0s autopkgtest [01:13:49]: starting date and time: 2026-01-30 01:13:49+0000 0s autopkgtest [01:13:49]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [01:13:49]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.az7clx0l/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-cryptography,src:sphinx-rtd-theme --apt-upgrade imx-code-signing-tool --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-cryptography/46.0.1-1ubuntu2 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-s390x-8.secgroup --name adt-resolute-s390x-imx-code-signing-tool-20260130-011349-juju-7f2275-prod-proposed-migration-environment-2-9403514b-409a-4ce2-b1e4-c79bd6d84ade --image adt/ubuntu-resolute-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-s390x-imx-code-signing-tool-20260130-011349-juju-7f2275-prod-proposed-migration-environment-2-9403514b-409a-4ce2-b1e4-c79bd6d84ade from image adt/ubuntu-resolute-s390x-server-20260129.img (UUID 0fdc3f45-c7c7-4a2c-aa6d-edc1dbbf6141)... 102s autopkgtest [01:15:31]: testbed dpkg architecture: s390x 102s autopkgtest [01:15:31]: testbed apt version: 3.1.14 102s autopkgtest [01:15:31]: @@@@@@@@@@@@@@@@@@@@ test bed setup 102s autopkgtest [01:15:31]: testbed release detected to be: None 104s autopkgtest [01:15:33]: updating testbed package index (apt update) 105s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 105s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 105s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 105s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 105s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1043 kB] 105s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [2820 B] 105s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [103 kB] 105s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [25.4 kB] 105s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [115 kB] 105s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [766 kB] 105s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [6428 B] 106s Fetched 2186 kB in 1s (1495 kB/s) 110s Reading package lists... 110s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 110s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 110s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 110s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 114s Reading package lists... 115s Reading package lists... 116s Building dependency tree... 116s Reading state information... 117s Calculating upgrade... 118s The following packages will be REMOVED: 118s python3-openssl 118s The following packages will be upgraded: 118s gcc-15-base libatomic1 libgcc-s1 libsgutils2-1.48 libstdc++6 118s python3-cryptography sg3-utils sg3-utils-udev 118s 8 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 118s Need to get 3291 kB of archives. 118s After this operation, 98.3 kB disk space will be freed. 118s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x libatomic1 s390x 15.2.0-12ubuntu1 [9486 B] 118s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libstdc++6 s390x 15.2.0-12ubuntu1 [907 kB] 118s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x gcc-15-base s390x 15.2.0-12ubuntu1 [59.6 kB] 118s Get:4 http://ftpmaster.internal/ubuntu resolute/main s390x libgcc-s1 s390x 15.2.0-12ubuntu1 [35.7 kB] 118s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libsgutils2-1.48 s390x 1.48-3ubuntu2 [120 kB] 118s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x python3-cryptography s390x 46.0.1-1ubuntu2 [1128 kB] 118s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x sg3-utils s390x 1.48-3ubuntu2 [1025 kB] 118s Get:8 http://ftpmaster.internal/ubuntu resolute/main s390x sg3-utils-udev all 1.48-3ubuntu2 [6610 B] 120s dpkg-preconfigure: unable to re-open stdin: No such file or directory 120s Fetched 3291 kB in 1s (6168 kB/s) 122s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 87718 files and directories currently installed.) 122s Removing python3-openssl (25.1.0-1) ... 122s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 87703 files and directories currently installed.) 122s Preparing to unpack .../libatomic1_15.2.0-12ubuntu1_s390x.deb ... 123s Unpacking libatomic1:s390x (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 123s Preparing to unpack .../libstdc++6_15.2.0-12ubuntu1_s390x.deb ... 