type crypto/ecdsa.PrivateKey
30 uses
crypto/ecdsa (current package)
ecdsa.go#L81: type PrivateKey struct {
ecdsa.go#L89: func (k *PrivateKey) ECDH() (*ecdh.PrivateKey, error) {
ecdsa.go#L115: func (priv *PrivateKey) Public() crypto.PublicKey {
ecdsa.go#L122: func (priv *PrivateKey) Equal(x crypto.PrivateKey) bool {
ecdsa.go#L123: xx, ok := x.(*PrivateKey)
ecdsa.go#L150: func (priv *PrivateKey) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error) {
ecdsa.go#L162: func GenerateKey(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) {
ecdsa.go#L170: return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
ecdsa.go#L188: func generateFIPS[P ecdsa.Point[P]](curve elliptic.Curve, c *ecdsa.Curve[P], rand io.Reader) (*PrivateKey, error) {
ecdsa.go#L211: func SignASN1(rand io.Reader, priv *PrivateKey, hash []byte) ([]byte, error) {
ecdsa.go#L237: func signFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], priv *PrivateKey, rand io.Reader, hash []byte) ([]byte, error) {
ecdsa.go#L258: func signRFC6979(priv *PrivateKey, hash []byte, opts crypto.SignerOpts) ([]byte, error) {
ecdsa.go#L280: func signFIPSDeterministic[P ecdsa.Point[P]](c *ecdsa.Curve[P], hashFunc crypto.Hash, priv *PrivateKey, hash []byte) ([]byte, error) {
ecdsa.go#L388: func privateKeyFromFIPS(curve elliptic.Curve, priv *ecdsa.PrivateKey) (*PrivateKey, error) {
ecdsa.go#L393: return &PrivateKey{PublicKey: *pub, D: new(big.Int).SetBytes(priv.Bytes())}, nil
ecdsa.go#L404: func privateKeyToFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], priv *PrivateKey) (*ecdsa.PrivateKey, error) {
ecdsa_legacy.go#L22: func generateLegacy(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) {
ecdsa_legacy.go#L32: priv := new(PrivateKey)
ecdsa_legacy.go#L64: func Sign(rand io.Reader, priv *PrivateKey, hash []byte) (r, s *big.Int, err error) {
ecdsa_legacy.go#L83: func signLegacy(priv *PrivateKey, csprng io.Reader, hash []byte) (sig []byte, err error) {
notboring.go#L14: func boringPrivateKey(*PrivateKey) (*boring.PrivateKeyECDSA, error) {
crypto/tls
auth.go#L260: case rsa.PrivateKey, ecdsa.PrivateKey:
tls.go#L330: priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
tls.go#L361: case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:
crypto/x509
pkcs8.go#L121: case *ecdsa.PrivateKey:
sec1.go#L37: func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) {
sec1.go#L46: func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) {
sec1.go#L57: func marshalECPrivateKeyWithOID(key *ecdsa.PrivateKey, oid asn1.ObjectIdentifier) ([]byte, error) {
sec1.go#L84: func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) {
sec1.go#L114: priv := new(ecdsa.PrivateKey)