{"id":2228184,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2228184/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/patch/20260425033742.1519298-9-b-padhi@ti.com/","project":{"id":18,"url":"http://patchwork.ozlabs.org/api/1.1/projects/18/?format=json","name":"U-Boot","link_name":"uboot","list_id":"u-boot.lists.denx.de","list_email":"u-boot@lists.denx.de","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<20260425033742.1519298-9-b-padhi@ti.com>","date":"2026-04-25T03:37:39","name":"[v4,08/11] tools: binman: Add a test for boot and load extensions","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"b162d6d074326db9ea7571da9d3869af47e62294","submitter":{"id":88460,"url":"http://patchwork.ozlabs.org/api/1.1/people/88460/?format=json","name":"Padhi, Beleswar","email":"b-padhi@ti.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/uboot/patch/20260425033742.1519298-9-b-padhi@ti.com/mbox/","series":[{"id":501450,"url":"http://patchwork.ozlabs.org/api/1.1/series/501450/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/list/?series=501450","date":"2026-04-25T03:37:39","name":"Add support to boot TI K3 HSM M4 core","version":4,"mbox":"http://patchwork.ozlabs.org/series/501450/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2228184/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2228184/checks/","tags":{},"headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.a=rsa-sha256\n header.s=selector1 header.b=nMmgCoJl;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=85.214.62.61; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)","phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com","phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de","phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.b=\"nMmgCoJl\";\n\tdkim-atps=neutral","phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com","phobos.denx.de; spf=pass smtp.mailfrom=b-padhi@ti.com"],"Received":["from phobos.denx.de (phobos.denx.de [85.214.62.61])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g2vns2Tc6z1yHv\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 26 Apr 2026 02:06:09 +1000 (AEST)","from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 4ADC48420C;\n\tSat, 25 Apr 2026 18:06:03 +0200 (CEST)","by phobos.denx.de (Postfix, from userid 109)\n id 248CF841DF; Sat, 25 Apr 2026 18:06:02 +0200 (CEST)","from SN4PR2101CU001.outbound.protection.outlook.com\n (mail-southcentralusazlp170120001.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c10d::1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 82E3584099\n for <u-boot@lists.denx.de>; Sat, 25 Apr 2026 18:05:57 +0200 (CEST)","from PH7PR10MB6602.namprd10.prod.outlook.com (2603:10b6:510:206::9)\n by DS4PPF80E5E852F.namprd10.prod.outlook.com (2603:10b6:f:fc00::d2e)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.24; Sat, 25 Apr\n 2026 14:41:28 +0000","from BN9P221CA0009.NAMP221.PROD.OUTLOOK.COM (2603:10b6:408:10a::17)\n by PH7PR10MB6602.namprd10.prod.outlook.com (2603:10b6:510:206::9)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Sat, 25 Apr\n 2026 03:38:27 +0000","from BN2PEPF000044A4.namprd02.prod.outlook.com\n (2603:10b6:408:10a::4) by BN9P221CA0009.outlook.office365.com\n (2603:10b6:408:10a::17) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.23 via Frontend Transport; Sat,\n 25 Apr 2026 03:38:24 +0000","from flwvzet201.ext.ti.com (198.47.21.195) by\n BN2PEPF000044A4.mail.protection.outlook.com (10.167.243.155) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9846.18 via Frontend Transport; Sat, 25 Apr 2026 03:38:22 +0000","from DFLE212.ent.ti.com (10.64.6.70) by flwvzet201.ext.ti.com\n (10.248.192.32) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Fri, 24 Apr\n 2026 22:38:21 -0500","from DFLE201.ent.ti.com (10.64.6.59) by DFLE212.ent.ti.com\n (10.64.6.70) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Fri, 24 Apr\n 2026 22:38:21 -0500","from lelvem-mr06.itg.ti.com (10.180.75.8) by DFLE201.ent.ti.com\n (10.64.6.59) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend\n Transport; Fri, 24 Apr 2026 22:38:21 -0500","from uda0510294.dhcp.ti.com (uda0510294.dhcp.ti.com [10.24.50.162])\n by lelvem-mr06.itg.ti.com (8.18.1/8.18.1) with ESMTP id\n 63P3bk872903263; Fri, 24 Apr 2026 22:38:18 -0500"],"X-Spam-Checker-Version":"SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-1.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,T_SPF_PERMERROR autolearn=no\n autolearn_force=no version=3.4.2","ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=xtbq5snMuUCKvgBo3iybdB1J7lsCxf/Y8+NjW+r8LdYygAB91+MrN9T8ZWRseUJmnzFzAOYnS5HJtLaQdY/BwbYurgAC477ROyx1bdXQr1Uq8tBPsawN2GRA+phL87C59Fq6BtAu7y62mrAOkTtUrmfaYdJGWmktL1YC6IeqBqSnJqho2BFXhW5GolnndEvu8QLPLVVwQkp3RlQBjJt1nkVIKVQ1jAf9HuZ2XdRKrv2rEXnd7+uNpRk2+uemkyNE8xDa2lklePFfk2Puu/i2vraS2Y85+QK1F5lOLTuJEFBEhd1ckm0Iuo2wdLDVb5dwIYnOuWKmwFKnmin8Loi1YQ==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=LJHhbaqBhmFUldgEUGaZP/mPVyAMAOmZedLoC62fl6E=;\n b=YeyYVp48WjbA6uivqW2W4DntMnhebXA9dCDR0yXtA2HxaQsWmZj3DdqVSBan+GnI2j26/FYWJIVWpkKM3SH5QIAQDm2PyYzREqJ4Blsp/39O4I6+tWqrJJAfO/apxU4QKsMb3x4BJEltwQDHSzoUYv5q3tfe2vaJ+c+gx2VGoKrwR3M5ohl2avR3x2NuqFxxt0T32qp2eqcb8OeLMGNUxeDsL9ATIDlk0lkBJI62lov5kweN5S80xC+TpmqQHYTiYgjNKqQf7DnKVg/7LElflb+eZ9rSLIoUAGCI7WM6AaBdaB3SVyoQI2jDAvYnmpU/NG3cdzeiX5BoI7qhQ/q6OA==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 198.47.21.195) smtp.rcpttodomain=chromium.org smtp.mailfrom=ti.com;\n dmarc=pass (p=quarantine sp=none pct=100) action=none header.from=ti.com;\n dkim=none (message not signed); arc=none (0)","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=LJHhbaqBhmFUldgEUGaZP/mPVyAMAOmZedLoC62fl6E=;\n b=nMmgCoJl1JYVZImvOASDHUIW5XQtEhXN1VQFHPMyrJQf3/V4UlUr3Z2fTKTFlq58BG8QolInSzB9Oek8naYm5dbNqDNuBw/sdN4mlwHmraKjPJ7Gl2jsOur/BAOFFdUWGjvzeV74MaZLVkHs3543h61ur9JY7X0nteeNsIB8tL0=","X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 198.47.21.195)\n smtp.mailfrom=ti.com; dkim=none (message not signed) header.d=none;\n dmarc=pass\n action=none header.from=ti.com;","Received-SPF":"Pass (protection.outlook.com: domain of ti.com designates\n 198.47.21.195 as permitted sender) receiver=protection.outlook.com;\n client-ip=198.47.21.195; helo=flwvzet201.ext.ti.com; pr=C","From":"Beleswar Padhi <b-padhi@ti.com>","To":"<trini@konsulko.com>","CC":"<afd@ti.com>, <bb@ti.com>, <anshuld@ti.com>, <hnagalla@ti.com>,\n <jm@ti.com>, <nm@ti.com>, <n-francis@ti.com>, <u-kumar1@ti.com>,\n <b-padhi@ti.com>, <u-boot@lists.denx.de>, Simon Glass <sjg@chromium.org>","Subject":"[PATCH v4 08/11] tools: binman: Add a test for boot and load\n extensions","Date":"Sat, 25 Apr 2026 09:07:39 +0530","Message-ID":"<20260425033742.1519298-9-b-padhi@ti.com>","X-Mailer":"git-send-email 2.34.1","In-Reply-To":"<20260425033742.1519298-1-b-padhi@ti.com>","References":"<20260425033742.1519298-1-b-padhi@ti.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-C2ProcessedOrg":"333ef613-75bf-4e12-a4b1-8e3623f5dcea","X-EOPAttributedMessage":"0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"\n BN2PEPF000044A4:EE_|PH7PR10MB6602:EE_|DS4PPF80E5E852F:EE_","X-MS-Office365-Filtering-Correlation-Id":"3b9ff400-352f-4367-6f13-08dea27c19e2","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|1800799024|82310400026|376014|36860700016|56012099003|22082099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:198.47.21.195; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:flwvzet201.ext.ti.com; PTR:ErrorRetry; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(376014)(36860700016)(56012099003)(22082099003)(18002099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n