123s Unpacking libstdc++6:s390x (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 123s Preparing to unpack .../gcc-15-base_15.2.0-12ubuntu1_s390x.deb ... 123s Unpacking gcc-15-base:s390x (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 123s Setting up gcc-15-base:s390x (15.2.0-12ubuntu1) ... 123s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 87703 files and directories currently installed.) 123s Preparing to unpack .../libgcc-s1_15.2.0-12ubuntu1_s390x.deb ... 123s Unpacking libgcc-s1:s390x (15.2.0-12ubuntu1) over (15.2.0-11ubuntu1) ... 123s Setting up libgcc-s1:s390x (15.2.0-12ubuntu1) ... 124s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 87703 files and directories currently installed.) 124s Preparing to unpack .../libsgutils2-1.48_1.48-3ubuntu2_s390x.deb ... 124s Unpacking libsgutils2-1.48:s390x (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 124s Preparing to unpack .../python3-cryptography_46.0.1-1ubuntu2_s390x.deb ... 124s Unpacking python3-cryptography (46.0.1-1ubuntu2) over (43.0.0-1ubuntu1) ... 125s Preparing to unpack .../sg3-utils_1.48-3ubuntu2_s390x.deb ... 125s Unpacking sg3-utils (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 125s Preparing to unpack .../sg3-utils-udev_1.48-3ubuntu2_all.deb ... 125s Unpacking sg3-utils-udev (1.48-3ubuntu2) over (1.48-3ubuntu1) ... 125s Setting up libsgutils2-1.48:s390x (1.48-3ubuntu2) ... 125s Setting up python3-cryptography (46.0.1-1ubuntu2) ... 126s Setting up libatomic1:s390x (15.2.0-12ubuntu1) ... 127s Setting up libstdc++6:s390x (15.2.0-12ubuntu1) ... 127s Setting up sg3-utils (1.48-3ubuntu2) ... 127s Setting up sg3-utils-udev (1.48-3ubuntu2) ... 128s update-initramfs: deferring update (trigger activated) 128s Processing triggers for libc-bin (2.42-2ubuntu4) ... 128s Processing triggers for man-db (2.13.1-1) ... 131s Processing triggers for initramfs-tools (0.150ubuntu7) ... 131s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 151s Using config file '/etc/zipl.conf' 151s Building bootmap in '/boot' 151s Adding IPL section 'ubuntu' (default) 152s Preparing boot device: vda. 152s Done. 153s autopkgtest [01:16:22]: upgrading testbed (apt dist-upgrade and autopurge) 153s Reading package lists... 154s Building dependency tree... 154s Reading state information... 154s Calculating upgrade... 155s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 155s Reading package lists... 156s Building dependency tree... 156s Reading state information... 157s Solving dependencies... 157s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 158s autopkgtest [01:16:27]: rebooting testbed after setup commands that affected boot 203s autopkgtest [01:17:12]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 207s autopkgtest [01:17:16]: @@@@@@@@@@@@@@@@@@@@ apt-source imx-code-signing-tool 210s Get:1 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (dsc) [1663 B] 210s Get:2 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (tar) [3065 kB] 210s Get:3 http://ftpmaster.internal/ubuntu resolute/universe imx-code-signing-tool 3.4.1+dfsg-6 (diff) [9932 B] 211s gpgv: Signature made Wed Jun 4 07:09:33 2025 UTC 211s gpgv: using EDDSA key 83DCD17F44B22CC83656EDA1E8446B4AC8C77261 211s gpgv: Can't check signature: No public key 211s dpkg-source: warning: cannot verify inline signature for ./imx-code-signing-tool_3.4.1+dfsg-6.dsc: no acceptable signature found 212s autopkgtest [01:17:21]: testing package imx-code-signing-tool version 3.4.1+dfsg-6 212s autopkgtest [01:17:21]: build not needed 213s autopkgtest [01:17:22]: test smoke: preparing testbed 213s Reading package lists... 215s Building dependency tree... 215s Reading state information... 215s Solving dependencies... 215s The following NEW packages will be installed: 215s imx-code-signing-tool libeac3 opensc opensc-pkcs11 215s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 215s Need to get 4621 kB of archives. 215s After this operation, 8034 kB of additional disk space will be used. 215s Get:1 http://ftpmaster.internal/ubuntu resolute/universe s390x libeac3 s390x 1.1.2+ds+git20220117+453c3d6b03a0-1.1build3 [54.5 kB] 215s Get:2 http://ftpmaster.internal/ubuntu resolute/universe s390x opensc-pkcs11 s390x 0.26.1-3 [957 kB] 216s Get:3 http://ftpmaster.internal/ubuntu resolute/universe s390x opensc s390x 0.26.1-3 [404 kB] 216s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x imx-code-signing-tool s390x 3.4.1+dfsg-6 [3206 kB] 216s Fetched 4621 kB in 1s (5647 kB/s) 216s Selecting previously unselected package libeac3:s390x. 217s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 87708 files and directories currently installed.) 