Lines Matching full:private
14 .. - Administering/protecting the private key.
103 The string provided should identify a file containing both a private key
107 certificate and a private key.
109 If the PEM file containing the private key is encrypted, or if the
130 private key is used to generate a signature and the corresponding public key is
131 used to check it. The private key is only needed during the build, after which
169 It is also possible to manually generate the key private/public files using the
172 generate the public/private key files::
224 2. The private key filename or PKCS#11 URI
237 If the private key requires a passphrase or PIN, it can be provided in the
278 Administering/protecting the private key
281 Since the private key is used to sign modules, viruses and malware could use
282 the private key to sign modules and compromise the operating system. The
283 private key must be either destroyed or moved to a secure location and not kept
286 If you use the same private key to sign modules for multiple kernel