0s autopkgtest [21:59:28]: starting date and time: 2026-01-29 21:59:28+0000 0s autopkgtest [21:59:28]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [21:59:28]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.i6z8ujhw/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-cryptography,src:sphinx-rtd-theme --apt-upgrade imx-code-signing-tool --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-cryptography/46.0.1-1ubuntu2 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-arm64-2.secgroup --name adt-resolute-arm64-imx-code-signing-tool-20260129-215928-juju-7f2275-prod-proposed-migration-environment-15-6b58d979-1888-402a-b6a2-83769c921686 --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-arm64-imx-code-signing-tool-20260129-215928-juju-7f2275-prod-proposed-migration-environment-15-6b58d979-1888-402a-b6a2-83769c921686 from image adt/ubuntu-resolute-arm64-server-20260128.img (UUID 10e9cd8e-6c32-4761-bbae-8581f2bd4c6f)... 57s autopkgtest [22:00:25]: testbed dpkg architecture: arm64 57s autopkgtest [22:00:25]: testbed apt version: 3.1.14 58s autopkgtest [22:00:26]: @@@@@@@@@@@@@@@@@@@@ test bed setup 58s autopkgtest [22:00:26]: testbed release detected to be: None 59s autopkgtest [22:00:27]: updating testbed package index (apt update) 59s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 59s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 59s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 59s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 59s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [2820 B] 59s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [25.4 kB] 59s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1036 kB] 59s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [102 kB] 59s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [117 kB] 59s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [4652 B] 59s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [12.3 kB] 59s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 59s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [820 kB] 60s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [22.1 kB] 60s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [19.4 kB] 60s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [576 B] 62s Fetched 2288 kB in 1s (3049 kB/s) 63s Reading package lists... 64s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 64s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 64s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 64s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 65s Reading package lists... 65s Reading package lists... 65s Building dependency tree... 65s Reading state information... 65s Calculating upgrade... 65s The following packages will be REMOVED: 65s python3-openssl 65s The following packages will be upgraded: 65s gcc-15-base libatomic1 libgcc-s1 libsgutils2-1.48 libstdc++6 liburcu8t64 65s libxcb1 python3-cryptography sg3-utils sg3-utils-udev tzdata 66s 11 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 66s Need to get 3432 kB of archives. 66s After this operation, 308 kB of additional disk space will be used. 66s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 libatomic1 arm64 15.2.0-12ubuntu1 [11.2 kB] 66s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libstdc++6 arm64 15.2.0-12ubuntu1 [760 kB] 66s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 gcc-15-base arm64 15.2.0-12ubuntu1 [59.6 kB] 66s Get:4 http://ftpmaster.internal/ubuntu resolute/main arm64 libgcc-s1 arm64 15.2.0-12ubuntu1 [61.1 kB] 66s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 tzdata all 2025c-3ubuntu3 [199 kB] 66s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 liburcu8t64 arm64 0.15.6-1 [64.8 kB] 66s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 libxcb1 arm64 1.17.0-2ubuntu1 [49.2 kB] 66s Get:8 http://ftpmaster.internal/ubuntu resolute/main arm64 libsgutils2-1.48 arm64 1.48-3ubuntu2 [116 kB] 66s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 python3-cryptography arm64 46.0.1-1ubuntu2 [1103 kB] 66s Get:10 http://ftpmaster.internal/ubuntu resolute/main arm64 sg3-utils arm64 1.48-3ubuntu2 [1001 kB] 66s Get:11 http://ftpmaster.internal/ubuntu resolute/main arm64 sg3-utils-udev all 1.48-3ubuntu2 [6610 B] 66s dpkg-preconfigure: unable to re-open stdin: No such file or directory 67s Fetched 3432 kB in 1s (5419 kB/s) 67s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 135253 files and directories currently installed.) 