome.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<20260421210954.1170437-1-philippe.reynes@softathome.com>",
        "References": "<20260421210954.1170437-1-philippe.reynes@softathome.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "MR1PEPF00000D58:EE_|PR0P264MB3673:EE_",
        "Content-Type": "text/plain",
        "X-MS-Office365-Filtering-Correlation-Id": "1f15aa51-0e19-4074-9353-08de9fea5854",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|36860700016|376014|82310400026|1800799024|18002099003|56012099003|22082099003;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(36860700016)(376014)(82310400026)(1800799024)(18002099003)(56012099003)(22082099003);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n KokEEUOYGi71LLOGJbIGL7JX6ya8JVqBOvvU5oPLnL191cQZx6sQascw2vxTbVjygJqJt1fzAQkxXSQAp25kvEJwnWzrO6P3kk15zzQtMJJZ5QI8W4Xz251YfhR90J5WC9OoJ33u8YtM/DUQXwLf63PuuBzpvD28ScPG1ctjFbV/+QczOVDTe+pNc6UEeRx2uD2qZnvC6nkcV+1zRHaDXRKqHdf+WkaZS61kGrDnk0H6RSwgWRMYQDQJS4p+dedjvekOoVXHsAMeFGSbJVqiD+mFqKRFS5Mn4gtAgavWUvajqs9hY1iE3gvLZV4sZsffwWQ4IVo1AibxN1SDHPZUC+fcUFkkLh8fOIgwPOVIIVPXQDV6/vL/UAKEpPr74TN5f3HBjc31TNeDB8iTUfiYWBZPMs40z3+TV+iuUu/t9m/FodIAuddmoUzGNrL3cW0V",
        "X-OriginatorOrg": "softathome.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 21:09:58.5626 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 1f15aa51-0e19-4074-9353-08de9fea5854",
        "X-MS-Exchange-CrossTenant-Id": "aa10e044-e405-4c10-8353-36b4d0cce511",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "MR1PEPF00000D58.FRAP264.PROD.OUTLOOK.COM",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "PR0P264MB3673",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "As now u-boot supports pre-load header with ecdsa, we\nadd some tests to vboot with ecdsa pre-load header.\n\nReviewed-by: Simon Glass <sjg@chromium.org>\nSigned-off-by: Philippe Reynes <philippe.reynes@softathome.com>\n---\nv3:\n- initial version\nv4:\n- no change\nv5:\n- no change\n\n test/py/tests/test_vboot.py                   |  3 +++\n .../tests/vboot/sandbox-binman-ecdsa256.dts   | 24 +++++++++++++++++\n .../tests/vboot/sandbox-binman-ecdsa384.dts   | 24 +++++++++++++++++\n .../tests/vboot/sandbox-binman-ecdsa521.dts   | 24 +++++++++++++++++\n .../vboot/sandbox-u-boot-global-ecdsa256.dts  | 27 +++++++++++++++++++\n .../vboot/sandbox-u-boot-global-ecdsa384.dts  | 27 +++++++++++++++++++\n .../vboot/sandbox-u-boot-global-ecdsa521.dts  | 27 +++++++++++++++++++\n 7 files changed, 156 insertions(+)\n create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa256.dts\n create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa384.dts\n create mode 100644 test/py/tests/vboot/sandbox-binman-ecdsa521.dts\n create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa256.dts\n create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa384.dts\n create mode 100644 test/py/tests/vboot/sandbox-u-boot-global-ecdsa521.dts",
    "diff": "diff --git a/test/py/tests/test_vboot.py b/test/py/tests/test_vboot.py\nindex 22865f653c5..e0366e06ddb 100644\n--- a/test/py/tests/test_vboot.py\n+++ b/test/py/tests/test_vboot.py\n@@ -102,6 +102,9 @@ TESTDATA_IN = [\n     ['algo-arg', 'algo-arg', '', '', '-o sha256,rsa2048', False, False, True, False],\n     ['sha256-global-sign', 'sha256', '-rsa2048', '', '', False, False, False, True],\n     ['sha256-global-sign-pss', 'sha256', '-rsa2048', '-pss', '', False, False, False, True],\n+    ['sha256-global-sign-ecdsa256', 'sha256', '-ecdsa256', '', '', False, False, False, True],\n+    ['sha256-global-sign-ecdsa384', 'sha256', '-ecdsa384', '', '', False, False, False, True],\n+    ['sha256-global-sign-ecdsa521', 'sha256', '-ecdsa521', '', '', False, False, False, True],\n ]\n \n # Mark all but the first test as slow, so they are not run with '-k not slow'\ndiff --git a/test/py/tests/vboot/sandbox-binman-ecdsa256.dts b/test/py/tests/vboot/sandbox-binman-ecdsa256.dts\nnew file mode 100644\nindex 