crypto/elliptic.Curve.Params (method)
43 uses
crypto/elliptic (current package)
elliptic.go#L33: Params() *CurveParams
elliptic.go#L76: N := curve.Params().N
elliptic.go#L112: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L128: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L158: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L165: p := curve.Params().P
elliptic.go#L185: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L192: p := curve.Params().P
elliptic.go#L198: y = curve.Params().polynomial(x)
params.go#L329: if params == c.Params() {
crypto/ecdsa
ecdsa.go#L94: size := (k.Curve.Params().N.BitLen() + 7) / 8
ecdsa.go#L166: x, y, d, err := boring.GenerateKeyECDSA(c.Params().Name)
ecdsa.go#L174: switch c.Params() {
ecdsa.go#L175: case elliptic.P224().Params():
ecdsa.go#L177: case elliptic.P256().Params():
ecdsa.go#L179: case elliptic.P384().Params():
ecdsa.go#L181: case elliptic.P521().Params():
ecdsa.go#L223: switch priv.Curve.Params() {
ecdsa.go#L224: case elliptic.P224().Params():
ecdsa.go#L226: case elliptic.P256().Params():
ecdsa.go#L228: case elliptic.P384().Params():
ecdsa.go#L230: case elliptic.P521().Params():
ecdsa.go#L266: switch priv.Curve.Params() {
ecdsa.go#L267: case elliptic.P224().Params():
ecdsa.go#L269: case elliptic.P256().Params():
ecdsa.go#L271: case elliptic.P384().Params():
ecdsa.go#L273: case elliptic.P521().Params():
ecdsa.go#L338: switch pub.Curve.Params() {
ecdsa.go#L339: case elliptic.P224().Params():
ecdsa.go#L341: case elliptic.P256().Params():
ecdsa.go#L343: case elliptic.P384().Params():
ecdsa.go#L345: case elliptic.P521().Params():
ecdsa.go#L414: bitSize := curve.Params().BitSize
ecdsa.go#L437: byteLen := (curve.Params().BitSize + 7) / 8
ecdsa_legacy.go#L43: orderBits := c.Params().N.BitLen()
ecdsa_legacy.go#L104: N := c.Params().N
ecdsa_legacy.go#L167: N := c.Params().N
ecdsa_legacy.go#L202: N := c.Params().N
crypto/tls
auth.go#L280: return fmt.Errorf("tls: unsupported certificate curve (%s)", pub.Curve.Params().Name)
crypto/x509
sec1.go#L61: privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
sec1.go#L110: curveOrder := curve.Params().N
github.com/aws/aws-sdk-go-v2/internal/v4a
v4a.go#L62: nMinusTwoP256 = new(big.Int).SetBytes(p256.Params().N.Bytes())
v4a.go#L108: params := p256.Params()
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)