0s autopkgtest [20:38:08]: starting date and time: 2026-01-29 20:38:08+0000 0s autopkgtest [20:38:08]: git checkout: 508d4a25 a-v-ssh wait_for_ssh: demote "ssh connection failed" to a debug message 0s autopkgtest [20:38:08]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.96dyr7q7/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,localhost,localdomain,internal,login.ubuntu.com,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:python-cryptography,src:sphinx-rtd-theme --apt-upgrade imx-code-signing-tool --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-cryptography/46.0.1-1ubuntu2 sphinx-rtd-theme/3.1.0+dfsg-1' -- lxd -r lxd-armhf-10.145.243.160 lxd-armhf-10.145.243.160:autopkgtest/ubuntu/resolute/armhf 24s autopkgtest [20:38:32]: testbed dpkg architecture: armhf 26s autopkgtest [20:38:34]: testbed apt version: 3.1.14 30s autopkgtest [20:38:38]: @@@@@@@@@@@@@@@@@@@@ test bed setup 32s autopkgtest [20:38:40]: testbed release detected to be: None 40s autopkgtest [20:38:48]: updating testbed package index (apt update) 42s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 42s Get:2 http://ftpmaster.internal/ubuntu resolute InRelease [124 kB] 43s Get:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease [124 kB] 43s Get:4 http://ftpmaster.internal/ubuntu resolute-security InRelease [124 kB] 43s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [2820 B] 43s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1036 kB] 43s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [102 kB] 43s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [25.4 kB] 43s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf Packages [115 kB] 43s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe armhf Packages [742 kB] 43s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse armhf Packages [5208 B] 43s Get:12 http://ftpmaster.internal/ubuntu resolute/universe Sources [21.3 MB] 44s Get:13 http://ftpmaster.internal/ubuntu resolute/main Sources [1399 kB] 44s Get:14 http://ftpmaster.internal/ubuntu resolute/main armhf Packages [1374 kB] 44s Get:15 http://ftpmaster.internal/ubuntu resolute/universe armhf Packages [15.3 MB] 48s Fetched 41.9 MB in 6s (7335 kB/s) 49s Reading package lists... 56s autopkgtest [20:39:04]: upgrading testbed (apt dist-upgrade and autopurge) 58s Reading package lists... 59s Building dependency tree... 59s Reading state information... 59s Calculating upgrade... 60s The following packages will be REMOVED: 60s python3-openssl 60s The following packages will be upgraded: 60s gcc-15-base libatomic1 libgcc-s1 libsgutils2-1.48 libstdc++6 60s python3-cryptography sg3-utils sg3-utils-udev 61s 8 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 61s Need to get 3081 kB of archives. 61s After this operation, 501 kB of additional disk space will be used. 61s Get:1 http://ftpmaster.internal/ubuntu resolute/main armhf libatomic1 armhf 15.2.0-12ubuntu1 [7824 B] 61s Get:2 http://ftpmaster.internal/ubuntu resolute/main armhf gcc-15-base armhf 15.2.0-12ubuntu1 [59.6 kB] 61s Get:3 http://ftpmaster.internal/ubuntu resolute/main armhf libstdc++6 armhf 15.2.0-12ubuntu1 [731 kB] 61s Get:4 http://ftpmaster.internal/ubuntu resolute/main armhf libgcc-s1 armhf 15.2.0-12ubuntu1 [40.5 kB] 61s Get:5 http://ftpmaster.internal/ubuntu resolute/main armhf libsgutils2-1.48 armhf 1.48-3ubuntu2 [107 kB] 61s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf python3-cryptography armhf 46.0.1-1ubuntu2 [1135 kB] 61s Get:7 http://ftpmaster.internal/ubuntu resolute/main armhf sg3-utils armhf 1.48-3ubuntu2 [994 kB] 61s Get:8 http://ftpmaster.internal/ubuntu resolute/main armhf sg3-utils-udev all 1.48-3ubuntu2 [6610 B] 62s Fetched 3081 kB in 1s (4322 kB/s) 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66510 files and directories currently installed.) 62s Removing python3-openssl (25.1.0-1) ... 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66495 files and directories currently installed.) 62s Preparing to unpack .../libatomic1_15.2.0-12ubuntu1_armhf.deb ... 62s Unpacking libatomic1:armhf (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 62s Preparing to unpack .../gcc-15-base_15.2.0-12ubuntu1_armhf.deb ... 