{"id":2225953,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2225953/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-15-philippe.reynes@softathome.com/","project":{"id":18,"url":"http://patchwork.ozlabs.org/api/1.2/projects/18/?format=json","name":"U-Boot","link_name":"uboot","list_id":"u-boot.lists.denx.de","list_email":"u-boot@lists.denx.de","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260421210954.1170437-15-philippe.reynes@softathome.com>","list_archive_url":null,"date":"2026-04-21T21:09:53","name":"[v5,14/15] test: py: vboot: prepare test for global signature with ecdsa","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"afa85941da2143ceff4f25c460503e90c732dcca","submitter":{"id":74351,"url":"http://patchwork.ozlabs.org/api/1.2/people/74351/?format=json","name":"Philippe Reynes","email":"philippe.reynes@softathome.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/uboot/patch/20260421210954.1170437-15-philippe.reynes@softathome.com/mbox/","series":[{"id":500895,"url":"http://patchwork.ozlabs.org/api/1.2/series/500895/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/list/?series=500895","date":"2026-04-21T21:09:51","name":"add software ecdsa support","version":5,"mbox":"http://patchwork.ozlabs.org/series/500895/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2225953/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2225953/checks/","tags":{},"related":[],"headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=lLWlonnS;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)","phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com","phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de","phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"lLWlonnS\";\n\tdkim-atps=neutral","phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com","phobos.denx.de;\n spf=pass smtp.mailfrom=philippe.reynes@softathome.com"],"Received":["from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Zlt1F1Gz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 07:11:22 +1000 (AEST)","from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 732C3842FD;\n\tTue, 21 Apr 2026 23:10:28 +0200 (CEST)","by phobos.denx.de (Postfix, from userid 109)\n id C6BD1842C7; Tue, 21 Apr 2026 23:10:13 +0200 (CEST)","from MRZP264CU002.outbound.protection.outlook.com\n (mail-francesouthazlp170100001.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c207::1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id B174D8426E\n for <u-boot@lists.denx.de>; Tue, 21 Apr 2026 23:10:02 +0200 (CEST)","from PA7P264CA0300.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:370::12)\n by PAZP264MB3039.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:1f5::18)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 21:09:58 +0000","from PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:370:cafe::cd) by PA7P264CA0300.outlook.office365.com\n (2603:10a6:102:370::12) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 21:09:58 +0000","from proxy.softathome.com (149.6.166.170) by\n PA2PEPF00019233.mail.protection.outlook.com (10.167.242.39) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Tue, 21 Apr 2026 21:09:58 +0000","from sah1lpt726.softathome.com (unknown [192.168.72.32])\n by proxy.softathome.com (Postfix) with ESMTPSA id 321771FFF1;\n Tue, 21 Apr 2026 23:09:58 +0200 (CEST)"],"X-Spam-Checker-Version":"SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2","ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=pLAFDuqjNIjgVR78qOw1H+fSD1x2VhB9OX5HkdfVI2bZ3yTkUsNJJEaXIU5lD7hDzCQLloOu1QuxWQtjd6Eo5P+6YmgFOOPl1A1Gf1Rz0tlI52pWs5cf23wcdDxDs4MmEvc3/q83MXvy0oW/qrJJJtdFmWQtXA82ziVJ0ZNg5ulmkMe0FiehAFpTk9tX3ahOcIqUeTcqgncANTTRqe0W9Cl9JNFOguVu66Gf7UQR8pez3p7NydJ5ZB7A2INBNMR2rYnC08z0ugW3l/FLhFYkghEJb3iXlSyzxm6XuR1Nr4a3vxaq/kN1UpbXf8aSEG4D0KCVnKIsWppCz2PDzHI/8g==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Kzyw7Hu5ZfRUmK95NqsXRvoWO0GXL7EVVIOh1uAXt2o=;\n