Lines Matching refs:RSA
29 * Load the header block of the boot image, extract a special "root" public RSA
32 * Load an array of code signing public RSA keys from the header block, and
33 verify its RSA signature (contained in the header block as well) using the
34 "root" RSA key.
67 CSK - Code Signing Key(s): An array of RSA key pairs, which
70 KAK - Key Authentication Key: A RSA key pair, which is used
128 of a RSA-2048 public key in DER format with a length of
130 Header block signature: The RSA signature of the header block (excluding the
132 Binary image signature: The RSA signature of the binary image, created using
134 CSK array: The array of the 16 CSKs as RSA-2048 public keys in DER
136 CSK block signature: The RSA signature of the CSK array, created using the
153 5) Verify the RSA signature of the CSK block from the secured header with the
158 8) Verify the binary image's RSA signature from the secured header with the
162 NOTE: All RSA signatures are verified according to the PKCS #1 v2.1 standard
177 2048 bit RSA keys in PEM format). Note that the usage of more than one CSK is
210 KAK - The name of the KAK RSA private key file in the U-Boot
212 CSK - The name of the (active) CSK RSA private key file in the
365 [3] Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography