Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2225953/?format=api
{ "id": 2225953, "url": "http://patchwork.ozlabs.org/api/patches/2225953/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-15-philippe.reynes@softathome.com/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260421210954.1170437-15-philippe.reynes@softathome.com>", "list_archive_url": null, "date": "2026-04-21T21:09:53", "name": "[v5,14/15] test: py: vboot: prepare test for global signature with ecdsa", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "afa85941da2143ceff4f25c460503e90c732dcca", "submitter": { "id": 74351, "url": "http://patchwork.ozlabs.org/api/people/74351/?format=api", "name": "Philippe Reynes", "email": "philippe.reynes@softathome.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-15-philippe.reynes@softathome.com/mbox/", "series": [ { "id": 500895, "url": "http://patchwork.ozlabs.org/api/series/500895/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=500895", "date": "2026-04-21T21:09:51", "name": "add software ecdsa support", "version": 5, "mbox": "http://patchwork.ozlabs.org/series/500895/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2225953/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2225953/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=lLWlonnS;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"lLWlonnS\";\n\tdkim-atps=neutral", "phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=philippe.reynes@softathome.com" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Zlt1F1Gz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 07:11:22 +1000 (AEST)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 732C3842FD;\n\tTue, 21 Apr 2026 23:10:28 +0200 (CEST)", "by phobos.denx.de (Postfix, from userid 109)\n id C6BD1842C7; Tue, 21 Apr 2026 23:10:13 +0200 (CEST)", "from MRZP264CU002.outbound.protection.outlook.com\n (mail-francesouthazlp170100001.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c207::1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id B174D8426E\n for <u-boot@lists.denx.de>; Tue, 21 Apr 2026 23:10:02 +0200 (CEST)", "from PA7P264CA0300.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:370::12)\n by PAZP264MB3039.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:1f5::18)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 21:09:58 +0000", "from PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:370:cafe::cd) by PA7P264CA0300.outlook.office365.com\n (2603:10a6:102:370::12) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 21:09:58 +0000", "from proxy.softathome.com (149.6.166.170) by\n PA2PEPF00019233.mail.protection.outlook.com (10.167.242.39) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Tue, 21 Apr 2026 21:09:58 +0000", "from sah1lpt726.softathome.com (unknown [192.168.72.32])\n by proxy.softathome.com (Postfix) with ESMTPSA id 321771FFF1;\n Tue, 21 Apr 2026 23:09:58 +0200 (CEST)" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=pLAFDuqjNIjgVR78qOw1H+fSD1x2VhB9OX5HkdfVI2bZ3yTkUsNJJEaXIU5lD7hDzCQLloOu1QuxWQtjd6Eo5P+6YmgFOOPl1A1Gf1Rz0tlI52pWs5cf23wcdDxDs4MmEvc3/q83MXvy0oW/qrJJJtdFmWQtXA82ziVJ0ZNg5ulmkMe0FiehAFpTk9tX3ahOcIqUeTcqgncANTTRqe0W9Cl9JNFOguVu66Gf7UQR8pez3p7NydJ5ZB7A2INBNMR2rYnC08z0ugW3l/FLhFYkghEJb3iXlSyzxm6XuR1Nr4a3vxaq/kN1UpbXf8aSEG4D0KCVnKIsWppCz2PDzHI/8g==", "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Kzyw7Hu5ZfRUmK95NqsXRvoWO0GXL7EVVIOh1uAXt2o=;\n