217s Preparing to unpack .../libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1build3_s390x.deb ... 217s Unpacking libeac3:s390x (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 217s Selecting previously unselected package opensc-pkcs11:s390x. 217s Preparing to unpack .../opensc-pkcs11_0.26.1-3_s390x.deb ... 217s Unpacking opensc-pkcs11:s390x (0.26.1-3) ... 217s Selecting previously unselected package opensc. 217s Preparing to unpack .../opensc_0.26.1-3_s390x.deb ... 217s Unpacking opensc (0.26.1-3) ... 217s Selecting previously unselected package imx-code-signing-tool. 217s Preparing to unpack .../imx-code-signing-tool_3.4.1+dfsg-6_s390x.deb ... 217s Unpacking imx-code-signing-tool (3.4.1+dfsg-6) ... 217s Setting up libeac3:s390x (1.1.2+ds+git20220117+453c3d6b03a0-1.1build3) ... 217s Setting up opensc-pkcs11:s390x (0.26.1-3) ... 217s Setting up opensc (0.26.1-3) ... 217s Setting up imx-code-signing-tool (3.4.1+dfsg-6) ... 217s Processing triggers for man-db (2.13.1-1) ... 219s Processing triggers for libc-bin (2.42-2ubuntu4) ... 220s autopkgtest [01:17:29]: test smoke: [----------------------- 221s Usage: 221s 221s To generate output binary CSF using Code Signing Tool 221s ===================================================== 221s 221s cst --output --input 221s 221s -o, --output : 221s Output binary CSF filename 221s 221s -i, --input : 221s Input CSF text filename 221s 221s -c, --cert : 221s Optional, Input public key certificate to encrypt the dek 221s 221s -b, --backend : 221s Optional, Select backend. SSL backend is the default and 221s uses keys stored in the local host filesystem. The PKCS11 221s backend supplies an interface to PKCS11 supported keystore. 221s -g, --verbose: 221s Optional, displays verbose information. No additional 221s arguments are required 221s 221s -l, --license: 221s Optional, displays program license information. No additional 221s arguments are required 221s 221s -v, --version: 221s Optional, displays the version of the tool. No additional 221s arguments are required 221s 221s -h, --help: 221s Optional, displays usage information. No additional 221s arguments are required 221s 221s Examples: 221s --------- 221s 221s 1. To generate out_csf.bin file from input hab4.csf, use 221s cst -o out_csf.bin -i hab4.csf 221s 221s 2. To generate out_csf.bin file from input hab4.csf and output a plaintext dek, use 221s cst -o out_csf.bin -i hab4.csf 221s 221s 3. To generate out_csf.bin file from input hab4.csf and 221s encrypt the dek with cert.pem, use 221s cst -o out_csf.bin -c cert.pem -i hab4.csf 221s 221s 4. To print program license information, use 221s cst --license 221s 221s srktool: unrecognized option '--help' 221s 221s Usage: 221s 221s To generate SRK Table data and the SRK Table hash for AHAB 221s ========================================================== 221s 221s srktool --ahab_ver --table --efuses 221s --sign_digest --certs ,,... 221s [--fuse_format ] [--license] 221s 221s -a, --ahab_ver: 221s AHAB Version - set for AHAB SRK table generation 221s 221s -t, --table : 221s Filename for output SRK table binary file 221s 221s -e, --efuses : 221s Filename for the output SRK efuse binary file containing the SRK table 221s hash 221s 221s -d, --digest : 221s Message Digest algorithm. 221s - sha512 (default): Supported in 8/8x devices 221s - sha256: Supported in 8ULP 221s 221s -s, --sign_digest : 221s Signature Digest algorithm. Either sha256, sha384 or sha512 221s 221s -c, --certs ,,...,: 221s X.509v3 certificate filenames. 221s - Certificates may be either DER or PEM encoded format 221s - Certificate filenames must be separated by a ','with no spaces 221s - A maximum of 4 certificate filenames may be provided. Additional 221s certificate names are ignored 221s -f, --fuse_format : 221s Optional, Data format of the SRK efuse binary file. The 221s format may be selected by setting to either: 221s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 221s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 221s 221s -l, --license: 221s Optional, displays program license information. No additional 221s arguments are required. 