{"id":2224490,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2224490/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/patch/20260417130204.49896-14-philippe.reynes@softathome.com/","project":{"id":18,"url":"http://patchwork.ozlabs.org/api/1.2/projects/18/?format=json","name":"U-Boot","link_name":"uboot","list_id":"u-boot.lists.denx.de","list_email":"u-boot@lists.denx.de","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260417130204.49896-14-philippe.reynes@softathome.com>","list_archive_url":null,"date":"2026-04-17T13:02:03","name":"[v4,13/14] test: py: vboot: prepare test for global signature with ecdsa","commit_ref":null,"pull_url":null,"state":"superseded","archived":false,"hash":"afa85941da2143ceff4f25c460503e90c732dcca","submitter":{"id":74351,"url":"http://patchwork.ozlabs.org/api/1.2/people/74351/?format=json","name":"Philippe Reynes","email":"philippe.reynes@softathome.com"},"delegate":{"id":161313,"url":"http://patchwork.ozlabs.org/api/1.2/users/161313/?format=json","username":"raymo200915","first_name":"Raymond","last_name":"Mao","email":"raymondmaoca@gmail.com"},"mbox":"http://patchwork.ozlabs.org/project/uboot/patch/20260417130204.49896-14-philippe.reynes@softathome.com/mbox/","series":[{"id":500332,"url":"http://patchwork.ozlabs.org/api/1.2/series/500332/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/list/?series=500332","date":"2026-04-17T13:02:04","name":"add software ecdsa support","version":4,"mbox":"http://patchwork.ozlabs.org/series/500332/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2224490/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2224490/checks/","tags":{},"related":[],"headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=e6NDfl2R;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=85.214.62.61; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)","phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com","phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de","phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"e6NDfl2R\";\n\tdkim-atps=neutral","phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com","phobos.denx.de;\n spf=pass smtp.mailfrom=philippe.reynes@softathome.com"],"Received":["from phobos.denx.de (phobos.denx.de [85.214.62.61])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxw862kDHz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 17 Apr 2026 23:04:38 +1000 (AEST)","from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 186EA843DC;\n\tFri, 17 Apr 2026 15:02:24 +0200 (CEST)","by phobos.denx.de (Postfix, from userid 109)\n id DFD2A84319; Fri, 17 Apr 2026 15:02:21 +0200 (CEST)","from PA5P264CU001.outbound.protection.outlook.com\n (mail-francecentralazlp170100000.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c20a::])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 7A09E84347\n for <u-boot@lists.denx.de>; Fri, 17 Apr 2026 15:02:18 +0200 (CEST)","from PA7P264CA0182.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:376::16)\n by MR1P264MB2724.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:39::18) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Fri, 17 Apr\n 2026 13:02:10 +0000","from PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:376:cafe::1d) by PA7P264CA0182.outlook.office365.com\n (2603:10a6:102:376::16) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.52 via Frontend Transport; Fri,\n 17 Apr 2026 13:02:10 +0000","from proxy.softathome.com (149.6.166.170) by\n PA2PEPF00019233.mail.protection.outlook.com (10.167.242.39) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.17\n via Frontend Transport; Fri, 17 Apr 2026 13:02:10 +0000","from sah1lpt726.home (unknown [192.168.72.39])\n by proxy.softathome.com (Postfix) with ESMTPSA id A996020E61;\n Fri, 17 Apr 2026 15:02:10 +0200 (CEST)"],"X-Spam-Checker-Version":"SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2","ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=SHnKufSdSsANXfXPImGAY4MKC5a70Hn0Zl3m5/CG11GSwFT7Ufn1x85xFGU2nep/RlPeenKJ4LV94A2D5P/XRLn4ZDgWVHwIDLjkAVfOK26j1+wO+BgYaNwIM4HhgeuCtd7XhyAjZf8VqUnC3I0kUCEDk9iMbSg+S00C5a4VSGynXpNzhG/nP+TMsCL2JO6Aaln9Jkje0HwY7iw6rt7vMZgPo4a5Q4Jc8JxYQf2qxaggpANp9BQJe4Y8t6danQ7BVMI3aWSPhqVFPqR4+9/X6NPobLAud5o3mVCo25a0dA9aaum7dHiUugTdG84CXt+8J6j5E0Cx9qn5WnL4agETyQ==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=WQnMRS8Fa8Upq1gqwXpFyyITt9Wx/P4xSvQ7fcX0I5g=;\n b=xsNcnbVd1P+2tT0GT1i6m0KAK3Tkf9BLx+CPGvt+qrBq/Gw2pJKTatA5DvIjf6Lg2NNEjnvbPMJpAvUxyYaWtqT4WhSBGnn/YcQSPzRV8dVvw68cIgasJqYY7GKLC0P/1Qy5afhfL8BGLCr9/EaEPJ8aco8LUHwJA8ysQmCjcX4LK+jwtg4pvzyNZ4pra+dn6moLZKV4Ce2ZceuEnpkvM3jffkCC5M/V0t2Uo9lTZ4NeWiYNV6NiJrNRPGTwCf+kgA5RFICVYD6eekaulrmrZXM1PLFBBolK19NdYz5QkbfEvYZO754XmPHQayBoqlICodv5d1w5VD3ZOknkly1a7w==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=canonical.com smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=WQnMRS8Fa8Upq1gqwXpFyyITt9Wx/P4xSvQ7fcX0I5g=;\n b=e6NDfl2RZ35BAGZX3SW4jyfHkXR/IadBOftrh1MykjfpxkzpJie9++6aueu3/fzvDuM8DYLwjnXJaD/xAjIfZZvGAu4DXW7SnXtVCJpAO5IfouO1lmRlOtrBSZe6Qc6R/O7dnXYVKarPNK1YgKA7rz9LSEfMnyL5wMT81aFECYyAXK2+g6fSctJR+WctwD/RBLSFVsXguO/gb8lOB268afTwsQinMoOAs+ATzbesfHJ6D2GXa3B0cUVBUFY+eR/GX8H4lvLWI6SjHXmHLP2+k9ANqF43/vMvuLXJH39y7n+9nqEkArkb+khqGU6kHMLWHZO0O6k3AVCmYVKk/HRzig==","X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;","Received-SPF":"Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C","From":"Philippe Reynes <philippe.reynes@softathome.com>","To":"marko.makela@iki.fi, jonny.green@keytechinc.com, raymondmaoca@gmail.com,\n trini@konsulko.com, simon.glass@canonical.com","Cc":"u-boot@lists.denx.de,\n\tPhilippe Reynes <philippe.reynes@softathome.com>","Subject":"[PATCH v4 13/14] test: py: vboot: prepare test for global signature\n with ecdsa","Date":"Fri, 17 Apr 2026 15:02:03 +0200","Message-ID":"<20260417130204.49896-14-philippe.reynes@softathome.com>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260417130204.49896-1-philippe.reynes@softathome.com>","References":"<20260417130204.49896-1-philippe.reynes@softathome.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-EOPAttributedMessage":"0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"PA2PEPF00019233:EE_|MR1P264MB2724:EE_","Content-Type":"text/plain","X-MS-Office365-Filtering-Correlation-Id":"6dd19c64-a297-43e7-ece0-08de9c8189b8","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|1800799024|376014|36860700016|82310400026|56012099003|22082099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(1800799024)(376014)(36860700016)(82310400026)(56012099003)(22082099003)(18002099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n B61d3zbcqXBqgW6N7GciI9Fq9K/pW0Rz/wHj+g81fDUkIvyVO5QdKdGHwVkulnlC+J79Puf9rDsimPErosfehpLznoRRrqBPGWIU/eNWtd/KE7H825JYWy/rtSwZpJ140wNYbv2JUUQXwTg4JQda0mRO4SbV2xE4L5T6fzc/x3RVvmWs6rtrv+YfumZtKeR3mQQ0SOgXnxcNnTyes2troc9tVfnZKhtDZS1+G7TI6+8gKevX2Cy+tWkFrYVv4gno8brYojgTESEYsLG6eBQ5ncDRN63IzB8rivJuRjUgske76s7CdzEC5LivfZC50g2VCPwaR1aAHmXrpHDj2eg3fGVpypCtBE8ZzyVHco8+JAq4DUVsF/fw5fxv6FloyZr3ttjFnAJXuY+V4/svqyVRuc2xLANDGJm9PogjUj1/obwdRuTE4Bh41uPumTfTtzAW","X-OriginatorOrg":"softathome.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"17 Apr 2026 13:02:10.8004 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 6dd19c64-a297-43e7-ece0-08de9c8189b8","X-MS-Exchange-CrossTenant-Id":"aa10e044-e405-4c10-8353-36b4d0cce511","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]","X-MS-Exchange-CrossTenant-AuthSource":"PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"MR1P264MB2724","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.39","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<https://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>","X-Virus-Scanned":"clamav-milter 0.103.8 at phobos.denx.de","X-Virus-Status":"Clean"},"content":"The vboot tests only consider rsa for test with global signature.\nTo prepare the integration of test with ecdsa test, the signature\nalgo is now explicit.