0s autopkgtest [14:36:59]: starting date and time: 2026-01-30 14:36:59+0000 0s autopkgtest [14:36:59]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [14:36:59]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.qeislq7f/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-cryptography,src:sphinx-rtd-theme --apt-upgrade imx-code-signing-tool --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-cryptography/46.0.1-1ubuntu2 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-amd64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-9.secgroup --name adt-resolute-amd64-imx-code-signing-tool-20260130-143659-juju-7f2275-prod-proposed-migration-environment-2-04ed6728-f6d1-4e8d-b125-e855e30cce26 --image adt/ubuntu-resolute-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-amd64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-amd64-imx-code-signing-tool-20260130-143659-juju-7f2275-prod-proposed-migration-environment-2-04ed6728-f6d1-4e8d-b125-e855e30cce26 from image adt/ubuntu-resolute-amd64-server-20260130.img (UUID afba56f8-6ab4-44eb-9e07-036bcbd7054f)... 73s autopkgtest [14:38:12]: testbed dpkg architecture: amd64 73s autopkgtest [14:38:12]: testbed apt version: 3.1.14 73s autopkgtest [14:38:12]: @@@@@@@@@@@@@@@@@@@@ test bed setup 73s autopkgtest [14:38:12]: testbed release detected to be: None 74s autopkgtest [14:38:13]: updating testbed package index (apt update) 74s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 74s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 74s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 74s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 74s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [103 kB] 74s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [34.2 kB] 74s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1393 kB] 75s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [2820 B] 75s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [121 kB] 75s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [104 kB] 75s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [4348 B] 75s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3696 B] 75s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [12.3 kB] 75s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 75s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [430 kB] 75s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1088 kB] 76s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [33.9 kB] 76s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [5832 B] 76s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [28.9 kB] 76s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1332 B] 76s Fetched 3490 kB in 2s (2070 kB/s) 77s Reading package lists... 78s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 78s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 78s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 78s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 78s Reading package lists... 78s Reading package lists... 78s Building dependency tree... 78s Reading state information... 79s Calculating upgrade... 79s The following packages will be REMOVED: 79s python3-openssl 79s The following packages will be upgraded: 79s bzip2 inetutils-telnet libbz2-1.0 libsqlite3-0 python3-cryptography 79s rng-tools-debian telnet 79s 7 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 79s Need to get 2134 kB of archives. 79s After this operation, 497 kB of additional disk space will be used. 79s Get:1 http://ftpmaster.internal/ubuntu resolute/universe amd64 rng-tools-debian amd64 2.6build1 [46.1 kB] 79s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 bzip2 amd64 1.0.8-6build2 [34.3 kB] 79s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libbz2-1.0 amd64 1.0.8-6build2 [37.0 kB] 79s Get:4 http://ftpmaster.internal/ubuntu resolute/main amd64 libsqlite3-0 amd64 3.46.1-9 [722 kB] 79s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 inetutils-telnet amd64 2:2.7-2ubuntu1 [107 kB] 79s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 telnet all 0.17+2.7-2ubuntu1 [3636 B] 79s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 python3-cryptography amd64 46.0.1-1ubuntu2 [1183 kB] 80s dpkg-preconfigure: unable to re-open stdin: No such file or directory 80s Fetched 2134 kB in 1s (3521 kB/s) 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 124209 files and directories currently installed.) 