crypto/elliptic.Curve.Params (method)
41 uses
crypto/elliptic (current package)
elliptic.go#L33: Params() *CurveParams
elliptic.go#L76: N := curve.Params().N
elliptic.go#L112: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L128: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L158: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L165: p := curve.Params().P
elliptic.go#L185: byteLen := (curve.Params().BitSize + 7) / 8
elliptic.go#L192: p := curve.Params().P
elliptic.go#L198: y = curve.Params().polynomial(x)
params.go#L329: if params == c.Params() {
crypto/ecdsa
ecdsa.go#L193: size := (k.Curve.Params().N.BitLen() + 7) / 8
ecdsa.go#L341: x, y, d, err := boring.GenerateKeyECDSA(c.Params().Name)
ecdsa.go#L349: switch c.Params() {
ecdsa.go#L350: case elliptic.P224().Params():
ecdsa.go#L352: case elliptic.P256().Params():
ecdsa.go#L354: case elliptic.P384().Params():
ecdsa.go#L356: case elliptic.P521().Params():
ecdsa.go#L398: switch priv.Curve.Params() {
ecdsa.go#L399: case elliptic.P224().Params():
ecdsa.go#L401: case elliptic.P256().Params():
ecdsa.go#L403: case elliptic.P384().Params():
ecdsa.go#L405: case elliptic.P521().Params():
ecdsa.go#L438: switch priv.Curve.Params() {
ecdsa.go#L439: case elliptic.P224().Params():
ecdsa.go#L441: case elliptic.P256().Params():
ecdsa.go#L443: case elliptic.P384().Params():
ecdsa.go#L445: case elliptic.P521().Params():
ecdsa.go#L510: switch pub.Curve.Params() {
ecdsa.go#L511: case elliptic.P224().Params():
ecdsa.go#L513: case elliptic.P256().Params():
ecdsa.go#L515: case elliptic.P384().Params():
ecdsa.go#L517: case elliptic.P521().Params():
ecdsa.go#L606: bitSize := curve.Params().BitSize
ecdsa.go#L629: byteLen := (curve.Params().BitSize + 7) / 8
ecdsa_legacy.go#L43: orderBits := c.Params().N.BitLen()
ecdsa_legacy.go#L104: N := c.Params().N
ecdsa_legacy.go#L167: N := c.Params().N
ecdsa_legacy.go#L202: N := c.Params().N
crypto/tls
auth.go#L271: return fmt.Errorf("tls: unsupported certificate curve (%s)", pub.Curve.Params().Name)
crypto/x509
sec1.go#L61: privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
sec1.go#L110: curveOrder := curve.Params().N
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)