62s Unpacking gcc-15-base:armhf (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 62s Setting up gcc-15-base:armhf (15.2.0-12ubuntu1) ... 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66495 files and directories currently installed.) 62s Preparing to unpack .../libstdc++6_15.2.0-12ubuntu1_armhf.deb ... 62s Unpacking libstdc++6:armhf (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 62s Setting up libstdc++6:armhf (15.2.0-12ubuntu1) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66495 files and directories currently installed.) 63s Preparing to unpack .../libgcc-s1_15.2.0-12ubuntu1_armhf.deb ... 63s Unpacking libgcc-s1:armhf (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 63s Setting up libgcc-s1:armhf (15.2.0-12ubuntu1) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66495 files and directories currently installed.) 63s Preparing to unpack .../libsgutils2-1.48_1.48-3ubuntu2_armhf.deb ... 63s Unpacking libsgutils2-1.48:armhf (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 63s Preparing to unpack .../python3-cryptography_46.0.1-1ubuntu2_armhf.deb ... 63s Unpacking python3-cryptography (46.0.1-1ubuntu2) over (43.0.0-1ubuntu1) ... 63s Preparing to unpack .../sg3-utils_1.48-3ubuntu2_armhf.deb ... 63s Unpacking sg3-utils (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 63s Preparing to unpack .../sg3-utils-udev_1.48-3ubuntu2_all.deb ... 63s Unpacking sg3-utils-udev (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 63s Setting up libsgutils2-1.48:armhf (1.48-3ubuntu2) ... 63s Setting up python3-cryptography (46.0.1-1ubuntu2) ... 64s Setting up libatomic1:armhf (15.2.0-12ubuntu1) ... 64s Setting up sg3-utils (1.48-3ubuntu2) ... 64s Setting up sg3-utils-udev (1.48-3ubuntu2) ... 64s update-initramfs: deferring update (trigger activated) 64s Processing triggers for libc-bin (2.42-2ubuntu4) ... 64s Processing triggers for man-db (2.13.1-1) ... 64s Processing triggers for initramfs-tools (0.150ubuntu7) ... 67s Reading package lists... 67s Building dependency tree... 67s Reading state information... 68s Solving dependencies... 68s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 71s autopkgtest [20:39:19]: rebooting testbed after setup commands that affected boot 114s autopkgtest [20:40:02]: testbed running kernel: Linux 6.8.0-87-generic #88~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Oct 14 14:00:09 UTC 2 140s autopkgtest [20:40:28]: @@@@@@@@@@@@@@@@@@@@ apt-source imx-code-signing-tool 151s Get:1 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (dsc) [1663 B] 151s Get:2 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (tar) [3065 kB] 151s Get:3 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (diff) [9932 B] 151s gpgv: Signature made Wed Jun 4 07:09:33 2025 UTC 151s gpgv: using EDDSA key 83DCD17F44B22CC83656EDA1E8446B4AC8C77261 151s gpgv: Can't check signature: No public key 151s dpkg-source: warning: cannot verify inline signature for ./imx-code-signing-tool_3.4.1+dfsg-6.dsc: no acceptable signature found 151s autopkgtest [20:40:39]: testing package imx-code-signing-tool version 3.4.1+dfsg-6 153s autopkgtest [20:40:41]: build not needed 157s autopkgtest [20:40:45]: test smoke: preparing testbed 158s Reading package lists... 159s Building dependency tree... 159s Reading state information... 159s Solving dependencies... 160s The following NEW packages will be installed: 160s imx-code-signing-tool libeac3 opensc opensc-pkcs11 160s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 160s Need to get 4554 kB of archives. 160s After this operation, 8134 kB of additional disk space will be used. 160s Get:1 http://ftpmaster.internal/ubuntu resolute/universe armhf libeac3 armhf 1.1.2+ds+git20220117+453c3d6b03a0-1.1build3 [48.6 kB] 160s Get:2 http://ftpmaster.internal/ubuntu resolute/universe armhf opensc-pkcs11 armhf 0.26.1-3 [910 kB] 161s Get:3 http://ftpmaster.internal/ubuntu resolute/universe armhf opensc armhf 0.26.1-3 [395 kB] 161s Get:4 http://ftpmaster.internal/ubuntu resolute/universe armhf imx-code-signing-tool armhf 3.4.1+dfsg-6 [3201 kB] 162s Fetched 4554 kB in 1s (3338 kB/s) 162s Selecting previously unselected package libeac3:armhf. 