80s Removing python3-openssl (25.1.0-1) ... 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 124194 files and directories currently installed.) 80s Preparing to unpack .../rng-tools-debian_2.6build1_amd64.deb ... 80s Unpacking rng-tools-debian (2.6build1) over (2.6) ... 80s Preparing to unpack .../bzip2_1.0.8-6build2_amd64.deb ... 80s Unpacking bzip2 (1.0.8-6build2) over (1.0.8-6build1) ... 80s Preparing to unpack .../libbz2-1.0_1.0.8-6build2_amd64.deb ... 80s Unpacking libbz2-1.0:amd64 (1.0.8-6build2) over (1.0.8-6build1) ... 80s Setting up libbz2-1.0:amd64 (1.0.8-6build2) ... 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 124194 files and directories currently installed.) 80s Preparing to unpack .../libsqlite3-0_3.46.1-9_amd64.deb ... 80s Unpacking libsqlite3-0:amd64 (3.46.1-9) over (3.46.1-8) ... 80s Preparing to unpack .../inetutils-telnet_2%3a2.7-2ubuntu1_amd64.deb ... 80s Unpacking inetutils-telnet (2:2.7-2ubuntu1) over (2:2.6-4ubuntu1) ... 80s Preparing to unpack .../telnet_0.17+2.7-2ubuntu1_all.deb ... 80s Unpacking telnet (0.17+2.7-2ubuntu1) over (0.17+2.6-4ubuntu1) ... 80s Preparing to unpack .../python3-cryptography_46.0.1-1ubuntu2_amd64.deb ... 80s Unpacking python3-cryptography (46.0.1-1ubuntu2) over (43.0.0-1ubuntu1) ... 80s Setting up libsqlite3-0:amd64 (3.46.1-9) ... 80s Setting up inetutils-telnet (2:2.7-2ubuntu1) ... 80s Setting up bzip2 (1.0.8-6build2) ... 80s Setting up python3-cryptography (46.0.1-1ubuntu2) ... 80s Setting up rng-tools-debian (2.6build1) ... 81s Setting up telnet (0.17+2.7-2ubuntu1) ... 81s Processing triggers for man-db (2.13.1-1) ... 82s Processing triggers for libc-bin (2.42-2ubuntu4) ... 82s autopkgtest [14:38:21]: upgrading testbed (apt dist-upgrade and autopurge) 82s Reading package lists... 82s Building dependency tree... 82s Reading state information... 82s Calculating upgrade... 82s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 82s Reading package lists... 83s Building dependency tree... 83s Reading state information... 83s Solving dependencies... 83s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 83s autopkgtest [14:38:22]: rebooting testbed after setup commands that affected boot 113s autopkgtest [14:38:52]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 115s autopkgtest [14:38:54]: @@@@@@@@@@@@@@@@@@@@ apt-source imx-code-signing-tool 116s Get:1 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (dsc) [1663 B] 116s Get:2 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (tar) [3065 kB] 116s Get:3 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (diff) [9932 B] 116s gpgv: Signature made Wed Jun 4 07:09:33 2025 UTC 116s gpgv: using EDDSA key 83DCD17F44B22CC83656EDA1E8446B4AC8C77261 116s gpgv: Can't check signature: No public key 116s dpkg-source: warning: cannot verify inline signature for ./imx-code-signing-tool_3.4.1+dfsg-6.dsc: no acceptable signature found 116s autopkgtest [14:38:55]: testing package imx-code-signing-tool version 3.4.1+dfsg-6 117s autopkgtest [14:38:56]: build not needed 117s autopkgtest [14:38:56]: test smoke: preparing testbed 117s Reading package lists... 117s Building dependency tree... 117s Reading state information... 117s Solving dependencies... 118s The following NEW packages will be installed: 118s imx-code-signing-tool libeac3 opensc opensc-pkcs11 118s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 118s Need to get 4627 kB of archives. 118s After this operation, 8191 kB of additional disk space will be used. 118s Get:1 http://ftpmaster.internal/ubuntu resolute/universe amd64 libeac3 amd64 1.1.2+ds+git20220117+453c3d6b03a0-1.1build3 [55.1 kB] 118s Get:2 http://ftpmaster.internal/ubuntu resolute/universe amd64 opensc-pkcs11 amd64 0.26.1-3 [971 kB] 118s Get:3 http://ftpmaster.internal/ubuntu resolute/universe amd64 opensc amd64 0.26.1-3 [397 kB] 118s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 imx-code-signing-tool amd64 3.4.1+dfsg-6 [3203 kB] 118s Fetched 4627 kB in 0s (10.9 MB/s) 118s Selecting previously unselected package libeac3:amd64. 