From patchwork Mon Jul 20 06:33:39 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: AKASHI Takahiro X-Patchwork-Id: 235755 Delivered-To: patch@linaro.org Received: by 2002:a92:d244:0:0:0:0:0 with SMTP id v4csp1708918ilg; Sun, 19 Jul 2020 23:34:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNHN9Bm9BjbIITZtptsko56CIK8ZV1xZ1TtxyzAr4TkbPvo+yFZaLKtpqxX1Kd6pHtCG3f X-Received: by 2002:a17:906:eb94:: with SMTP id mh20mr16326188ejb.209.1595226850504; Sun, 19 Jul 2020 23:34:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595226850; cv=none; d=google.com; s=arc-20160816; b=b7bELbOVMaHRXfCGdIlJN2IWOeXUj8P+7ha9mSufe67C5QlOMXLihb0aabit1vg/aX qAMtqj79+6XyLEfufaUeLwBwSJp2HZUYeK+j2CmB4/MgeSgyAdlGpMK781WEnVjkE1wv QSAVLA0fXXDCE8rUEFa6WW22VEg1IgpP+ojzg9N9yf7qfr8prMPSNtaGyRDAdOJS4n0X rp8ZT6J6GdciU94sDM/z7MFqNG8dywnH1ZhqENXcvucB8EfPxbbdyNx6BlZJLdp7iSRh Nixvjd/rc/OxalQ7Ovkh33SQyMRCjVsaGOMv6+L62duKkxXCfCBzWtM5fUmAYwZAp7Jl xPKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=NT6IhZuNOzFJXWSOIHntYnlB3FxRZkm2brL/M/94Pyc=; b=a40u5zd+UQxNPPlo/YoK55PCGdmhaaco9zWqpNp+8pdfHcpg8YA0SQLbBwDHWbhKZA M9xw0Q9IsqpoC3cxcysYtZxaouI7gZuwpyku0m+In4mMv6UnRvYjAC7p9wa1jnFL0QX6 3TFSpybkYTXyeK0NrF4cBaLQZAnmI9PXqIpYqe+kx7rPTq6/GTCxRCWYqZhOT7k1N54r iGBknNhkFrFy6juYax617xBAa5c0+2Bgl82ZiGE6ZvBYCHZpDxRQ6hSoRU9svtpBvoPs cujnSQltU6aL+mVC8WoSDfJWQd2HKmIganVNUOwTH7uXjskJWI7mvOqT3p6i1L8XNivM ix1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=RG6+vHfT; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from phobos.denx.de (phobos.denx.de. [2a01:238:438b:c500:173d:9f52:ddab:ee01]) by mx.google.com with ESMTPS id k9si9859067ejp.499.2020.07.19.23.34.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 19 Jul 2020 23:34:10 -0700 (PDT) Received-SPF: pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=RG6+vHfT; spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 64C1381D9E; Mon, 20 Jul 2020 08:34:00 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="RG6+vHfT"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 63ED781F88; Mon, 20 Jul 2020 08:33:58 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,SPF_HELO_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-pl1-x62e.google.com (mail-pl1-x62e.google.com [IPv6:2607:f8b0:4864:20::62e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id CADE081BDD for ; Mon, 20 Jul 2020 08:33:54 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=takahiro.akashi@linaro.org Received: by mail-pl1-x62e.google.com with SMTP id x9so8227773plr.2 for ; Sun, 19 Jul 2020 23:33:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=NT6IhZuNOzFJXWSOIHntYnlB3FxRZkm2brL/M/94Pyc=; b=RG6+vHfTF17ogOi3pkqrLcpeO94BTJsBCVht/54HynjukAWRcuplzCS3qTNantQQcy 50h/Wkky10BTMu+aCtUfzkblOAOapKAEjn1LeNw6qhODzRo6WMWaGCyKU9hcA9msjglU 5VTtyCDTt51U3sz/+4PNRDHXOgL5Q0O5gvWVJRq6gujxoGjkyYz5QjoK60yeKSbrpluk cn3pY50Xug+pGhdxjzpwLQnmWn4Lgre1nzi3SNjn9/KRExT3hz55P7imujk0S3T9SJ39 abAI2WErQ2Ndo4s+nrU7CVa6jd+uMK5iyzNUaG5Fj3K9xNQ8qiuMBhJO7Cc6NlOvjztS 5yuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=NT6IhZuNOzFJXWSOIHntYnlB3FxRZkm2brL/M/94Pyc=; b=jhREjvugD1I7u61Q703DYQLta+Rhlx2uZ8yz70v3Ao5Shx6tGrqhPHpnHqDlkTXL5T t2RoTJAu51iEzjNykIPEumI80CPduiJ83Nxr8bJUVTPnTWT5zVS+ONBOziZBWbShS/1J 7I0cNq12HxaghpJpdO1p/1ZrQcTtTNlI7jd8E84wr5f3Tv5NQcEURLJXHRoWYtCzM+HN uqhVNonozGu/F/LH2cMLR/tB66RUGfTNVOxdrHL/uqZD0hhws3+kX86byN4WOM0da1mH oawjJqZXWt3L0WKJLtszjZCjBAWmtP6/gBhSjqOn0zAxyfrSYvhQ/JE74fgs8cv7oS2U tF+w== X-Gm-Message-State: AOAM533hr80ltP4GKKpIyOyrq0rMFBDl/iHBqexs4Ao5H46aS3t3Sn2G qfuEx2S1b0cDuoJ3P0wgRkgekw== X-Received: by 2002:a17:902:5981:: with SMTP id p1mr16366373pli.141.1595226833135; Sun, 19 Jul 2020 23:33:53 -0700 (PDT) Received: from localhost.localdomain (p6e424d9a.tkyea130.ap.so-net.ne.jp. [110.66.77.154]) by smtp.gmail.com with ESMTPSA id q5sm15784332pfc.130.2020.07.19.23.33.