67s Removing python3-openssl (25.1.0-1) ... 67s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 135238 files and directories currently installed.) 67s Preparing to unpack .../libatomic1_15.2.0-12ubuntu1_arm64.deb ... 67s Unpacking libatomic1:arm64 (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 67s Preparing to unpack .../libstdc++6_15.2.0-12ubuntu1_arm64.deb ... 67s Unpacking libstdc++6:arm64 (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 67s Preparing to unpack .../gcc-15-base_15.2.0-12ubuntu1_arm64.deb ... 67s Unpacking gcc-15-base:arm64 (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 67s Setting up gcc-15-base:arm64 (15.2.0-12ubuntu1) ... 67s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 135238 files and directories currently installed.) 67s Preparing to unpack .../libgcc-s1_15.2.0-12ubuntu1_arm64.deb ... 67s Unpacking libgcc-s1:arm64 (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 67s Setting up libgcc-s1:arm64 (15.2.0-12ubuntu1) ... 68s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 135238 files and directories currently installed.) 68s Preparing to unpack .../0-tzdata_2025c-3ubuntu3_all.deb ... 68s Unpacking tzdata (2025c-3ubuntu3) over (2025c-3ubuntu2) ... 68s Preparing to unpack .../1-liburcu8t64_0.15.6-1_arm64.deb ... 68s Unpacking liburcu8t64:arm64 (0.15.6-1) over (0.15.5-1) ... 68s Preparing to unpack .../2-libxcb1_1.17.0-2ubuntu1_arm64.deb ... 68s Unpacking libxcb1:arm64 (1.17.0-2ubuntu1) over (1.17.0-2build1) ... 68s Preparing to unpack .../3-libsgutils2-1.48_1.48-3ubuntu2_arm64.deb ... 68s Unpacking libsgutils2-1.48:arm64 (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 68s Preparing to unpack .../4-python3-cryptography_46.0.1-1ubuntu2_arm64.deb ... 68s Unpacking python3-cryptography (46.0.1-1ubuntu2) over (43.0.0-1ubuntu1) ... 68s Preparing to unpack .../5-sg3-utils_1.48-3ubuntu2_arm64.deb ... 68s Unpacking sg3-utils (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 68s Preparing to unpack .../6-sg3-utils-udev_1.48-3ubuntu2_all.deb ... 68s Unpacking sg3-utils-udev (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 68s Setting up liburcu8t64:arm64 (0.15.6-1) ... 68s Setting up libxcb1:arm64 (1.17.0-2ubuntu1) ... 68s Setting up libsgutils2-1.48:arm64 (1.48-3ubuntu2) ... 68s Setting up tzdata (2025c-3ubuntu3) ... 69s 69s Current default time zone: 'Etc/UTC' 69s Local time is now: Thu Jan 29 22:00:36 UTC 2026. 69s Universal Time is now: Thu Jan 29 22:00:36 UTC 2026. 69s Run 'dpkg-reconfigure tzdata' if you wish to change it. 69s 69s Setting up python3-cryptography (46.0.1-1ubuntu2) ... 69s Setting up libatomic1:arm64 (15.2.0-12ubuntu1) ... 69s Setting up libstdc++6:arm64 (15.2.0-12ubuntu1) ... 69s Setting up sg3-utils (1.48-3ubuntu2) ... 69s Setting up sg3-utils-udev (1.48-3ubuntu2) ... 69s update-initramfs: deferring update (trigger activated) 69s Processing triggers for libc-bin (2.42-2ubuntu4) ... 69s Processing triggers for man-db (2.13.1-1) ... 70s Processing triggers for initramfs-tools (0.150ubuntu7) ... 70s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 86s System running in EFI mode, skipping. 86s autopkgtest [22:00:54]: upgrading testbed (apt dist-upgrade and autopurge) 86s Reading package lists... 86s Building dependency tree... 86s Reading state information... 87s Calculating upgrade... 87s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 87s Reading package lists... 87s Building dependency tree... 87s Reading state information... 88s Solving dependencies... 88s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 88s autopkgtest [22:00:56]: rebooting testbed after setup commands that affected boot 126s autopkgtest [22:01:34]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 129s autopkgtest [22:01:37]: @@@@@@@@@@@@@@@@@@@@ apt-source imx-code-signing-tool 130s Get:1 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (dsc) [1663 B] 130s Get:2 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (tar) [3065 kB] 130s Get:3 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (diff) [9932 B] 131s gpgv: Signature made Wed Jun 4 07:09:33 2025 UTC 131s gpgv: using EDDSA key 83DCD17F44B22CC83656EDA1E8446B4AC8C77261 131s gpgv: Can't check signature: No public key 131s dpkg-source: warning: cannot verify inline signature for ./imx-code-signing-tool_3.4.1+dfsg-6.dsc: no acceptable signature found 131s autopkgtest [22:01:39]: testing package imx-code-signing-tool version 3.4.1+dfsg-6 131s autopkgtest [22:01:39]: build not needed 132s autopkgtest [22:01:40]: test smoke: preparing testbed 132s Reading package lists... 