118s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 124199 files and directories currently installed.) 118s Preparing to unpack .../libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1build3_amd64.deb ... 118s Unpacking libeac3:amd64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 118s Selecting previously unselected package opensc-pkcs11:amd64. 118s Preparing to unpack .../opensc-pkcs11_0.26.1-3_amd64.deb ... 118s Unpacking opensc-pkcs11:amd64 (0.26.1-3) ... 118s Selecting previously unselected package opensc. 118s Preparing to unpack .../opensc_0.26.1-3_amd64.deb ... 118s Unpacking opensc (0.26.1-3) ... 118s Selecting previously unselected package imx-code-signing-tool. 118s Preparing to unpack .../imx-code-signing-tool_3.4.1+dfsg-6_amd64.deb ... 118s Unpacking imx-code-signing-tool (3.4.1+dfsg-6) ... 118s Setting up libeac3:amd64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 118s Setting up opensc-pkcs11:amd64 (0.26.1-3) ... 118s Setting up opensc (0.26.1-3) ... 118s Setting up imx-code-signing-tool (3.4.1+dfsg-6) ... 118s Processing triggers for man-db (2.13.1-1) ... 119s Processing triggers for libc-bin (2.42-2ubuntu4) ... 120s autopkgtest [14:38:59]: test smoke: [----------------------- 120s Usage: 120s 120s To generate output binary CSF using Code Signing Tool 120s ===================================================== 120s 120s cst --output --input 120s 120s -o, --output : 120s Output binary CSF filename 120s 120s -i, --input : 120s Input CSF text filename 120s 120s -c, --cert : 120s Optional, Input public key certificate to encrypt the dek 120s 120s -b, --backend : 120s Optional, Select backend. SSL backend is the default and 120s uses keys stored in the local host filesystem. The PKCS11 120s backend supplies an interface to PKCS11 supported keystore. 120s -g, --verbose: 120s Optional, displays verbose information. No additional 120s arguments are required 120s 120s -l, --license: 120s Optional, displays program license information. No additional 120s arguments are required 120s 120s -v, --version: 120s Optional, displays the version of the tool. No additional 120s arguments are required 120s 120s -h, --help: 120s Optional, displays usage information. No additional 120s arguments are required 120s 120s Examples: 120s --------- 120s 120s 1. To generate out_csf.bin file from input hab4.csf, use 120s cst -o out_csf.bin -i hab4.csf 120s 120s 2. To generate out_csf.bin file from input hab4.csf and output a plaintext dek, use 120s cst -o out_csf.bin -i hab4.csf 120s 120s 3. To generate out_csf.bin file from input hab4.csf and 120s encrypt the dek with cert.pem, use 120s cst -o out_csf.bin -c cert.pem -i hab4.csf 120s 120s 4. To print program license information, use 120s cst --license 120s 120s 120s Usage: 120s 120s To generate SRK Table data and the SRK Table hash for AHAB 120s ========================================================== 120s 120s srktool --ahab_ver --table --efuses 120s --sign_digest --certs ,,... 120s [--fuse_format ] [--license] 120s 120s -a, --ahab_ver: 120s AHAB Version - set for AHAB SRK table generation 120s 120s -t, --table : 120s Filename for output SRK table binary file 120s 120s -e, --efuses : 120s Filename for the output SRK efuse binary file containing the SRK table 120s hash 120s 120s -d, --digest : 120s Message Digest algorithm. 120s - sha512 (default): Supported in 8/8x devices 120s - sha256: Supported in 8ULP 120s 120s -s, --sign_digest : 120s Signature Digest algorithm. Either sha256, sha384 or sha512 120s 120s -c, --certs ,,...,: 120s X.509v3 certificate filenames. 120s - Certificates may be either DER or PEM encoded format 120s - Certificate filenames must be separated by a ','with no spaces 120s - A maximum of 4 certificate filenames may be provided. Additional 120s certificate names are ignored 120s -f, --fuse_format : 120s Optional, Data format of the SRK efuse binary file. The 120s format may be selected by setting to either: 120s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 120s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 120s 120s -l, --license: 120s Optional, displays program license information. No additional 120s arguments are required. 