type crypto/internal/fips140/rsa.PrivateKey
23 uses
crypto/internal/fips140/rsa (current package)
cast.go#L16: func testPrivateKey() *PrivateKey {
cast.go#L169: return &PrivateKey{
keygen.go#L17: func GenerateKey(rand io.Reader, bits int) (*PrivateKey, error) {
pkcs1v15.go#L46: func SignPKCS1v15(priv *PrivateKey, hash string, hashed []byte) ([]byte, error) {
pkcs1v15.go#L54: func signPKCS1v15(priv *PrivateKey, hash string, hashed []byte) ([]byte, error) {
pkcs1v22.go#L267: func SignPSS(rand io.Reader, priv *PrivateKey, hash fips140.Hash, hashed []byte, saltLength int) ([]byte, error) {
pkcs1v22.go#L414: func DecryptOAEP(hash, mgfHash fips140.Hash, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
rsa.go#L25: type PrivateKey struct {
rsa.go#L44: func (priv *PrivateKey) PublicKey() *PublicKey {
rsa.go#L52: func NewPrivateKey(N []byte, e int, d, P, Q []byte) (*PrivateKey, error) {
rsa.go#L72: func newPrivateKey(n *bigmod.Modulus, e int, d *bigmod.Nat, p, q *bigmod.Modulus) (*PrivateKey, error) {
rsa.go#L97: pk := &PrivateKey{
rsa.go#L112: func NewPrivateKeyWithPrecomputation(N []byte, e int, d, P, Q, dP, dQ, qInv []byte) (*PrivateKey, error) {
rsa.go#L134: pk := &PrivateKey{
rsa.go#L150: func NewPrivateKeyWithoutCRT(N []byte, e int, d []byte) (*PrivateKey, error) {
rsa.go#L159: pk := &PrivateKey{
rsa.go#L175: func (priv *PrivateKey) Export() (N []byte, e int, d, P, Q, dP, dQ, qInv []byte) {
rsa.go#L192: func checkPrivateKey(priv *PrivateKey) error {
rsa.go#L401: func DecryptWithoutCheck(priv *PrivateKey, ciphertext []byte) ([]byte, error) {
rsa.go#L408: func DecryptWithCheck(priv *PrivateKey, ciphertext []byte) ([]byte, error) {
rsa.go#L416: func decrypt(priv *PrivateKey, ciphertext []byte, check bool) ([]byte, error) {
crypto/rsa
rsa.go#L216: fips *rsa.PrivateKey
rsa.go#L632: func fipsPrivateKey(priv *PrivateKey) (*rsa.PrivateKey, error) {