00000000000..0e84b81078b\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-binman-ecdsa256.dts\n@@ -0,0 +1,24 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\t#address-cells = <1>;\n+\t#size-cells = <1>;\n+\n+\tbinman {\n+\t\tfilename = \"sandbox.img\";\n+\n+\t\tpre-load {\n+\t\t\t content = <&image>;\n+\t\t\t algo-name = \"sha256,ecdsa256\";\n+\t\t\t key-name = \"dev.pem\";\n+\t\t\t header-size = <4096>;\n+\t\t\t version = <1>;\n+\t\t};\n+\n+\t\timage: blob-ext {\n+\t\t\t filename = \"test.fit\";\n+\t\t};\n+\t};\n+};\ndiff --git a/test/py/tests/vboot/sandbox-binman-ecdsa384.dts b/test/py/tests/vboot/sandbox-binman-ecdsa384.dts\nnew file mode 100644\nindex 00000000000..56faf67fe57\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-binman-ecdsa384.dts\n@@ -0,0 +1,24 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\t#address-cells = <1>;\n+\t#size-cells = <1>;\n+\n+\tbinman {\n+\t\tfilename = \"sandbox.img\";\n+\n+\t\tpre-load {\n+\t\t\t content = <&image>;\n+\t\t\t algo-name = \"sha256,ecdsa384\";\n+\t\t\t key-name = \"dev.pem\";\n+\t\t\t header-size = <4096>;\n+\t\t\t version = <1>;\n+\t\t};\n+\n+\t\timage: blob-ext {\n+\t\t\t filename = \"test.fit\";\n+\t\t};\n+\t};\n+};\ndiff --git a/test/py/tests/vboot/sandbox-binman-ecdsa521.dts b/test/py/tests/vboot/sandbox-binman-ecdsa521.dts\nnew file mode 100644\nindex 00000000000..8e2fc3de31d\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-binman-ecdsa521.dts\n@@ -0,0 +1,24 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\t#address-cells = <1>;\n+\t#size-cells = <1>;\n+\n+\tbinman {\n+\t\tfilename = \"sandbox.img\";\n+\n+\t\tpre-load {\n+\t\t\t content = <&image>;\n+\t\t\t algo-name = \"sha256,ecdsa521\";\n+\t\t\t key-name = \"dev.pem\";\n+\t\t\t header-size = <4096>;\n+\t\t\t version = <1>;\n+\t\t};\n+\n+\t\timage: blob-ext {\n+\t\t\t filename = \"test.fit\";\n+\t\t};\n+\t};\n+};\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-ecdsa256.dts b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa256.dts\nnew file mode 100644\nindex 00000000000..f15ada3987c\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa256.dts\n@@ -0,0 +1,27 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\tmodel = \"Sandbox Verified Boot Test\";\n+\tcompatible = \"sandbox\";\n+\n+\tbinman {\n+\t};\n+\n+\treset@0 {\n+\t\tcompatible = \"sandbox,reset\";\n+\t};\n+\n+\timage {\n+\t\tpre-load {\n+\t\t\tsig {\n+\t\t\t\talgo-name = \"sha256,ecdsa256\";\n+\t\t\t\tsignature-size = <64>;\n+\t\t\t\tmandatory = \"yes\";\n+\n+\t\t\t\tkey-name = \"dev\";\n+\t\t\t};\n+\t\t};\n+\t};\n+};\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-ecdsa384.dts b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa384.dts\nnew file mode 100644\nindex 00000000000..24540ace249\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa384.dts\n@@ -0,0 +1,27 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\tmodel = \"Sandbox Verified Boot Test\";\n+\tcompatible = \"sandbox\";\n+\n+\tbinman {\n+\t};\n+\n+\treset@0 {\n+\t\tcompatible = \"sandbox,reset\";\n+\t};\n+\n+\timage {\n+\t\tpre-load {\n+\t\t\tsig {\n+\t\t\t\talgo-name = \"sha256,ecdsa384\";\n+\t\t\t\tsignature-size = <96>;\n+\t\t\t\tmandatory = \"yes\";\n+\n+\t\t\t\tkey-name = \"dev\";\n+\t\t\t};\n+\t\t};\n+\t};\n+};\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-ecdsa521.dts b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa521.dts\nnew file mode 100644\nindex 00000000000..72fa3b2c790\n--- /dev/null\n+++ b/test/py/tests/vboot/sandbox-u-boot-global-ecdsa521.dts\n@@ -0,0 +1,27 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\tmodel = \"Sandbox Verified Boot Test\";\n+\tcompatible = \"sandbox\";\n+\n+\tbinman {\n+\t};\n+\n+\treset@0 {\n+\t\tcompatible = \"sandbox,reset\";\n+\t};\n+\n+\timage {\n+\t\tpre-load {\n+\t\t\tsig {\n+\t\t\t\talgo-name = \"sha256,ecdsa521\";\n+\t\t\t\tsignature-size = <132>;\n+\t\t\t\tmandatory = \"yes\";\n+\n+\t\t\t\tkey-name = \"dev\";\n+\t\t\t};\n+\t\t};\n+\t};\n+};\n",
    "prefixes": [
        "v5",
        "15/15"
    ]
}