162s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 66500 files and directories currently installed.) 162s Preparing to unpack .../libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1build3_armhf.deb ... 162s Unpacking libeac3:armhf (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 162s Selecting previously unselected package opensc-pkcs11:armhf. 162s Preparing to unpack .../opensc-pkcs11_0.26.1-3_armhf.deb ... 162s Unpacking opensc-pkcs11:armhf (0.26.1-3) ... 162s Selecting previously unselected package opensc. 162s Preparing to unpack .../opensc_0.26.1-3_armhf.deb ... 162s Unpacking opensc (0.26.1-3) ... 162s Selecting previously unselected package imx-code-signing-tool. 162s Preparing to unpack .../imx-code-signing-tool_3.4.1+dfsg-6_armhf.deb ... 162s Unpacking imx-code-signing-tool (3.4.1+dfsg-6) ... 162s Setting up libeac3:armhf (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 162s Setting up opensc-pkcs11:armhf (0.26.1-3) ... 162s Setting up opensc (0.26.1-3) ... 162s Setting up imx-code-signing-tool (3.4.1+dfsg-6) ... 162s Processing triggers for man-db (2.13.1-1) ... 163s Processing triggers for libc-bin (2.42-2ubuntu4) ... 172s autopkgtest [20:41:00]: test smoke: [----------------------- 174s srktool: unrecognized option '--help' 174s Usage: 174s 174s To generate output binary CSF using Code Signing Tool 174s ===================================================== 174s 174s cst --output --input 174s 174s -o, --output : 174s Output binary CSF filename 174s 174s -i, --input : 174s Input CSF text filename 174s 174s -c, --cert : 174s Optional, Input public key certificate to encrypt the dek 174s 174s -b, --backend : 174s Optional, Select backend. SSL backend is the default and 174s uses keys stored in the local host filesystem. The PKCS11 174s backend supplies an interface to PKCS11 supported keystore. 174s -g, --verbose: 174s Optional, displays verbose information. No additional 174s arguments are required 174s 174s -l, --license: 174s Optional, displays program license information. No additional 174s arguments are required 174s 174s -v, --version: 174s Optional, displays the version of the tool. No additional 174s arguments are required 174s 174s -h, --help: 174s Optional, displays usage information. No additional 174s arguments are required 174s 174s Examples: 174s --------- 174s 174s 1. To generate out_csf.bin file from input hab4.csf, use 174s cst -o out_csf.bin -i hab4.csf 174s 174s 2. To generate out_csf.bin file from input hab4.csf and output a plaintext dek, use 174s cst -o out_csf.bin -i hab4.csf 174s 174s 3. To generate out_csf.bin file from input hab4.csf and 174s encrypt the dek with cert.pem, use 174s cst -o out_csf.bin -c cert.pem -i hab4.csf 174s 174s 4. To print program license information, use 174s cst --license 174s 174s 174s Usage: 174s 174s To generate SRK Table data and the SRK Table hash for AHAB 174s ========================================================== 174s 174s srktool --ahab_ver --table --efuses 174s --sign_digest --certs ,,... 174s [--fuse_format ] [--license] 174s 174s -a, --ahab_ver: 174s AHAB Version - set for AHAB SRK table generation 174s 174s -t, --table : 174s Filename for output SRK table binary file 174s 174s -e, --efuses : 174s Filename for the output SRK efuse binary file containing the SRK table 174s hash 174s 174s -d, --digest : 174s Message Digest algorithm. 174s - sha512 (default): Supported in 8/8x devices 174s - sha256: Supported in 8ULP 174s 174s -s, --sign_digest : 174s Signature Digest algorithm. Either sha256, sha384 or sha512 174s 174s -c, --certs ,,...,: 174s X.509v3 certificate filenames. 174s - Certificates may be either DER or PEM encoded format 174s - Certificate filenames must be separated by a ','with no spaces 174s - A maximum of 4 certificate filenames may be provided. Additional 174s certificate names are ignored 174s -f, --fuse_format : 174s Optional, Data format of the SRK efuse binary file. The 174s format may be selected by setting to either: 174s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 174s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 174s 174s -l, --license: 174s Optional, displays program license information. No additional 174s arguments are required. 