b=qJxjgSwuJ18OCBbB0N62fRfT46Avc+mTfu3Yi8bG3e1tX5OggtuGxmcQRhFh6fzTGRxqcg41OLtWdEFWlxzAkQphuPSWCthj69kA5kYIAP3I9EWTBr+2X7WI/ximuHPom6P6I7plgSPtHzqxoOkWmxwzow5VFunHlBY6bur+GxTMAQNnq7tfyXlQWAeI7b5SacsGSGJvRVVldYy2SnV36m6JOgvZ1qKgfl6lzWn0Q2JYwQftM7OEiycgKuwpe9WF003a3pYNkBaLfC8alqqw2BJ9CWR8s96GMKlAxYonHsQJ9Qb+Jlesa7+joCPlmAE3tUNMJCq2yAuusQu8ldZf8A==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=canonical.com smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Kzyw7Hu5ZfRUmK95NqsXRvoWO0GXL7EVVIOh1uAXt2o=;\n b=lLWlonnSvnFyV3XKiVG6kA3wAUU18ba5FdnamxM/+bIcwtLRDWSDg3IFGGUReGjFvKUNgjmXmD4IDPLidt+xTfTGwgM8AebRbC6Pt/tXlBeM+iltAonM20ISSolBmVsPhR/3cS2A7pRlnQEETVYGZ5iBfkXVWSUrUMv08RY/yg26VXYIimNOtXeS4t0LCzLDXfBKxyxqg07fDJEwYzrN5LbxHn8i0BiYebsm5Hpz/yJy6J6O9kaQT9WQtuRsrK95tdpy1eulJlUsl+bTq7ko8BeNCGYesfudqhwwpduSg3RVXEO1QY7OniKkD33xsHr27P3xA14YyLtNs85liQfEKA==","X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;","Received-SPF":"Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C","From":"Philippe Reynes <philippe.reynes@softathome.com>","To":"marko.makela@iki.fi, jonny.green@keytechinc.com, raymondmaoca@gmail.com,\n trini@konsulko.com, simon.glass@canonical.com","Cc":"u-boot@lists.denx.de, Philippe Reynes <philippe.reynes@softathome.com>,\n Simon Glass <sjg@chromium.org>","Subject":"[PATCH v5 14/15] test: py: vboot: prepare test for global signature\n with ecdsa","Date":"Tue, 21 Apr 2026 23:09:53 +0200","Message-ID":"<20260421210954.1170437-15-philippe.reynes@softathome.com>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260421210954.1170437-1-philippe.reynes@softathome.com>","References":"<20260421210954.1170437-1-philippe.reynes@softathome.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-EOPAttributedMessage":"0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"PA2PEPF00019233:EE_|PAZP264MB3039:EE_","Content-Type":"text/plain","X-MS-Office365-Filtering-Correlation-Id":"528ec4ef-0526-408c-8f27-08de9fea582f","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|36860700016|376014|82310400026|1800799024|18002099003|56012099003|22082099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(36860700016)(376014)(82310400026)(1800799024)(18002099003)(56012099003)(22082099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n Ixx3ZUawltmvNgNRI72Edila51GqjyaeeEAVRIUS/v7IKbJf+ShHrXIPUS2DcYhujOVYf0fFB0wNcDnxE9xBTexbnc/2z0TAGUbeAQkeeShpXuFbJ3ZlR5Zg6UEipIR6aPhBTzEkJ8glWD502u59HYYU8gdkciiy3WweB4NMYMho8WrW3l468lQTGjc+7aNCQTZ77/wkBiNDFh4+keOwSKjvOmgkwkEjcy5SHsniDpMwKaDbCofz+BcUGO3jY8WANICvlhXzAtzrKbdxvhR1ymrkmFjiuhH/D7NJo7GwVzTf5eycQaae7R9XTzAwF/8TXA8FhovyDOSpYRu6fyrK6rsMpmJUdXhaeN0HX2Uf6F8JDHD5ZBfNxYiE7W0uTk4nlaDY5Vmwt0H/7lVONrjZyajKdsMpowr+m9FiuD1Toge+Iorjh0sZSQS+CnbnpIUb","X-OriginatorOrg":"softathome.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 21:09:58.3413 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 528ec4ef-0526-408c-8f27-08de9fea582f","X-MS-Exchange-CrossTenant-Id":"aa10e044-e405-4c10-8353-36b4d0cce511","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]","X-MS-Exchange-CrossTenant-AuthSource":"PA2PEPF00019233.FRAP264.PROD.OUTLOOK.COM","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"PAZP264MB3039","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.39","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<https://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>","X-Virus-Scanned":"clamav-milter 0.103.8 at phobos.denx.de","X-Virus-Status":"Clean"},"content":"The vboot tests only consider rsa for test with global signature.\nTo prepare the integration of test with ecdsa test, the signature\nalgo is now explicit.\n\nReviewed-by: Simon Glass <sjg@chromium.org>\nSigned-off-by: Philippe Reynes <philippe.reynes@softathome.com>\n---\nv3:\n- initial version\nv4:\n- no change\nv5:\n- no change\n\n test/py/tests/test_vboot.py                          | 12 ++++++------\n ...binman-pss.dts => sandbox-binman-rsa2048-pss.dts} |  0\n ...sandbox-binman.dts => sandbox-binman-rsa2048.dts} |  0\n ...pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} |  0\n ...