221s 221s -v, --version: 221s Optional, displays the version of the tool. No additional 221s arguments are required. 221s 221s -b, --verbose: 221s Optional, displays a verbose output. 221s 221s Examples: 221s --------- 221s 221s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 221s - using PEM encoded certificate files 221s - using the default 32 fuse bits per word for the efuse file 221s 221s srktool --ahab_ver --sign_digest sha384 --table table.bin --efuses fuses.bin \ 221s --certs srk1_crt.pem,srk2_crt.pem,srk3_crt.pem 221s 221s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 221s - using DER encoded certificate files 221s - using the optional 8 fuse bits per word for the efuse file 221s 221s srktool --ahab_ver --sign_digest sha256 --table table.bin --efuses fuses.bin \ 221s --certs srk1_crt.pem,srk2_crt.pem \ 221s --fuse_format 1 221s 221s 221s Usage: 221s 221s To generate SRK Table data and the SRK Table hash for HAB4 221s ========================================================== 221s 221s srktool --hab_ver --table --efuses 221s --digest --certs ,%,... 221s [--fuse_format ] [--license] 221s 221s -h, --hab_ver : 221s HAB Version - set to 4 for HAB4 SRK table generation 221s 221s -t, --table : 221s Filename for output SRK table binary file 221s 221s -e, --efuses : 221s Filename for the output SRK efuse binary file containing the SRK table 221s hash 221s 221s -d, --digest : 221s Message Digest algorithm. Only sha256 is supported 221s 221s -c, --certs ,,...,: 221s X.509v3 certificate filenames. 221s - Certificates may be either DER or PEM encoded format 221s - Certificate filenames must be separated by a ','with no spaces 221s - A maximum of 4 certificate filenames may be provided. Additional 221s certificate names are ignored 221s - Placing a % in front of a filename replaces the public 221s key data in the SRK table with a corresponding hash digest 221s 221s -f, --fuse_format : 221s Optional, Data format of the SRK efuse binary file. The 221s format may be selected by setting to either: 221s - 0: 8 fuses per word, ex: 00 00 00 0a 00 00 00 01 ... 221s - 1 (default): 32 fuses per word, ex: 0a 01 ff 8e 221s 221s -l, --license: 221s Optional, displays program license information. No additional 221s arguments are required. 221s 221s -v, --version: 221s Optional, displays the version of the tool. No additional 221s arguments are required. 221s 221s -b, --verbose: 221s Optional, displays a verbose output. 221s 221s Examples: 221s --------- 221s 221s 1. To generate an SRK table and corresponding fuse pattern from 3 certificates 221s - using PEM encoded certificate files 221s - using full key for first two certs and hash digest for the third 221s - using the default 32 fuse bits per word for the efuse file 221s 221s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 221s --digest sha256 \ 221s --certs srk1_crt.pem,srk2_crt.pem,%srk3_crt.pem 221s 221s 2. To generate an SRK table and corresponding fuse pattern from 2 certificates 221s - using DER encoded certificate files 221s - using the optional 8 fuse bits per word for the efuse file 221s 221s srktool --hab_ver 4 --table table.bin --efuses fuses.bin \ 221s --digest sha256 \ 221s --certs srk1_crt.pem,srk2_crt.pem \ 221s --fuse_format 1 221s 221s autopkgtest [01:17:30]: test smoke: -----------------------] 221s autopkgtest [01:17:30]: test smoke: - - - - - - - - - - results - - - - - - - - - - 221s smoke PASS (superficial) 222s autopkgtest [01:17:31]: test create-csf: preparing testbed 222s Reading package lists... 223s Building dependency tree... 223s Reading state information... 224s Solving dependencies... 