Lines Matching refs:public
26 be verified using a public key. As its name suggests the public key can be
28 public keys are mathematically related. For more information on how this
29 works look up "public key cryptography" and "RSA" (a particular algorithm).
40 +--------------+ +------> public key ----->| trusted place |
58 The signature algorithm relies only on the public key to do its work. Using
62 The public key from the signer allows us to verify and therefore trust
65 It is critical that the public key be secure and cannot be tampered with.
67 crypto provided by some modern SOCs. If the public key can be changed, then
77 2. Master public key is placed in read-only memory.
79 3. Secondary public key is placed in first stage images
80 4. We use the master public key to verify the first-stage image. We then
81 use the secondary public key in the first-stage image to verify the second-
95 The public key can be stored in U-Boot's CONFIG_OF_CONTROL device tree in
97 public key. Multiple keys and multiple signatures are supported.