132s Building dependency tree... 132s Reading state information... 132s Solving dependencies... 133s The following NEW packages will be installed: 133s imx-code-signing-tool libeac3 opensc opensc-pkcs11 133s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 133s Need to get 4591 kB of archives. 133s After this operation, 9173 kB of additional disk space will be used. 133s Get:1 http://ftpmaster.internal/ubuntu resolute/universe arm64 libeac3 arm64 1.1.2+ds+git20220117+453c3d6b03a0-1.1build3 [54.4 kB] 133s Get:2 http://ftpmaster.internal/ubuntu resolute/universe arm64 opensc-pkcs11 arm64 0.26.1-3 [940 kB] 133s Get:3 http://ftpmaster.internal/ubuntu resolute/universe arm64 opensc arm64 0.26.1-3 [394 kB] 133s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 imx-code-signing-tool arm64 3.4.1+dfsg-6 [3203 kB] 134s Fetched 4591 kB in 1s (6365 kB/s) 134s Selecting previously unselected package libeac3:arm64. 134s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 135243 files and directories currently installed.) 134s Preparing to unpack .../libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1build3_arm64.deb ... 134s Unpacking libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 134s Selecting previously unselected package opensc-pkcs11:arm64. 134s Preparing to unpack .../opensc-pkcs11_0.26.1-3_arm64.deb ... 134s Unpacking opensc-pkcs11:arm64 (0.26.1-3) ... 134s Selecting previously unselected package opensc. 134s Preparing to unpack .../opensc_0.26.1-3_arm64.deb ... 134s Unpacking opensc (0.26.1-3) ... 134s Selecting previously unselected package imx-code-signing-tool. 134s Preparing to unpack .../imx-code-signing-tool_3.4.1+dfsg-6_arm64.deb ... 134s Unpacking imx-code-signing-tool (3.4.1+dfsg-6) ... 134s Setting up libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 134s Setting up opensc-pkcs11:arm64 (0.26.1-3) ... 134s Setting up opensc (0.26.1-3) ... 134s Setting up imx-code-signing-tool (3.4.1+dfsg-6) ... 134s Processing triggers for man-db (2.13.1-1) ... 135s Processing triggers for libc-bin (2.42-2ubuntu4) ... 136s autopkgtest [22:01:44]: test smoke: [----------------------- 136s Usage: 136s 136s To generate output binary CSF using Code Signing Tool 136s ===================================================== 136s 136s cst --output --input 136s 136s -o, --output : 136s Output binary CSF filename 136s 136s -i, --input : 136s Input CSF text filename 136s 136s -c, --cert : 136s Optional, Input public key certificate to encrypt the dek 136s 136s -b, --backend : 136s Optional, Select backend. SSL backend is the default and 136s uses keys stored in the local host filesystem. The PKCS11 136s backend supplies an interface to PKCS11 supported keystore. 136s -g, --verbose: 136s Optional, displays verbose information. No additional 136s arguments are required 136s 136s -l, --license: 136s Optional, displays program license information. No additional 136s arguments are required 136s 136s -v, --version: 136s Optional, displays the version of the tool. No additional 136s arguments are required 136s 136s -h, --help: 136s Optional, displays usage information. No additional 136s arguments are required 136s 136s Examples: 136s --------- 136s 136s 1. To generate out_csf.bin file from input hab4.csf, use 136s cst -o out_csf.bin -i hab4.csf 136s 136s 2. To generate out_csf.bin file from input hab4.csf and output a plaintext dek, use 136s cst -o out_csf.bin -i hab4.csf 136s 136s 3. To generate out_csf.bin file from input hab4.csf and 136s encrypt the dek with cert.pem, use 136s cst -o out_csf.bin -c cert.pem -i hab4.csf 136s 136s 4. To print program license information, use 136s cst --license 136s 136s 136s Usage: 136s 136s To generate SRK Table data and the SRK Table hash for AHAB 136s ========================================================== 136s 136s srktool --ahab_ver --table --efuses 136s --sign_digest --certs ,,... 136s [--fuse_format ] [--license] 136s 136s -a, --ahab_ver: 136s AHAB Version - set for AHAB SRK table generation 136s 136s -t, --table : 136s Filename for output SRK table binary file 136s 136s -e, --efuses : 136s Filename for the output SRK efuse binary file containing the SRK table 136s hash 136s 136s -d, --digest : 136s Message Digest algorithm. 136s - sha512 (default): Supported in 8/8x devices 136s - sha256: Supported in 8ULP 136s 136s -s, --sign_digest : 136s Signature Digest algorithm. Either sha256, sha384 or sha512 136s 136s -c, --certs ,,...,: 136s X.509v3 certificate filenames. 136s - Certificates may be either DER or PEM encoded format 136s - Certificate filenames must be separated by a ','with no spaces 136s - A maximum of 4 certificate filenames may be provided. Additional 136s certificate names are ignored 136s -f, --fuse_format : 136s Optional, Data format of the SRK efuse binary file. The 136s format may be selected by setting to either: 136s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 136s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 136s 136s -l, --license: 136s Optional, displays program license information. No additional 136s arguments are required. 136s 136s -v, --version: 136s Optional, displays the version of the tool. No additional 136s arguments are required. 136s 136s -b, --verbose: 136s Optional, displays a verbose output. 136s 136s Examples: 136s --------- 136s 136s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 136s - using PEM encoded certificate files 136s - using the default 32 fuse bits per word for the efuse file 136s 136s srktool --ahab_ver --sign_digest sha384 --table table.bin --efuses fuses.bin \ 136s --certs srk1_crt.pem,srk2_crt.pem,srk3_crt.pem 136s 136s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 136s - using DER encoded certificate files 136s - using the optional 8 fuse bits per word for the efuse file 136s 136s srktool --ahab_ver --sign_digest sha256 --table table.bin --efuses fuses.bin \ 136s --certs srk1_crt.pem,srk2_crt.pem \ 136s --fuse_format 1 136s 136s 136s Usage: 136s 136s To generate SRK Table data and the SRK Table hash for HAB4 136s ========================================================== 136s 136s srktool --hab_ver --table --efuses 136s --digest --certs ,%,... 136s [--fuse_format ] [--license] 136s 136s -h, --hab_ver : 136s HAB Version - set to 4 for HAB4 SRK table generation 136s 136s -t, --table : 136s Filename for output SRK table binary file 136s 136s -e, --efuses : 136s Filename for the output SRK efuse binary file containing the SRK table 136s hash 136s 136s -d, --digest : 136s Message Digest algorithm. Only sha256 is supported 136s 136s -c, --certs ,,...,: 136s X.509v3 certificate filenames. 136s - Certificates may be either DER or PEM encoded format 136s - Certificate filenames must be separated by a ','with no spaces 136s - A maximum of 4 certificate filenames may be provided. Additional 136s certificate names are ignored 136s - Placing a % in front of a filename replaces the public 136s key data in the SRK table with a corresponding hash digest 136s 136s -f, --fuse_format : 136s Optional, Data format of the SRK efuse binary file. The 136s format may be selected by setting to either: 136s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 136s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 136s 136s -l, --license: 136s Optional, displays program license information. No additional 136s arguments are required. 136s 136s -v, --version: 136s Optional, displays the version of the tool. No additional 136s arguments are required. 136s 136s -b, --verbose: 136s Optional, displays a verbose output. 136s 136s Examples: 136s --------- 136s 136s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 136s - using PEM encoded certificate files 136s - using full key for first two certs and hash digest for the third 136s - using the default 32 fuse bits per word for the efuse file 136s 136s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 136s --digest sha256 \ 136s --certs srk1_crt.pem,srk2_crt.pem,%srk3_crt.pem 136s 136s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 136s - using DER encoded certificate files 136s - using the optional 8 fuse bits per word for the efuse file 136s 136s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 136s --digest sha256 \ 136s --certs srk1_crt.pem,srk2_crt.pem \ 136s --fuse_format 1 136s 136s srktool: unrecognized option '--help' 136s autopkgtest [22:01:44]: test smoke: -----------------------] 137s smoke PASS (superficial) 137s autopkgtest [22:01:45]: test smoke: - - - - - - - - - - results - - - - - - - - - - 137s autopkgtest [22:01:45]: test create-csf: preparing testbed 137s Reading package lists... 137s Building dependency tree... 137s Reading state information... 138s Solving dependencies... 