\n\nSigned-off-by: Philippe Reynes <philippe.reynes@softathome.com>\n---\nv3:\n- initial version\nv4:\n- no change\n\n test/py/tests/test_vboot.py                          | 12 ++++++------\n ...binman-pss.dts => sandbox-binman-rsa2048-pss.dts} |  0\n ...sandbox-binman.dts => sandbox-binman-rsa2048.dts} |  0\n ...pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} |  0\n ...-global.dts => sandbox-u-boot-global-rsa2048.dts} |  0\n 5 files changed, 6 insertions(+), 6 deletions(-)\n rename test/py/tests/vboot/{sandbox-binman-pss.dts => sandbox-binman-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-binman.dts => sandbox-binman-rsa2048.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global-pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global.dts => sandbox-u-boot-global-rsa2048.dts} (100%)","diff":"diff --git a/test/py/tests/test_vboot.py b/test/py/tests/test_vboot.py\nindex 4e4d9529031..22865f653c5 100644\n--- a/test/py/tests/test_vboot.py\n+++ b/test/py/tests/test_vboot.py\n@@ -503,7 +503,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n                           dtb)\n         run_bootm(sha_algo, 'multi required key', '', False)\n \n-    def test_global_sign(sha_algo, padding, sign_options):\n+    def test_global_sign(sha_algo, sig_algo, padding, sign_options):\n         \"\"\"Test global image signature with the given hash algorithm and padding.\n \n         Args:\n@@ -512,14 +512,14 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n                     rsa signature algorithm.\n         \"\"\"\n \n-        dtb = '%ssandbox-u-boot-global%s.dtb' % (tmpdir, padding)\n+        dtb = '%ssandbox-u-boot-global%s%s.dtb' % (tmpdir, sig_algo, padding)\n         ubman.config.dtb = dtb\n \n         # Compile our device tree files for kernel and U-Boot. These are\n         # regenerated here since mkimage will modify them (by adding a\n         # public key) below.\n         dtc('sandbox-kernel.dts', ubman, dtc_args, datadir, tmpdir, dtb)\n-        dtc_options('sandbox-u-boot-global%s.dts' % padding, '-p 1024')\n+        dtc_options('sandbox-u-boot-global%s%s.dts' % (sig_algo, padding), '-p 1024')\n \n         # Build the FIT with dev key (keys NOT required). This adds the\n         # signature into sandbox-u-boot.dtb, NOT marked 'required'.\n@@ -528,11 +528,11 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n \n         # Build the dtb for binman that define the pre-load header\n         # with the global sigature.\n-        dtc('sandbox-binman%s.dts' % padding, ubman, dtc_args, datadir, tmpdir, dtb)\n+        dtc('sandbox-binman%s%s.dts' % (sig_algo, padding), ubman, dtc_args, datadir, tmpdir, dtb)\n \n         # Run binman to create the final image with the not signed fit\n         # and the pre-load header that contains the global signature.\n-        run_binman('sandbox-binman%s.dtb' % padding)\n+        run_binman('sandbox-binman%s%s.dtb' % (sig_algo, padding))\n \n         # Check that the signature is correctly verified by u-boot\n         run_bootm(sha_algo, 'global image signature',\n@@ -582,7 +582,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n     try:\n         ubman.config.dtb = dtb\n         if global_sign:\n-            test_global_sign(sha_algo, padding, sign_options)\n+            test_global_sign(sha_algo, sig_algo, padding, sign_options)\n         elif required:\n             test_required_key(sha_algo, sig_algo, padding, sign_options)\n         else:\ndiff --git a/test/py/tests/vboot/sandbox-binman-pss.dts b/test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman-pss.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-binman.dts b/test/py/tests/vboot/sandbox-binman-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-pss.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global-pss.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\n","prefixes":["v4","13/14"]}