0s autopkgtest [22:45:07]: starting date and time: 2026-01-29 22:45:07+0000 0s autopkgtest [22:45:07]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [22:45:07]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.cinb_q70/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-cryptography,src:sphinx-rtd-theme --apt-upgrade imx-code-signing-tool --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-cryptography/46.0.1-1ubuntu2 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-ppc64el-22.secgroup --name adt-resolute-ppc64el-imx-code-signing-tool-20260129-224506-juju-7f2275-prod-proposed-migration-environment-2-3e159d7f-4c36-4edb-ba2c-4a5546461b2b --image adt/ubuntu-resolute-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-ppc64el -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-ppc64el-imx-code-signing-tool-20260129-224506-juju-7f2275-prod-proposed-migration-environment-2-3e159d7f-4c36-4edb-ba2c-4a5546461b2b from image adt/ubuntu-resolute-ppc64el-server-20260129.img (UUID 011be5ba-3d23-459d-9a9a-537803b22566)... 51s autopkgtest [22:45:58]: testbed dpkg architecture: ppc64el 51s autopkgtest [22:45:58]: testbed apt version: 3.1.14 51s autopkgtest [22:45:58]: @@@@@@@@@@@@@@@@@@@@ test bed setup 51s autopkgtest [22:45:58]: testbed release detected to be: None 52s autopkgtest [22:45:59]: updating testbed package index (apt update) 52s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 52s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 52s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 52s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 52s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [25.4 kB] 52s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [2820 B] 52s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1036 kB] 53s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [102 kB] 53s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [116 kB] 53s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [786 kB] 53s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [16.6 kB] 53s Fetched 2210 kB in 1s (3072 kB/s) 54s Reading package lists... 54s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 54s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 54s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 54s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 55s Reading package lists... 55s Reading package lists... 55s Building dependency tree... 55s Reading state information... 56s Calculating upgrade... 56s The following packages will be REMOVED: 56s python3-openssl 56s The following packages will be upgraded: 56s gcc-15-base libatomic1 libgcc-s1 libsgutils2-1.48 libstdc++6 56s python3-cryptography sg3-utils sg3-utils-udev 56s 8 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 56s Need to get 3534 kB of archives. 56s After this operation, 766 kB of additional disk space will be used. 56s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libatomic1 ppc64el 15.2.0-12ubuntu1 [11.0 kB] 56s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libstdc++6 ppc64el 15.2.0-12ubuntu1 [922 kB] 56s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el gcc-15-base ppc64el 15.2.0-12ubuntu1 [59.6 kB] 56s Get:4 http://ftpmaster.internal/ubuntu resolute/main ppc64el libgcc-s1 ppc64el 15.2.0-12ubuntu1 [40.2 kB] 56s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libsgutils2-1.48 ppc64el 1.48-3ubuntu2 [143 kB] 56s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el python3-cryptography ppc64el 46.0.1-1ubuntu2 [1272 kB] 56s Get:7 http://ftpmaster.internal/ubuntu resolute/main ppc64el sg3-utils ppc64el 1.48-3ubuntu2 [1080 kB] 56s Get:8 http://ftpmaster.internal/ubuntu resolute/main ppc64el sg3-utils-udev all 1.48-3ubuntu2 [6610 B] 56s dpkg-preconfigure: unable to re-open stdin: No such file or directory 56s Fetched 3534 kB in 0s (7844 kB/s) 57s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 120854 files and directories currently installed.) 57s Removing python3-openssl (25.1.0-1) ... 57s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 120839 files and directories currently installed.) 57s Preparing to unpack .../libatomic1_15.2.0-12ubuntu1_ppc64el.deb ... 