YfQfwjcoAkN+XGV40Is0fDiuQ/cJ45Ior3teA88dAoMFYpHyEk9pVSa+uk9167A9UnvXRiZkan7YsgC/hdDzYBpEV7rHuHvpRYhD+PhJClJPmzXXhqma5jHiYk0FtPvEluWYuf85t7NfJbQU4I/5QzDvgKTm+FLcFC3ME+c7bZ5QT5FRDVts7WFl21jHqg2DncM7dnD+lhj6ekcuv/sViDmhgPjuUxRqO6w3IpXWC44edFgas88EIeI+rLcXMUQ3W+vAjp2gQ0f7uCMvDTm08LSQvkEaeMLaWaVBHVQa6E/XdnkNiRq9tybi+YLwfLxkHFqBzUwMHY47xRhwXvRG5Sa8JPTa19qs3TwDQvQ4v33xONOjf/nsEsRIDVQfoMko0kaNzq7Li7KMRCtZzVjrjpp0Lo4z+k8b9vSMwfJ9HAYYY6kh+x+mwcA20IfHZ63U","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"25 Apr 2026 03:38:22.5886 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 3b9ff400-352f-4367-6f13-08dea27c19e2","X-MS-Exchange-CrossTenant-Id":"e5b49634-450b-4709-8abb-1e2b19b982b7","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=e5b49634-450b-4709-8abb-1e2b19b982b7; Ip=[198.47.21.195];\n Helo=[flwvzet201.ext.ti.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n BN2PEPF000044A4.namprd02.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"PH7PR10MB6602","X-OriginatorOrg":"ti.com","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.39","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<https://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>","X-Virus-Scanned":"clamav-milter 0.103.8 at phobos.denx.de","X-Virus-Status":"Clean"},"content":"Add test coverage for the boot and load extension functionality in\nti-secure certificates. This verifies that a certificate can be\ngenerated having boot and load extensions.\n\nSigned-off-by: Beleswar Padhi <b-padhi@ti.com>\n---\nCc: Simon Glass <sjg@chromium.org>\n\nv4: Changelog:\n1. New patch. Added binman test for load & boot extensions in\n   certificate.\n\n tools/binman/ftest.py                         | 10 ++++++++\n .../test/vendor/ti_secure_boot_load_ext.dts   | 23 +++++++++++++++++++\n 2 files changed, 33 insertions(+)\n create mode 100644 tools/binman/test/vendor/ti_secure_boot_load_ext.dts","diff":"diff --git a/tools/binman/ftest.py b/tools/binman/ftest.py\nindex ca5149ee654..f36d760375d 100644\n--- a/tools/binman/ftest.py\n+++ b/tools/binman/ftest.py\n@@ -7270,6 +7270,16 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n                                 entry_args=entry_args)[0]\n         self.assertGreater(len(data), len(TI_UNSECURE_DATA))\n \n+    def testPackTiSecureBootLoadExt(self):\n+        \"\"\"Test that an image with TI secured binary having boot & load extensions can be created\"\"\"\n+        keyfile = self.TestFile('security/key.key')\n+        entry_args = {\n+            'keyfile': keyfile,\n+        }\n+        data = self._DoReadFileDtb('vendor/ti_secure_boot_load_ext.dts',\n+                                   entry_args=entry_args)[0]\n+        self.assertGreater(len(data), len(TI_UNSECURE_DATA))\n+\n     def testEncryptedNoAlgo(self):\n         \"\"\"Test encrypted node with missing required properties\"\"\"\n         with self.assertRaises(ValueError) as e:\ndiff --git a/tools/binman/test/vendor/ti_secure_boot_load_ext.dts b/tools/binman/test/vendor/ti_secure_boot_load_ext.dts\nnew file mode 100644\nindex 00000000000..5c29d18e627\n--- /dev/null\n+++ b/tools/binman/test/vendor/ti_secure_boot_load_ext.dts\n@@ -0,0 +1,23 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+\n+/dts-v1/;\n+\n+/ {\n+\t#address-cells = <1>;\n+\t#size-cells = <1>;\n+\n+\tbinman {\n+\t\tti-secure {\n+\t\t\tcontent = <&unsecure_binary>;\n+\t\t\tproc_id = <0x20>;\n+\t\t\tflags_set = <0x00000001>;\n+\t\t\tflags_clr = <0x00000002>;\n+\t\t\treset_vector = <0x70000000>;\n+\t\t\tdest_addr = <0x80000000>;\n+\t\t\tauth_type = <0x02>;\n+\t\t};\n+\t\tunsecure_binary: blob-ext {\n+\t\t\tfilename = \"ti_unsecure.bin\";\n+\t\t};\n+\t};\n+};\n","prefixes":["v4","08/11"]}