224s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 225s autopkgtest [01:17:34]: test create-csf: [----------------------- 225s + mktemp -d 225s + dir=/tmp/tmp.3AP661ybUS 225s + mkdir -p /tmp/tmp.3AP661ybUS/keys 225s + cd /tmp/tmp.3AP661ybUS/keys 225s + /usr/share/libexec/imx-code-signing-tool/pki_scripts/hab4_pki_tree.sh -existing-ca n -kt ecc -kl p256 -num-srk 1 -duration 100 -srk-ca y 225s 225s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 225s This script is a part of the Code signing tools for NXP's 225s High Assurance Boot. It generates a basic PKI tree. The PKI 225s tree consists of one or more Super Root Keys (SRK), with each 225s SRK having two subordinate keys: 225s + a Command Sequence File (CSF) key 225s + Image key. 225s Additional keys can be added to the PKI tree but a separate 225s script is available for this. This this script assumes openssl 225s is installed on your system and is included in your search 225s path. Finally, the private keys generated are password 225s protectedwith the password provided by the file key_pass.txt. 225s The format of the file is the password repeated twice: 225s my_password 225s my_password 225s All private keys in the PKI tree are in PKCS #8 format will be 225s protected by the same password. 225s 225s +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 225s stty: Inappropriate ioctl for device 225s A default 'serial' file was created! 225s A default file 'key_pass.txt' was created with password = test! 225s 225s +++++++++++++++++++++++++++++++++++++ 225s + Generating CA key and certificate + 225s +++++++++++++++++++++++++++++++++++++ 225s 225s using curve name prime256v1 instead of secp256r1 225s ----- 225s 225s ++++++++++++++++++++++++++++++++++++++++ 225s + Generating SRK key and certificate 1 + 225s ++++++++++++++++++++++++++++++++++++++++ 225s 225s using curve name prime256v1 instead of secp256r1 225s read EC key 225s writing EC key 225s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 225s Check that the request matches the signature 225s Signature ok 225s The Subject's Distinguished Name is as follows 225s commonName :ASN.1 12:'SRK1_sha256_secp256r1_v3_ca' 225s Certificate is to be certified until Jan 6 01:18:55 2126 GMT (36500 days) 225s 225s Write out database with 1 new entries 225s Database updated 225s 225s ++++++++++++++++++++++++++++++++++++++++ 225s + Generating CSF key and certificate 1 + 225s ++++++++++++++++++++++++++++++++++++++++ 225s 225s using curve name prime256v1 instead of secp256r1 225s read EC key 225s writing EC key 225s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 225s Check that the request matches the signature 225s Signature ok 225s The Subject's Distinguished Name is as follows 225s commonName :ASN.1 12:'CSF1_1_sha256_secp256r1_v3_usr' 225s Certificate is to be certified until Jan 6 01:18:55 2126 GMT (36500 days) 225s 225s Write out database with 1 new entries 225s Database updated 225s 225s ++++++++++++++++++++++++++++++++++++++++ 225s + Generating IMG key and certificate 1 + 225s ++++++++++++++++++++++++++++++++++++++++ 225s 225s using curve name prime256v1 instead of secp256r1 225s read EC key 225s writing EC key 225s Using configuration from /usr/share/doc/imx-code-signing-tool/pki_scripts/ca/openssl.cnf 225s Check that the request matches the signature 225s Signature ok 225s The Subject's Distinguished Name is as follows 225s commonName :ASN.1 12:'IMG1_1_sha256_secp256r1_v3_usr' 225s Certificate is to be certified until Jan 6 01:18:55 2126 GMT (36500 days) 225s 225s Write out database with 1 new entries 225s Database updated 225s + cd /tmp/tmp.3AP661ybUS/crts 225s + srktool -h 4 -t SRK_1_2_3_4_table.bin -e SRK_1_2_3_4_fuse.bin -d sha256 -c SRK1_sha256_secp256r1_v3_ca_crt.pem 225s + cd /tmp/tmp.3AP661ybUS 225s + cat 225s + cst -i hab4.csf -o csf.bin 225s Number of certificates = 1 225s SRK table binary filename = SRK_1_2_3_4_table.bin 225s SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin 225s SRK Fuse binary dump: 225s SRK HASH[0] = 0x6CDF6EE6 225s SRK HASH[1] = 0x2A108689 225s SRK HASH[2] = 0x4D83FE38 225s SRK HASH[3] = 0x5254A29F 225s SRK HASH[4] = 0xBC7AA83F 225s SRK HASH[5] = 0xE25611B0 225s SRK HASH[6] = 0x08173879 225s SRK HASH[7] = 0x30DE5A77 225s + test -f csf.bin 225s + CSF Processed successfully and signed data available in csf.bin 225s cat 225s + csf_parser -c csf.bin 225s + cmp -l csf.log expected-csf.log 226s autopkgtest [01:17:35]: test create-csf: -----------------------] 226s autopkgtest [01:17:35]: test create-csf: - - - - - - - - - - results - - - - - - - - - - 226s create-csf PASS 227s autopkgtest [01:17:36]: @@@@@@@@@@@@@@@@@@@@ summary 227s smoke PASS (superficial) 227s create-csf PASS