57s Unpacking libatomic1:ppc64el (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 57s Preparing to unpack .../libstdc++6_15.2.0-12ubuntu1_ppc64el.deb ... 57s Unpacking libstdc++6:ppc64el (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 57s Preparing to unpack .../gcc-15-base_15.2.0-12ubuntu1_ppc64el.deb ... 57s Unpacking gcc-15-base:ppc64el (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 57s Setting up gcc-15-base:ppc64el (15.2.0-12ubuntu1) ... 57s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 120839 files and directories currently installed.) 57s Preparing to unpack .../libgcc-s1_15.2.0-12ubuntu1_ppc64el.deb ... 57s Unpacking libgcc-s1:ppc64el (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 57s Setting up libgcc-s1:ppc64el (15.2.0-12ubuntu1) ... 57s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 120839 files and directories currently installed.) 57s Preparing to unpack .../libsgutils2-1.48_1.48-3ubuntu2_ppc64el.deb ... 57s Unpacking libsgutils2-1.48:ppc64el (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 57s Preparing to unpack .../python3-cryptography_46.0.1-1ubuntu2_ppc64el.deb ... 57s Unpacking python3-cryptography (46.0.1-1ubuntu2) over (43.0.0-1ubuntu1) ... 58s Preparing to unpack .../sg3-utils_1.48-3ubuntu2_ppc64el.deb ... 58s Unpacking sg3-utils (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 58s Preparing to unpack .../sg3-utils-udev_1.48-3ubuntu2_all.deb ... 58s Unpacking sg3-utils-udev (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 58s Setting up libsgutils2-1.48:ppc64el (1.48-3ubuntu2) ... 58s Setting up python3-cryptography (46.0.1-1ubuntu2) ... 58s Setting up libatomic1:ppc64el (15.2.0-12ubuntu1) ... 58s Setting up libstdc++6:ppc64el (15.2.0-12ubuntu1) ... 58s Setting up sg3-utils (1.48-3ubuntu2) ... 58s Setting up sg3-utils-udev (1.48-3ubuntu2) ... 58s update-initramfs: deferring update (trigger activated) 58s Processing triggers for libc-bin (2.42-2ubuntu4) ... 58s Processing triggers for man-db (2.13.1-1) ... 59s Processing triggers for initramfs-tools (0.150ubuntu7) ... 59s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 66s autopkgtest [22:46:13]: upgrading testbed (apt dist-upgrade and autopurge) 66s Reading package lists... 66s Building dependency tree... 66s Reading state information... 66s Calculating upgrade... 66s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 67s Reading package lists... 67s Building dependency tree... 67s Reading state information... 67s Solving dependencies... 67s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 67s autopkgtest [22:46:14]: rebooting testbed after setup commands that affected boot 104s autopkgtest [22:46:51]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 106s autopkgtest [22:46:53]: @@@@@@@@@@@@@@@@@@@@ apt-source imx-code-signing-tool 108s Get:1 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (dsc) [1663 B] 108s Get:2 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (tar) [3065 kB] 108s Get:3 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (diff) [9932 B] 108s gpgv: Signature made Wed Jun 4 07:09:33 2025 UTC 108s gpgv: using EDDSA key 83DCD17F44B22CC83656EDA1E8446B4AC8C77261 108s gpgv: Can't check signature: No public key 108s dpkg-source: warning: cannot verify inline signature for ./imx-code-signing-tool_3.4.1+dfsg-6.dsc: no acceptable signature found 109s autopkgtest [22:46:56]: testing package imx-code-signing-tool version 3.4.1+dfsg-6 109s autopkgtest [22:46:56]: build not needed 109s autopkgtest [22:46:56]: test smoke: preparing testbed 110s Reading package lists... 110s Building dependency tree... 110s Reading state information... 110s Solving dependencies... 110s The following NEW packages will be installed: 110s imx-code-signing-tool libeac3 opensc opensc-pkcs11 110s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 110s Need to get 4805 kB of archives. 110s After this operation, 10.1 MB of additional disk space will be used. 110s Get:1 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libeac3 ppc64el 1.1.2+ds+git20220117+453c3d6b03a0-1.1build3 [63.2 kB] 110s Get:2 http://ftpmaster.internal/ubuntu resolute/universe ppc64el opensc-pkcs11 ppc64el 0.26.1-3 [1109 kB] 110s Get:3 http://ftpmaster.internal/ubuntu resolute/universe ppc64el opensc ppc64el 0.26.1-3 [424 kB] 110s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el imx-code-signing-tool ppc64el 3.4.1+dfsg-6 [3210 kB] 111s Fetched 4805 kB in 1s (9560 kB/s) 111s Selecting previously unselected package libeac3:ppc64el. 111s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 120844 files and directories currently installed.) 