b=qJxjgSwuJ18OCBbB0N62fRfT46Avc+mTfu3Yi8bG3e1tX5OggtuGxmcQRhFh6fzTGRxqcg41OLtWdEFWlxzAkQphuPSWCthj69kA5kYIAP3I9EWTBr+2X7WI/ximuHPom6P6I7plgSPtHzqxoOkWmxwzow5VFunHlBY6bur+GxTMAQNnq7tfyXlQWAeI7b5SacsGSGJvRVVldYy2SnV36m6JOgvZ1qKgfl6lzWn0Q2JYwQftM7OEiycgKuwpe9WF003a3pYNkBaLfC8alqqw2BJ9CWR8s96GMKlAxYonHsQJ9Qb+Jlesa7+joCPlmAE3tUNMJCq2yAuusQu8ldZf8A==", "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=canonical.com smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Kzyw7Hu5ZfRUmK95NqsXRvoWO0GXL7EVVIOh1uAXt2o=;\n b=lLWlonnSvnFyV3XKiVG6kA3wAUU18ba5FdnamxM/+bIcwtLRDWSDg3IFGGUReGjFvKUNgjmXmD4IDPLidt+xTfTGwgM8AebRbC6Pt/tXlBeM+iltAonM20ISSolBmVsPhR/3cS2A7pRlnQEETVYGZ5iBfkXVWSUrUMv08RY/yg26VXYIimNOtXeS4t0LCzLDXfBKxyxqg07fDJEwYzrN5LbxHn8i0BiYebsm5Hpz/yJy6J6O9kaQT9WQtuRsrK95tdpy1eulJlUsl+bTq7ko8BeNCGYesfudqhwwpduSg3RVXEO1QY7OniKkD33xsHr27P3xA14YyLtNs85liQfEKA==", "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;", "Received-SPF": "Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C", "From": "Philippe Reynes <philippe.reynes@softathome.com>", "To": "marko.makela@iki.fi, jonny.green@keytechinc.com, raymondmaoca@gmail.com,\n trini@konsulko.com, simon.glass@canonical.com", "Cc": "u-boot@lists.denx.de, Philippe Reynes <philippe.reynes@softathome.com>,\n Simon Glass <sjg@chromium.org>", "Subject": "[PATCH v5 14/15] test: py: vboot: prepare test for global signature\n with ecdsa", "Date": "Tue, 21 Apr 2026 23:09:53 +0200", "Message-ID": "<20260421210954.1170437-15-philippe.reynes@softathome.com>", "X-Mailer": "git-send-email 2.43.0", "In-Reply-To": "<20260421210954.1170437-1-philippe.reynes@softathome.com>", "References": "<20260421210954.1170437-1-philippe.reynes@softathome.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-EOPAttributedMessage": "0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "PA2PEPF00019233:EE_|PAZP264MB3039:EE_", "Content-Type": "text/plain", "X-MS-Office365-Filtering-Correlation-Id": "528ec4ef-0526-408c-8f27-08de9fea582f", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|36860700016|376014|82310400026|1800799024|18002099003|56012099003|22082099003;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(36860700016)(376014)(82310400026)(1800799024)(18002099003)(56012099003)(22082099003);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n Ixx3ZUawltmvNgNRI72Edila51GqjyaeeEAVRIUS/v7IKbJf+ShHrXIPUS2DcYhujOVYf0fFB0wNcDnxE9xBTexbnc/2z0TAGUbeAQkeeShpXuFbJ3ZlR5Zg6UEipIR6aPhBTzEkJ8glWD502u59HYYU8gdkciiy3WweB4NMYMho8WrW3l468lQTGjc+7aNCQTZ77/wkBiNDFh4+keOwSKjvOmgkwkEjcy5SHsniDpMwKaDbCofz+BcUGO3jY8WANICvlhXzAtzrKbdxvhR1ymrkmFjiuhH/D7NJo7GwVzTf5eycQaae7R9XTzAwF/8TXA8FhovyDOSpYRu6fyrK6rsMpmJUdXhaeN0HX2Uf6F8JDHD5ZBfNxYiE7W0uTk4nlaDY5Vmwt0H/7lVONrjZyajKdsMpowr+m9FiuD1Toge+Iorjh0sZSQS+CnbnpIUb", "X-OriginatorOrg": "softathome.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "21 Apr 2026 21:09:58.3413 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 528ec4ef-0526-408c-8f27-08de9fea582f", "X-MS-Exchange-CrossTenant-Id": "aa10e044-e405-4c10-8353-36b4d0cce511", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]", "X-MS-Exchange-CrossTenant-AuthSource": "PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "PAZP264MB3039", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "The vboot tests only consider rsa for test with global signature.\nTo prepare the integration of test with ecdsa test, the signature\nalgo is now explicit.