Lines Matching refs:private
15 - Administering/protecting the private key.
97 The string provided should identify a file containing both a private key
101 certificate and a private key.
103 If the PEM file containing the private key is encrypted, or if the
123 private key is used to generate a signature and the corresponding public key is
124 used to check it. The private key is only needed during the build, after which
158 It is also possible to manually generate the key private/public files using the
161 generate the public/private key files:
213 2. The private key filename or PKCS#11 URI
226 If the private key requires a passphrase or PIN, it can be provided in the
270 Since the private key is used to sign modules, viruses and malware could use
271 the private key to sign modules and compromise the operating system. The
272 private key must be either destroyed or moved to a secure location and not kept