111s Preparing to unpack .../libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1build3_ppc64el.deb ... 111s Unpacking libeac3:ppc64el (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 111s Selecting previously unselected package opensc-pkcs11:ppc64el. 111s Preparing to unpack .../opensc-pkcs11_0.26.1-3_ppc64el.deb ... 111s Unpacking opensc-pkcs11:ppc64el (0.26.1-3) ... 111s Selecting previously unselected package opensc. 111s Preparing to unpack .../opensc_0.26.1-3_ppc64el.deb ... 111s Unpacking opensc (0.26.1-3) ... 111s Selecting previously unselected package imx-code-signing-tool. 111s Preparing to unpack .../imx-code-signing-tool_3.4.1+dfsg-6_ppc64el.deb ... 111s Unpacking imx-code-signing-tool (3.4.1+dfsg-6) ... 111s Setting up libeac3:ppc64el (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 111s Setting up opensc-pkcs11:ppc64el (0.26.1-3) ... 111s Setting up opensc (0.26.1-3) ... 111s Setting up imx-code-signing-tool (3.4.1+dfsg-6) ... 111s Processing triggers for man-db (2.13.1-1) ... 112s Processing triggers for libc-bin (2.42-2ubuntu4) ... 113s autopkgtest [22:47:00]: test smoke: [----------------------- 113s Usage: 113s 113s To generate output binary CSF using Code Signing Tool 113s ===================================================== 113s 113s cst --output --input 113s 113s -o, --output : 113s Output binary CSF filename 113s 113s -i, --input : 113s Input CSF text filename 113s 113s -c, --cert : 113s Optional, Input public key certificate to encrypt the dek 113s 113s -b, --backend : 113s Optional, Select backend. SSL backend is the default and 113s uses keys stored in the local host filesystem. The PKCS11 113s backend supplies an interface to PKCS11 supported keystore. 113s -g, --verbose: 113s Optional, displays verbose information. No additional 113s arguments are required 113s 113s -l, --license: 113s Optional, displays program license information. No additional 113s arguments are required 113s 113s -v, --version: 113s Optional, displays the version of the tool. No additional 113s arguments are required 113s 113s -h, --help: 113s Optional, displays usage information. No additional 113s arguments are required 113s 113s Examples: 113s --------- 113s 113s 1. To generate out_csf.bin file from input hab4.csf, use 113s cst -o out_csf.bin -i hab4.csf 113s 113s 2. To generate out_csf.bin file from input hab4.csf and output a plaintext dek, use 113s cst -o out_csf.bin -i hab4.csf 113s 113s 3. To generate out_csf.bin file from input hab4.csf and 113s encrypt the dek with cert.pem, use 113s cst -o out_csf.bin -c cert.pem -i hab4.csf 113s 113s 4. To print program license information, use 113s cst --license 113s 113s 113s Usage: 113s 113s To generate SRK Table data and the SRK Table hash for AHAB 113s ========================================================== 113s 113s srktool --ahab_ver --table --efuses 113s --sign_digest --certs ,,... 113s [--fuse_format ] [--license] 113s 113s -a, --ahab_ver: 113s AHAB Version - set for AHAB SRK table generation 113s 113s -t, --table : 113s Filename for output SRK table binary file 113s 113s -e, --efuses : 113s Filename for the output SRK efuse binary file containing the SRK table 113s hash 113s 113s -d, --digest : 113s Message Digest algorithm. 113s - sha512 (default): Supported in 8/8x devices 113s - sha256: Supported in 8ULP 113s 113s -s, --sign_digest : 113s Signature Digest algorithm. Either sha256, sha384 or sha512 113s 113s -c, --certs ,,...,: 113s X.509v3 certificate filenames. 113s - Certificates may be either DER or PEM encoded format 113s - Certificate filenames must be separated by a ','with no spaces 113s - A maximum of 4 certificate filenames may be provided. Additional 113s certificate names are ignored 113s -f, --fuse_format : 113s Optional, Data format of the SRK efuse binary file. The 113s format may be selected by setting to either: 113s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 113s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 113s 113s -l, --license: 113s Optional, displays program license information. No additional 113s arguments are required. 