138s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 139s autopkgtest [22:01:47]: test create-csf: [----------------------- 139s + mktemp -d 139s + dir=/tmp/tmp.0dnLOH7Ph8 139s + mkdir -p /tmp/tmp.0dnLOH7Ph8/keys 139s + cd /tmp/tmp.0dnLOH7Ph8/keys 139s + /usr/share/libexec/imx-code-signing-tool/pki_scripts/hab4_pki_tree.sh -existing-ca n -kt ecc -kl p256 -num-srk 1 -duration 100 -srk-ca y 139s 139s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 139s This script is a part of the Code signing tools for NXP's 139s High Assurance Boot. It generates a basic PKI tree. The PKI 139s tree consists of one or more Super Root Keys (SRK), with each 139s SRK having two subordinate keys: 139s + a Command Sequence File (CSF) key 139s + Image key. 139s Additional keys can be added to the PKI tree but a separate 139s script is available for this. This this script assumes openssl 139s is installed on your system and is included in your search 139s path. Finally, the private keys generated are password 139s protectedwith the password provided by the file key_pass.txt. 139s The format of the file is the password repeated twice: 139s my_password 139s my_password 139s All private keys in the PKI tree are in PKCS #8 format will be 139s protected by the same password. 139s 139s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 139s stty: Inappropriate ioctl for device 139s A default 'serial' file was created! 139s A default file 'key_pass.txt' was created with password = test! 139s 139s +++++++++++++++++++++++++++++++++++++ 139s + Generating CA key and certificate + 139s +++++++++++++++++++++++++++++++++++++ 139s 139s using curve name prime256v1 instead of secp256r1 139s ----- 139s 139s ++++++++++++++++++++++++++++++++++++++++ 139s + Generating SRK key and certificate 1 + 139s ++++++++++++++++++++++++++++++++++++++++ 139s 139s using curve name prime256v1 instead of secp256r1 139s read EC key 139s writing EC key 139s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 139s Check that the request matches the signature 139s Signature ok 139s The Subject's Distinguished Name is as follows 139s commonName :ASN.1 12:'SRK1_sha256_secp256r1_v3_ca' 139s Certificate is to be certified until Jan 5 22:01:47 2126 GMT (36500 days) 139s 139s Write out database with 1 new entries 139s Database updated 139s 139s ++++++++++++++++++++++++++++++++++++++++ 139s + Generating CSF key and certificate 1 + 139s ++++++++++++++++++++++++++++++++++++++++ 139s 139s using curve name prime256v1 instead of secp256r1 139s read EC key 139s writing EC key 139s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 139s Check that the request matches the signature 139s Signature ok 139s The Subject's Distinguished Name is as follows 139s commonName :ASN.1 12:'CSF1_1_sha256_secp256r1_v3_usr' 139s Certificate is to be certified until Jan 5 22:01:47 2126 GMT (36500 days) 139s 139s Write out database with 1 new entries 139s Database updated 139s 139s ++++++++++++++++++++++++++++++++++++++++ 139s + Generating IMG key and certificate 1 + 139s ++++++++++++++++++++++++++++++++++++++++ 139s 139s using curve name prime256v1 instead of secp256r1 139s read EC key 139s writing EC key 139s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 139s Check that the request matches the signature 139s Signature ok 139s The Subject's Distinguished Name is as follows 139s commonName :ASN.1 12:'IMG1_1_sha256_secp256r1_v3_usr' 139s Certificate is to be certified until Jan 5 22:01:47 2126 GMT (36500 days) 139s 139s Write out database with 1 new entries 139s Database updated 139s + cd /tmp/tmp.0dnLOH7Ph8/crts 139s + srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c SRK1_sha256_secp256r1_v3_ca_crt.pem 139s Number of certificates = 1 139s SRK table binary filename = SRK_1_2_3_4_table.bin 139s SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin 139s SRK Fuse binary dump: 139s SRK HASH[0] = 0x4E6B5BF7 139s SRK HASH[1] = 0x91A6456E 139s SRK HASH[2] = 0xE4D221C4 139s SRK HASH[3] = 0xA0C13A15 139s SRK HASH[4] = 0x2507CAA8 139s SRK HASH[5] = 0xE593896B 139s SRK HASH[6] = 0x309C51F0 139s SRK HASH[7] = 0x41C9570E 139s + cd /tmp/tmp.0dnLOH7Ph8 139s + cat 139s + cst -i hab4.csf -o csf.bin 139s CSF Processed successfully and signed data available in csf.bin 139s + test -f csf.bin 139s + cat 139s + csf_parser -c csf.bin 139s + cmp -l csf.log expected-csf.log 140s autopkgtest [22:01:48]: test create-csf: -----------------------] 140s autopkgtest [22:01:48]: test create-csf: - - - - - - - - - - results - - - - - - - - - - 140s create-csf PASS 140s autopkgtest [22:01:48]: @@@@@@@@@@@@@@@@@@@@ summary 140s smoke PASS (superficial) 140s create-csf PASS