120s 120s -v, --version: 120s Optional, displays the version of the tool. No additional 120s arguments are required. 120s 120s -b, --verbose: 120s Optional, displays a verbose output. 120s 120s Examples: 120s --------- 120s 120s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 120s - using PEM encoded certificate files 120s - using the default 32 fuse bits per word for the efuse file 120s 120s srktool --ahab_ver --sign_digest sha384 --table table.bin --efuses fuses.bin \ 120s --certs srk1_crt.pem,srk2_crt.pem,srk3_crt.pem 120s 120s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 120s - using DER encoded certificate files 120s - using the optional 8 fuse bits per word for the efuse file 120s 120s srktool --ahab_ver --sign_digest sha256 --table table.bin --efuses fuses.bin \ 120s --certs srk1_crt.pem,srk2_crt.pem \ 120s --fuse_format 1 120s 120s 120s Usage: 120s 120s To generate SRK Table data and the SRK Table hash for HAB4 120s ========================================================== 120s 120s srktool --hab_ver --table --efuses 120s --digest --certs ,%,... 120s [--fuse_format ] [--license] 120s 120s -h, --hab_ver : 120s HAB Version - set to 4 for HAB4 SRK table generation 120s 120s -t, --table : 120s Filename for output SRK table binary file 120s 120s -e, --efuses : 120s Filename for the output SRK efuse binary file containing the SRK table 120s hash 120s 120s -d, --digest : 120s Message Digest algorithm. Only sha256 is supported 120s 120s -c, --certs ,,...,: 120s X.509v3 certificate filenames. 120s - Certificates may be either DER or PEM encoded format 120s - Certificate filenames must be separated by a ','with no spaces 120s - A maximum of 4 certificate filenames may be provided. Additional 120s certificate names are ignored 120s - Placing a % in front of a filename replaces the public 120s key data in the SRK table with a corresponding hash digest 120s 120s -f, --fuse_format : 120s Optional, Data format of the SRK efuse binary file. The 120s format may be selected by setting to either: 120s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 120s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 120s 120s -l, --license: 120s Optional, displays program license information. No additional 120s arguments are required. 120s 120s -v, --version: 120s Optional, displays the version of the tool. No additional 120s arguments are required. 120s 120s -b, --verbose: 120s Optional, displays a verbose output. 120s 120s Examples: 120s --------- 120s 120s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 120s - using PEM encoded certificate files 120s - using full key for first two certs and hash digest for the third 120s - using the default 32 fuse bits per word for the efuse file 120s 120s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 120s --digest sha256 \ 120s --certs srk1_crt.pem,srk2_crt.pem,%srk3_crt.pem 120s 120s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 120s - using DER encoded certificate files 120s - using the optional 8 fuse bits per word for the efuse file 120s 120s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 120s --digest sha256 \ 120s --certs srk1_crt.pem,srk2_crt.pem \ 120s --fuse_format 1 120s 120s srktool: unrecognized option '--help' 120s autopkgtest [14:38:59]: test smoke: -----------------------] 121s smoke PASS (superficial) 121s autopkgtest [14:39:00]: test smoke: - - - - - - - - - - results - - - - - - - - - - 121s autopkgtest [14:39:00]: test create-csf: preparing testbed 121s Reading package lists... 121s Building dependency tree... 121s Reading state information... 121s Solving dependencies... 121s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 122s autopkgtest [14:39:01]: test create-csf: [----------------------- 122s + mktemp -d 122s + dir=/tmp/tmp.6jLjQZrQqW 122s + mkdir -p /tmp/tmp.6jLjQZrQqW/keys 122s + cd /tmp/tmp.6jLjQZrQqW/keys 122s + /usr/share/libexec/imx-code-signing-tool/pki_scripts/hab4_pki_tree.sh -existing-ca n -kt ecc -kl p256 -num-srk 1 -duration 100 -srk-ca y 122s 122s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 122s This script is a part of the Code signing tools for NXP's 122s High Assurance Boot. It generates a basic PKI tree. The PKI 122s tree consists of one or more Super Root Keys (SRK), with each 122s SRK having two subordinate keys: 122s + a Command Sequence File (CSF) key 122s + Image key. 122s Additional keys can be added to the PKI tree but a separate 122s script is available for this. This this script assumes openssl 122s is installed on your system and is included in your search 122s path. Finally, the private keys generated are password 122s protectedwith the password provided by the file key_pass.txt. 122s The format of the file is the password repeated twice: 122s my_password 122s my_password 122s All private keys in the PKI tree are in PKCS #8 format will be 122s protected by the same password. 122s 122s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 122s A default 'serial' file was created! 122s A default file 'key_pass.txt' was created with password = test! 122s 122s +++++++++++++++++++++++++++++++++++++ 122s + Generating CA key and certificate + 122s +++++++++++++++++++++++++++++++++++++ 122s 122s stty: Inappropriate ioctl for device 122s using curve name prime256v1 instead of secp256r1 122s ----- 122s 122s ++++++++++++++++++++++++++++++++++++++++ 122s + Generating SRK key and certificate 1 + 122s ++++++++++++++++++++++++++++++++++++++++ 122s 122s using curve name prime256v1 instead of secp256r1 122s read EC key 122s writing EC key 122s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 122s Check that the request matches the signature 122s Signature ok 122s The Subject's Distinguished Name is as follows 122s commonName :ASN.1 12:'SRK1_sha256_secp256r1_v3_ca' 122s Certificate is to be certified until Jan 6 14:39:01 2126 GMT (36500 days) 122s 122s Write out database with 1 new entries 122s Database updated 122s using curve name prime256v1 instead of secp256r1 122s 122s ++++++++++++++++++++++++++++++++++++++++ 122s + Generating CSF key and certificate 1 + 122s ++++++++++++++++++++++++++++++++++++++++ 122s 122s read EC key 122s writing EC key 122s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 122s Check that the request matches the signature 122s Signature ok 122s The Subject's Distinguished Name is as follows 122s commonName :ASN.1 12:'CSF1_1_sha256_secp256r1_v3_usr' 122s Certificate is to be certified until Jan 6 14:39:01 2126 GMT (36500 days) 122s 122s Write out database with 1 new entries 122s Database updated 122s 122s ++++++++++++++++++++++++++++++++++++++++ 122s + Generating IMG key and certificate 1 + 122s ++++++++++++++++++++++++++++++++++++++++ 122s 122s using curve name prime256v1 instead of secp256r1 122s read EC key 122s writing EC key 122s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 122s Check that the request matches the signature 122s Signature ok 122s The Subject's Distinguished Name is as follows 122s commonName :ASN.1 12:'IMG1_1_sha256_secp256r1_v3_usr' 122s Certificate is to be certified until Jan 6 14:39:01 2126 GMT (36500 days) 122s 122s Write out database with 1 new entries 122s Database updated 122s + cd /tmp/tmp.6jLjQZrQqW/crts 122s + srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c SRK1_sha256_secp256r1_v3_ca_crt.pem 122s + cd /tmp/tmp.6jLjQZrQqW 122s + cat 122s Number of certificates = 1 122s SRK table binary filename = SRK_1_2_3_4_table.bin 122s SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin 122s SRK Fuse binary dump: 122s SRK HASH[0] = 0x0A3964E7 122s SRK HASH[1] = 0x93E1A1C3 122s SRK HASH[2] = 0xB9A1DFA1 122s SRK HASH[3] = 0x221493B0 122s SRK HASH[4] = 0x027F166D 122s SRK HASH[5] = 0xACB74DEB 122s SRK HASH[6] = 0x47038D17 122s SRK HASH[7] = 0x8271D2B6 122s + cst -i hab4.csf -o csf.bin 122s + test -f csf.bin 122s + cat 122s CSF Processed successfully and signed data available in csf.bin 122s + csf_parser -c csf.bin 122s + cmp -l csf.log expected-csf.log 123s autopkgtest [14:39:02]: test create-csf: -----------------------] 123s create-csf PASS 123s autopkgtest [14:39:02]: test create-csf: - - - - - - - - - - results - - - - - - - - - - 123s autopkgtest [14:39:02]: @@@@@@@@@@@@@@@@@@@@ summary 123s smoke PASS (superficial) 123s create-csf PASS