\n\nReviewed-by: Simon Glass <sjg@chromium.org>\nSigned-off-by: Philippe Reynes <philippe.reynes@softathome.com>\n---\nv3:\n- initial version\nv4:\n- no change\nv5:\n- no change\n\n test/py/tests/test_vboot.py | 12 ++++++------\n ...binman-pss.dts => sandbox-binman-rsa2048-pss.dts} | 0\n ...sandbox-binman.dts => sandbox-binman-rsa2048.dts} | 0\n ...pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} | 0\n ...-global.dts => sandbox-u-boot-global-rsa2048.dts} | 0\n 5 files changed, 6 insertions(+), 6 deletions(-)\n rename test/py/tests/vboot/{sandbox-binman-pss.dts => sandbox-binman-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-binman.dts => sandbox-binman-rsa2048.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global-pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global.dts => sandbox-u-boot-global-rsa2048.dts} (100%)", "diff": "diff --git a/test/py/tests/test_vboot.py b/test/py/tests/test_vboot.py\nindex 4e4d9529031..22865f653c5 100644\n--- a/test/py/tests/test_vboot.py\n+++ b/test/py/tests/test_vboot.py\n@@ -503,7 +503,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n dtb)\n run_bootm(sha_algo, 'multi required key', '', False)\n \n- def test_global_sign(sha_algo, padding, sign_options):\n+ def test_global_sign(sha_algo, sig_algo, padding, sign_options):\n \"\"\"Test global image signature with the given hash algorithm and padding.\n \n Args:\n@@ -512,14 +512,14 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n rsa signature algorithm.\n \"\"\"\n \n- dtb = '%ssandbox-u-boot-global%s.dtb' % (tmpdir, padding)\n+ dtb = '%ssandbox-u-boot-global%s%s.dtb' % (tmpdir, sig_algo, padding)\n ubman.config.dtb = dtb\n \n # Compile our device tree files for kernel and U-Boot. These are\n # regenerated here since mkimage will modify them (by adding a\n # public key) below.\n dtc('sandbox-kernel.dts', ubman, dtc_args, datadir, tmpdir, dtb)\n- dtc_options('sandbox-u-boot-global%s.dts' % padding, '-p 1024')\n+ dtc_options('sandbox-u-boot-global%s%s.dts' % (sig_algo, padding), '-p 1024')\n \n # Build the FIT with dev key (keys NOT required). This adds the\n # signature into sandbox-u-boot.dtb, NOT marked 'required'.\n@@ -528,11 +528,11 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n \n # Build the dtb for binman that define the pre-load header\n # with the global sigature.\n- dtc('sandbox-binman%s.dts' % padding, ubman, dtc_args, datadir, tmpdir, dtb)\n+ dtc('sandbox-binman%s%s.dts' % (sig_algo, padding), ubman, dtc_args, datadir, tmpdir, dtb)\n \n # Run binman to create the final image with the not signed fit\n # and the pre-load header that contains the global signature.\n- run_binman('sandbox-binman%s.dtb' % padding)\n+ run_binman('sandbox-binman%s%s.dtb' % (sig_algo, padding))\n \n # Check that the signature is correctly verified by u-boot\n run_bootm(sha_algo, 'global image signature',\n@@ -582,7 +582,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n try:\n ubman.config.dtb = dtb\n if global_sign:\n- test_global_sign(sha_algo, padding, sign_options)\n+ test_global_sign(sha_algo, sig_algo, padding, sign_options)\n elif required:\n test_required_key(sha_algo, sig_algo, padding, sign_options)\n else:\ndiff --git a/test/py/tests/vboot/sandbox-binman-pss.dts b/test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman-pss.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-binman.dts b/test/py/tests/vboot/sandbox-binman-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-pss.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global-pss.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\n", "prefixes": [ "v5", "14/15" ] }