crypto/elliptic.Curve.Params (method)

21 uses

	crypto/elliptic (current package)
		elliptic.go#L25: 	Params() *CurveParams
		elliptic.go#L41: 		if params == c.Params() {
		elliptic.go#L333: 	N := curve.Params().N
		elliptic.go#L364: 	byteLen := (curve.Params().BitSize + 7) / 8
		elliptic.go#L379: 	byteLen := (curve.Params().BitSize + 7) / 8
		elliptic.go#L390: 	byteLen := (curve.Params().BitSize + 7) / 8
		elliptic.go#L397: 	p := curve.Params().P
		elliptic.go#L413: 	byteLen := (curve.Params().BitSize + 7) / 8
		elliptic.go#L420: 	p := curve.Params().P
		elliptic.go#L426: 	y = curve.Params().polynomial(x)

	crypto/ecdsa
		ecdsa.go#L128: 	params := c.Params()
		ecdsa.go#L162: 	orderBits := c.Params().N.BitLen()
		ecdsa.go#L242: 	N := c.Params().N
		ecdsa.go#L294: 	N := c.Params().N
		ecdsa.go#L309: 	N := c.Params().N

	crypto/tls
		auth.go#L275: 			return fmt.Errorf("tls: unsupported certificate curve (%s)", pub.Curve.Params().Name)
		key_schedule.go#L176: 	sharedKey := make([]byte, (curve.Params().BitSize+7)/8)

	crypto/x509
		sec1.go#L55: 	privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
		sec1.go#L94: 	curveOrder := curve.Params().N

	github.com/aws/aws-sdk-go-v2/internal/v4a
		v4a.go#L62: 	nMinusTwoP256 = new(big.Int).SetBytes(p256.Params().N.Bytes())
		v4a.go#L108: 	params := p256.Params()