113s 113s -v, --version: 113s Optional, displays the version of the tool. No additional 113s arguments are required. 113s 113s -b, --verbose: 113s Optional, displays a verbose output. 113s 113s Examples: 113s --------- 113s 113s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 113s - using PEM encoded certificate files 113s - using the default 32 fuse bits per word for the efuse file 113s 113s srktool --ahab_ver --sign_digest sha384 --table table.bin --efuses fuses.bin \ 113s --certs srk1_crt.pem,srk2_crt.pem,srk3_crt.pem 113s 113s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 113s - using DER encoded certificate files 113s - using the optional 8 fuse bits per word for the efuse file 113s 113s srktool --ahab_ver --sign_digest sha256 --table table.bin --efuses fuses.bin \ 113s --certs srk1_crt.pem,srk2_crt.pem \ 113s --fuse_format 1 113s 113s 113s Usage: 113s 113s To generate SRK Table data and the SRK Table hash for HAB4 113s ========================================================== 113s 113s srktool --hab_ver --table --efuses 113s --digest --certs ,%,... 113s [--fuse_format ] [--license] 113s 113s -h, --hab_ver : 113s HAB Version - set to 4 for HAB4 SRK table generation 113s 113s -t, --table : 113s Filename for output SRK table binary file 113s 113s -e, --efuses : 113s Filename for the output SRK efuse binary file containing the SRK table 113s hash 113s 113s -d, --digest : 113s Message Digest algorithm. Only sha256 is supported 113s 113s -c, --certs ,,...,: 113s X.509v3 certificate filenames. 113s - Certificates may be either DER or PEM encoded format 113s - Certificate filenames must be separated by a ','with no spaces 113s - A maximum of 4 certificate filenames may be provided. Additional 113s certificate names are ignored 113s - Placing a % in front of a filename replaces the public 113s key data in the SRK table with a corresponding hash digest 113s 113s -f, --fuse_format : 113s Optional, Data format of the SRK efuse binary file. The 113s format may be selected by setting to either: 113s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 113s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 113s 113s -l, --license: 113s Optional, displays program license information. No additional 113s arguments are required. 113s 113s -v, --version: 113s Optional, displays the version of the tool. No additional 113s arguments are required. 113s 113s -b, --verbose: 113s Optional, displays a verbose output. 113s 113s Examples: 113s --------- 113s 113s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 113s - using PEM encoded certificate files 113s - using full key for first two certs and hash digest for the third 113s - using the default 32 fuse bits per word for the efuse file 113s 113s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 113s --digest sha256 \ 113s --certs srk1_crt.pem,srk2_crt.pem,%srk3_crt.pem 113s 113s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 113s - using DER encoded certificate files 113s - using the optional 8 fuse bits per word for the efuse file 113s 113s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 113s --digest sha256 \ 113s --certs srk1_crt.pem,srk2_crt.pem \ 113s --fuse_format 1 113s 113s srktool: unrecognized option '--help' 113s autopkgtest [22:47:00]: test smoke: -----------------------] 114s smoke PASS (superficial) 114s autopkgtest [22:47:01]: test smoke: - - - - - - - - - - results - - - - - - - - - - 114s autopkgtest [22:47:01]: test create-csf: preparing testbed 114s Reading package lists... 114s Building dependency tree... 114s Reading state information... 114s Solving dependencies... 