174s 174s -v, --version: 174s Optional, displays the version of the tool. No additional 174s arguments are required. 174s 174s -b, --verbose: 174s Optional, displays a verbose output. 174s 174s Examples: 174s --------- 174s 174s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 174s - using PEM encoded certificate files 174s - using the default 32 fuse bits per word for the efuse file 174s 174s srktool --ahab_ver --sign_digest sha384 --table table.bin --efuses fuses.bin \ 174s --certs srk1_crt.pem,srk2_crt.pem,srk3_crt.pem 174s 174s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 174s - using DER encoded certificate files 174s - using the optional 8 fuse bits per word for the efuse file 174s 174s srktool --ahab_ver --sign_digest sha256 --table table.bin --efuses fuses.bin \ 174s --certs srk1_crt.pem,srk2_crt.pem \ 174s --fuse_format 1 174s 174s 174s Usage: 174s 174s To generate SRK Table data and the SRK Table hash for HAB4 174s ========================================================== 174s 174s srktool --hab_ver --table --efuses 174s --digest --certs ,%,... 174s [--fuse_format ] [--license] 174s 174s -h, --hab_ver : 174s HAB Version - set to 4 for HAB4 SRK table generation 174s 174s -t, --table : 174s Filename for output SRK table binary file 174s 174s -e, --efuses : 174s Filename for the output SRK efuse binary file containing the SRK table 174s hash 174s 174s -d, --digest : 174s Message Digest algorithm. Only sha256 is supported 174s 174s -c, --certs ,,...,: 174s X.509v3 certificate filenames. 174s - Certificates may be either DER or PEM encoded format 174s - Certificate filenames must be separated by a ','with no spaces 174s - A maximum of 4 certificate filenames may be provided. Additional 174s certificate names are ignored 174s - Placing a % in front of a filename replaces the public 174s key data in the SRK table with a corresponding hash digest 174s 174s -f, --fuse_format : 174s Optional, Data format of the SRK efuse binary file. The 174s format may be selected by setting to either: 174s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 174s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 174s 174s -l, --license: 174s Optional, displays program license information. No additional 174s arguments are required. 174s 174s -v, --version: 174s Optional, displays the version of the tool. No additional 174s arguments are required. 174s 174s -b, --verbose: 174s Optional, displays a verbose output. 174s 174s Examples: 174s --------- 174s 174s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 174s - using PEM encoded certificate files 174s - using full key for first two certs and hash digest for the third 174s - using the default 32 fuse bits per word for the efuse file 174s 174s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 174s --digest sha256 \ 174s --certs srk1_crt.pem,srk2_crt.pem,%srk3_crt.pem 174s 174s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 174s - using DER encoded certificate files 174s - using the optional 8 fuse bits per word for the efuse file 174s 174s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 174s --digest sha256 \ 174s --certs srk1_crt.pem,srk2_crt.pem \ 174s --fuse_format 1 174s 174s autopkgtest [20:41:02]: test smoke: -----------------------] 178s smoke PASS (superficial) 178s autopkgtest [20:41:06]: test smoke: - - - - - - - - - - results - - - - - - - - - - 182s autopkgtest [20:41:10]: test create-csf: preparing testbed 184s Reading package lists... 185s Building dependency tree... 185s Reading state information... 185s Solving dependencies... 