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 19 Jul 2020 23:33:52 -0700 (PDT) From: AKASHI Takahiro To: xypron.glpk@gmx.de, agraf@csgraf.de Cc: u-boot@lists.denx.de, AKASHI Takahiro Subject: [PATCH] test/py: efi_secboot: fix additional pylint errors Date: Mon, 20 Jul 2020 15:33:39 +0900 Message-Id: <20200720063339.14001-1-takahiro.akashi@linaro.org> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean This is a fixup by autopep8 after the commit ("test/py: efi_secboot: apply autopep8"). Signed-off-by: AKASHI Takahiro --- test/py/tests/test_efi_secboot/conftest.py | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) -- 2.27.0 diff --git a/test/py/tests/test_efi_secboot/conftest.py b/test/py/tests/test_efi_secboot/conftest.py index c6709700a876..6c1ea2dcb684 100644 --- a/test/py/tests/test_efi_secboot/conftest.py +++ b/test/py/tests/test_efi_secboot/conftest.py @@ -87,21 +87,21 @@ def efi_boot_env(request, u_boot_config): # db1-update check_call('cd %s; %ssign-efi-sig-list -t "2020-04-06" -a -c KEK.crt -k KEK.key db db1.esl db1-update.auth' % (mnt_point, EFITOOLS_PATH), shell=True) - ## dbx (TEST_dbx certificate) + # dbx (TEST_dbx certificate) check_call('cd %s; openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=TEST_dbx/ -keyout dbx.key -out dbx.crt -nodes -days 365' % mnt_point, shell=True) check_call('cd %s; %scert-to-efi-sig-list -g %s dbx.crt dbx.esl; %ssign-efi-sig-list -t "2020-04-05" -c KEK.crt -k KEK.key dbx dbx.esl dbx.auth' % (mnt_point, EFITOOLS_PATH, GUID, EFITOOLS_PATH), shell=True) - ## dbx_hash (digest of TEST_db certificate) + # dbx_hash (digest of TEST_db certificate) check_call('cd %s; %scert-to-efi-hash-list -g %s -t 0 -s 256 db.crt dbx_hash.crl; %ssign-efi-sig-list -t "2020-04-05" -c KEK.crt -k KEK.key dbx dbx_hash.crl dbx_hash.auth' % (mnt_point, EFITOOLS_PATH, GUID, EFITOOLS_PATH), shell=True) - ## dbx_hash1 (digest of TEST_db1 certificate) + # dbx_hash1 (digest of TEST_db1 certificate) check_call('cd %s; %scert-to-efi-hash-list -g %s -t 0 -s 256 db1.crt dbx_hash1.crl; %ssign-efi-sig-list -t "2020-04-05" -c KEK.crt -k KEK.key dbx dbx_hash1.crl dbx_hash1.auth' % (mnt_point, EFITOOLS_PATH, GUID, EFITOOLS_PATH), shell=True) - ## dbx_db (with TEST_db certificate) + # dbx_db (with TEST_db certificate) check_call('cd %s; %ssign-efi-sig-list -t "2020-04-05" -c KEK.crt -k KEK.key dbx db.esl dbx_db.auth' % (mnt_point, EFITOOLS_PATH), shell=True) @@ -112,10 +112,10 @@ def efi_boot_env(request, u_boot_config): # Sign image check_call('cd %s; sbsign --key db.key --cert db.crt helloworld.efi' % mnt_point, shell=True) - ## Sign already-signed image with another key + # Sign already-signed image with another key check_call('cd %s; sbsign --key db1.key --cert db1.crt --output helloworld.efi.signed_2sigs helloworld.efi.signed' % mnt_point, shell=True) - ## Digest image + # Digest image check_call('cd %s; %shash-to-efi-sig-list helloworld.efi db_hello.hash; %ssign-efi-sig-list -t "2020-04-07" -c KEK.crt -k KEK.key db db_hello.hash db_hello.auth' % (mnt_point, EFITOOLS_PATH, EFITOOLS_PATH), shell=True) @@ -126,7 +126,8 @@ def efi_boot_env(request, u_boot_config): % (mnt_point, EFITOOLS_PATH), shell=True) - check_call('virt-make-fs --partition=gpt --size=+1M --type=vfat {} {}'.format(mnt_point, image_path), shell=True) + check_call('virt-make-fs --partition=gpt --size=+1M --type=vfat {} {}'.format( + mnt_point, image_path), shell=True) check_call('rm -rf {}'.format(mnt_point), shell=True) except CalledProcessError as exception: