type crypto/ecdsa.PrivateKey
35 uses
crypto/ecdsa (current package)
ecdsa.go#L169: type PrivateKey struct {
ecdsa.go#L188: func (k *PrivateKey) ECDH() (*ecdh.PrivateKey, error) {
ecdsa.go#L214: func (priv *PrivateKey) Public() crypto.PublicKey {
ecdsa.go#L221: func (priv *PrivateKey) Equal(x crypto.PrivateKey) bool {
ecdsa.go#L222: xx, ok := x.(*PrivateKey)
ecdsa.go#L249: func ParseRawPrivateKey(curve elliptic.Curve, data []byte) (*PrivateKey, error) {
ecdsa.go#L264: func parseRawPrivateKey[P ecdsa.Point[P]](c *ecdsa.Curve[P], newPoint func() P, curve elliptic.Curve, data []byte) (*PrivateKey, error) {
ecdsa.go#L288: func (priv *PrivateKey) Bytes() ([]byte, error) {
ecdsa.go#L303: func privateKeyBytes[P ecdsa.Point[P]](c *ecdsa.Curve[P], priv *PrivateKey) ([]byte, error) {
ecdsa.go#L325: func (priv *PrivateKey) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error) {
ecdsa.go#L337: func GenerateKey(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) {
ecdsa.go#L345: return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
ecdsa.go#L363: func generateFIPS[P ecdsa.Point[P]](curve elliptic.Curve, c *ecdsa.Curve[P], rand io.Reader) (*PrivateKey, error) {
ecdsa.go#L386: func SignASN1(rand io.Reader, priv *PrivateKey, hash []byte) ([]byte, error) {
ecdsa.go#L412: func signFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], priv *PrivateKey, rand io.Reader, hash []byte) ([]byte, error) {
ecdsa.go#L430: func signRFC6979(priv *PrivateKey, hash []byte, opts crypto.SignerOpts) ([]byte, error) {
ecdsa.go#L452: func signFIPSDeterministic[P ecdsa.Point[P]](c *ecdsa.Curve[P], hashFunc crypto.Hash, priv *PrivateKey, hash []byte) ([]byte, error) {
ecdsa.go#L560: func privateKeyFromFIPS(curve elliptic.Curve, priv *ecdsa.PrivateKey) (*PrivateKey, error) {
ecdsa.go#L565: return &PrivateKey{PublicKey: *pub, D: new(big.Int).SetBytes(priv.Bytes())}, nil
ecdsa.go#L576: var privateKeyCache fips140cache.Cache[PrivateKey, ecdsa.PrivateKey]
ecdsa.go#L578: func privateKeyToFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], priv *PrivateKey) (*ecdsa.PrivateKey, error) {
ecdsa_legacy.go#L22: func generateLegacy(c elliptic.Curve, rand io.Reader) (*PrivateKey, error) {
ecdsa_legacy.go#L32: priv := new(PrivateKey)
ecdsa_legacy.go#L64: func Sign(rand io.Reader, priv *PrivateKey, hash []byte) (r, s *big.Int, err error) {
ecdsa_legacy.go#L83: func signLegacy(priv *PrivateKey, csprng io.Reader, hash []byte) (sig []byte, err error) {
notboring.go#L14: func boringPrivateKey(*PrivateKey) (*boring.PrivateKeyECDSA, error) {
crypto/tls
auth.go#L251: case rsa.PrivateKey, ecdsa.PrivateKey:
tls.go#L342: priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
tls.go#L373: case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:
crypto/x509
pkcs8.go#L121: case *ecdsa.PrivateKey:
sec1.go#L37: func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) {
sec1.go#L46: func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) {
sec1.go#L57: func marshalECPrivateKeyWithOID(key *ecdsa.PrivateKey, oid asn1.ObjectIdentifier) ([]byte, error) {
sec1.go#L84: func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) {
sec1.go#L114: priv := new(ecdsa.PrivateKey)