crypto/ecdsa.PrivateKey.Params (method, view implemented interface methods)
21 uses
crypto/ecdsa (current package)
ecdsa.go#L128: params := c.Params()
ecdsa.go#L162: orderBits := c.Params().N.BitLen()
ecdsa.go#L242: N := c.Params().N
ecdsa.go#L294: N := c.Params().N
ecdsa.go#L309: N := c.Params().N
crypto/elliptic
elliptic.go#L25: Params() *CurveParams
elliptic.go#L41: if params == c.Params() {
elliptic.go#L333: N := curve.Params().N
elliptic.go#L364: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L379: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L390: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L397: p := curve.Params().P
elliptic.go#L413: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L420: p := curve.Params().P
elliptic.go#L426: y = curve.Params().polynomial(x)
crypto/tls
auth.go#L275: return fmt.Errorf("tls: unsupported certificate curve (%s)", pub.Curve.Params().Name)
key_schedule.go#L176: sharedKey := make([]byte, (curve.Params().BitSize+7)/8)
crypto/x509
sec1.go#L55: privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
sec1.go#L94: curveOrder := curve.Params().N
github.com/aws/aws-sdk-go-v2/internal/v4a
v4a.go#L62: nMinusTwoP256 = new(big.Int).SetBytes(p256.Params().N.Bytes())
v4a.go#L108: params := p256.Params()
The pages are generated with Golds v0.4.9. (GOOS=linux GOARCH=amd64)