-global.dts => sandbox-u-boot-global-rsa2048.dts} |  0\n 5 files changed, 6 insertions(+), 6 deletions(-)\n rename test/py/tests/vboot/{sandbox-binman-pss.dts => sandbox-binman-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-binman.dts => sandbox-binman-rsa2048.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global-pss.dts => sandbox-u-boot-global-rsa2048-pss.dts} (100%)\n rename test/py/tests/vboot/{sandbox-u-boot-global.dts => sandbox-u-boot-global-rsa2048.dts} (100%)","diff":"diff --git a/test/py/tests/test_vboot.py b/test/py/tests/test_vboot.py\nindex 4e4d9529031..22865f653c5 100644\n--- a/test/py/tests/test_vboot.py\n+++ b/test/py/tests/test_vboot.py\n@@ -503,7 +503,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n                           dtb)\n         run_bootm(sha_algo, 'multi required key', '', False)\n \n-    def test_global_sign(sha_algo, padding, sign_options):\n+    def test_global_sign(sha_algo, sig_algo, padding, sign_options):\n         \"\"\"Test global image signature with the given hash algorithm and padding.\n \n         Args:\n@@ -512,14 +512,14 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n                     rsa signature algorithm.\n         \"\"\"\n \n-        dtb = '%ssandbox-u-boot-global%s.dtb' % (tmpdir, padding)\n+        dtb = '%ssandbox-u-boot-global%s%s.dtb' % (tmpdir, sig_algo, padding)\n         ubman.config.dtb = dtb\n \n         # Compile our device tree files for kernel and U-Boot. These are\n         # regenerated here since mkimage will modify them (by adding a\n         # public key) below.\n         dtc('sandbox-kernel.dts', ubman, dtc_args, datadir, tmpdir, dtb)\n-        dtc_options('sandbox-u-boot-global%s.dts' % padding, '-p 1024')\n+        dtc_options('sandbox-u-boot-global%s%s.dts' % (sig_algo, padding), '-p 1024')\n \n         # Build the FIT with dev key (keys NOT required). This adds the\n         # signature into sandbox-u-boot.dtb, NOT marked 'required'.\n@@ -528,11 +528,11 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n \n         # Build the dtb for binman that define the pre-load header\n         # with the global sigature.\n-        dtc('sandbox-binman%s.dts' % padding, ubman, dtc_args, datadir, tmpdir, dtb)\n+        dtc('sandbox-binman%s%s.dts' % (sig_algo, padding), ubman, dtc_args, datadir, tmpdir, dtb)\n \n         # Run binman to create the final image with the not signed fit\n         # and the pre-load header that contains the global signature.\n-        run_binman('sandbox-binman%s.dtb' % padding)\n+        run_binman('sandbox-binman%s%s.dtb' % (sig_algo, padding))\n \n         # Check that the signature is correctly verified by u-boot\n         run_bootm(sha_algo, 'global image signature',\n@@ -582,7 +582,7 @@ def test_vboot(ubman, name, sha_algo, sig_algo, padding, sign_options, required,\n     try:\n         ubman.config.dtb = dtb\n         if global_sign:\n-            test_global_sign(sha_algo, padding, sign_options)\n+            test_global_sign(sha_algo, sig_algo, padding, sign_options)\n         elif required:\n             test_required_key(sha_algo, sig_algo, padding, sign_options)\n         else:\ndiff --git a/test/py/tests/vboot/sandbox-binman-pss.dts b/test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman-pss.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-binman.dts b/test/py/tests/vboot/sandbox-binman-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-binman.dts\nrename to test/py/tests/vboot/sandbox-binman-rsa2048.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global-pss.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global-pss.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048-pss.dts\ndiff --git a/test/py/tests/vboot/sandbox-u-boot-global.dts b/test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\nsimilarity index 100%\nrename from test/py/tests/vboot/sandbox-u-boot-global.dts\nrename to test/py/tests/vboot/sandbox-u-boot-global-rsa2048.dts\n","prefixes":["v5","14/15"]}