114s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 115s autopkgtest [22:47:02]: test create-csf: [----------------------- 115s + mktemp -d 115s + dir=/tmp/tmp.DYemZ8b4wL 115s + mkdir -p /tmp/tmp.DYemZ8b4wL/keys 115s + cd /tmp/tmp.DYemZ8b4wL/keys 115s + /usr/share/libexec/imx-code-signing-tool/pki_scripts/hab4_pki_tree.sh -existing-ca n -kt ecc -kl p256 -num-srk 1 -duration 100 -srk-ca y 115s 115s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 115s This script is a part of the Code signing tools for NXP's 115s High Assurance Boot. It generates a basic PKI tree. The PKI 115s tree consists of one or more Super Root Keys (SRK), with each 115s SRK having two subordinate keys: 115s + a Command Sequence File (CSF) key 115s + Image key. 115s Additional keys can be added to the PKI tree but a separate 115s script is available for this. This this script assumes openssl 115s is installed on your system and is included in your search 115s path. Finally, the private keys generated are password 115s protectedwith the password provided by the file key_pass.txt. 115s The format of the file is the password repeated twice: 115s my_password 115s my_password 115s All private keys in the PKI tree are in PKCS #8 format will be 115s protected by the same password. 115s 115s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 115s A default 'serial' file was created! 115s A default file 'key_pass.txt' was created with password = test! 115s stty: Inappropriate ioctl for device 115s 115s +++++++++++++++++++++++++++++++++++++ 115s + Generating CA key and certificate + 115s +++++++++++++++++++++++++++++++++++++ 115s 115s using curve name prime256v1 instead of secp256r1 115s ----- 115s 115s ++++++++++++++++++++++++++++++++++++++++ 115s + Generating SRK key and certificate 1 + 115s ++++++++++++++++++++++++++++++++++++++++ 115s 115s using curve name prime256v1 instead of secp256r1 115s read EC key 115s writing EC key 115s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 115s Check that the request matches the signature 115s Signature ok 115s The Subject's Distinguished Name is as follows 115s commonName :ASN.1 12:'SRK1_sha256_secp256r1_v3_ca' 115s Certificate is to be certified until Jan 5 22:47:02 2126 GMT (36500 days) 115s 115s Write out database with 1 new entries 115s Database updated 115s 115s ++++++++++++++++++++++++++++++++++++++++ 115s + Generating CSF key and certificate 1 + 115s ++++++++++++++++++++++++++++++++++++++++ 115s 115s using curve name prime256v1 instead of secp256r1 115s read EC key 115s writing EC key 115s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 115s Check that the request matches the signature 115s Signature ok 115s The Subject's Distinguished Name is as follows 115s commonName :ASN.1 12:'CSF1_1_sha256_secp256r1_v3_usr' 115s Certificate is to be certified until Jan 5 22:47:02 2126 GMT (36500 days) 115s 115s Write out database with 1 new entries 115s Database updated 115s 115s ++++++++++++++++++++++++++++++++++++++++ 115s + Generating IMG key and certificate 1 + 115s ++++++++++++++++++++++++++++++++++++++++ 115s 115s using curve name prime256v1 instead of secp256r1 115s read EC key 115s writing EC key 115s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 116s Check that the request matches the signature 116s Signature ok 116s The Subject's Distinguished Name is as follows 116s commonName :ASN.1 12:'IMG1_1_sha256_secp256r1_v3_usr' 116s Certificate is to be certified until Jan 5 22:47:02 2126 GMT (36500 days) 116s 116s Write out database with 1 new entries 116s Database updated 116s + cd /tmp/tmp.DYemZ8b4wL/crts 116s + srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c SRK1_sha256_secp256r1_v3_ca_crt.pem 116s Number of certificates = 1 116s SRK table binary filename = SRK_1_2_3_4_table.bin 116s SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin 116s SRK Fuse binary dump: 116s SRK HASH[0] = 0xD06CD5AB 116s SRK HASH[1] = 0xA64F48DD 116s SRK HASH[2] = 0x384E2E72 116s SRK HASH[3] = 0x420195DC 116s SRK HASH[4] = 0xF6A97BFF 116s SRK HASH[5] = 0xCD3F7907 116s SRK HASH[6] = 0xEF5A1434 116s SRK HASH[7] = 0xC6824030 116s + cd /tmp/tmp.DYemZ8b4wL 116s + cat 116s + cst -i hab4.csf -o csf.bin 116s CSF Processed successfully and signed data available in csf.bin 116s + test -f csf.bin 116s + cat 116s + csf_parser -c csf.bin 116s + cmp -l csf.log expected-csf.log 116s autopkgtest [22:47:03]: test create-csf: -----------------------] 116s create-csf PASS 116s autopkgtest [22:47:03]: test create-csf: - - - - - - - - - - results - - - - - - - - - - 117s autopkgtest [22:47:04]: @@@@@@@@@@@@@@@@@@@@ summary 117s smoke PASS (superficial) 117s create-csf PASS