186s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 194s autopkgtest [20:41:22]: test create-csf: [----------------------- 196s + mktemp -d 196s + dir=/tmp/tmp.085yL4GDgJ 196s + mkdir -p /tmp/tmp.085yL4GDgJ/keys 196s + cd /tmp/tmp.085yL4GDgJ/keys 196s + /usr/share/libexec/imx-code-signing-tool/pki_scripts/hab4_pki_tree.sh -existing-ca n -kt ecc -kl p256 -num-srk 1 -duration 100 -srk-ca y 196s 196s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 196s This script is a part of the Code signing tools for NXP's 196s High Assurance Boot. It generates a basic PKI tree. The PKI 196s tree consists of one or more Super Root Keys (SRK), with each 196s SRK having two subordinate keys: 196s + a Command Sequence File (CSF) key 196s + Image key. 196s Additional keys can be added to the PKI tree but a separate 196s script is available for this. This this script assumes openssl 196s is installed on your system and is included in your search 196s path. Finally, the private keys generated are password 196s protectedwith the password provided by the file key_pass.txt. 196s The format of the file is the password repeated twice: 196s my_password 196s my_password 196s All private keys in the PKI tree are in PKCS #8 format will be 196s protected by the same password. 196s 196s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 196s stty: Inappropriate ioctl for device 196s A default 'serial' file was created! 196s A default file 'key_pass.txt' was created with password = test! 196s 196s +++++++++++++++++++++++++++++++++++++ 196s + Generating CA key and certificate + 196s +++++++++++++++++++++++++++++++++++++ 196s 196s using curve name prime256v1 instead of secp256r1 196s ----- 196s 196s ++++++++++++++++++++++++++++++++++++++++ 196s + Generating SRK key and certificate 1 + 196s ++++++++++++++++++++++++++++++++++++++++ 196s 196s using curve name prime256v1 instead of secp256r1 196s read EC key 196s writing EC key 196s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 196s Check that the request matches the signature 196s Signature ok 196s The Subject's Distinguished Name is as follows 196s commonName :ASN.1 12:'SRK1_sha256_secp256r1_v3_ca' 196s Certificate is to be certified until Jan 5 20:41:24 2126 GMT (36500 days) 196s 196s Write out database with 1 new entries 196s Database updated 197s 197s ++++++++++++++++++++++++++++++++++++++++ 197s + Generating CSF key and certificate 1 + 197s ++++++++++++++++++++++++++++++++++++++++ 197s 197s using curve name prime256v1 instead of secp256r1 197s read EC key 197s writing EC key 197s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 197s Check that the request matches the signature 197s Signature ok 197s The Subject's Distinguished Name is as follows 197s commonName :ASN.1 12:'CSF1_1_sha256_secp256r1_v3_usr' 197s Certificate is to be certified until Jan 5 20:41:25 2126 GMT (36500 days) 197s 197s Write out database with 1 new entries 197s Database updated 197s 197s ++++++++++++++++++++++++++++++++++++++++ 197s + Generating IMG key and certificate 1 + 197s ++++++++++++++++++++++++++++++++++++++++ 197s 197s using curve name prime256v1 instead of secp256r1 197s read EC key 197s writing EC key 197s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 197s Check that the request matches the signature 197s Signature ok 197s The Subject's Distinguished Name is as follows 197s commonName :ASN.1 12:'IMG1_1_sha256_secp256r1_v3_usr' 197s Certificate is to be certified until Jan 5 20:41:25 2126 GMT (36500 days) 197s 197s Write out database with 1 new entries 197s Database updated 197s + cd /tmp/tmp.085yL4GDgJ/crts 197s + srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c SRK1_sha256_secp256r1_v3_ca_crt.pem 197s + cd /tmp/tmp.085yL4GDgJ 197s + cat 197s Number of certificates = 1 197s SRK table binary filename = SRK_1_2_3_4_table.bin 197s SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin 197s SRK Fuse binary dump: 197s SRK HASH[0] = 0x56A2CD11 197s SRK HASH[1] = 0xB7C7B5D1 197s SRK HASH[2] = 0x679FAC25 197s SRK HASH[3] = 0xF3BBB9C3 197s SRK HASH[4] = 0x005DA0A7 197s SRK HASH[5] = 0xD4614D8C 197s SRK HASH[6] = 0x16194F5A 197s SRK HASH[7] = 0x5A7F4FFE 197s + cst -i hab4.csf -o csf.bin 197s CSF Processed successfully and signed data available in csf.bin 197s + test -f csf.bin 197s + cat 197s + csf_parser -c csf.bin 197s + cmp -l csf.log expected-csf.log 197s autopkgtest [20:41:25]: test create-csf: -----------------------] 201s create-csf PASS 201s autopkgtest [20:41:29]: test create-csf: - - - - - - - - - - results - - - - - - - - - - 205s autopkgtest [20:41:33]: @@@@@@@@@@@@@@@@@@@@ summary 205s smoke PASS (superficial) 205s create-csf PASS