sdk/golang/Standard Library/GoCryptoElliptic
Standard Library

GoCryptoElliptic

Go stdlib package — crypto/elliptic. Auto-indexed from CDN. Method-level security roles have not been annotated; rule writers should inspect the source before use.

Other Methods

.CurveParams.Add()Neutral
#
Signature
CurveParams.Add(x1 *big.Int, y1 *big.Int, x2 *big.Int, y2 *big.Int) (*big.Int, *big.Int)

Add implements Curve.Add.

.CurveParams.Double()Neutral
#
Signature
CurveParams.Double(x1 *big.Int, y1 *big.Int) (*big.Int, *big.Int)

Double implements Curve.Double.

.CurveParams.IsOnCurve()Neutral
#
Signature
CurveParams.IsOnCurve(x *big.Int, y *big.Int) bool

IsOnCurve implements Curve.IsOnCurve.

.CurveParams.Params()Neutral
#
Signature
CurveParams.Params() *CurveParams

CurveParams.Params function.

.CurveParams.ScalarBaseMult()Neutral
#
Signature
CurveParams.ScalarBaseMult(k []byte) (*big.Int, *big.Int)

ScalarBaseMult implements Curve.ScalarBaseMult.

.CurveParams.ScalarMult()Neutral
#
Signature
CurveParams.ScalarMult(Bx *big.Int, By *big.Int, k []byte) (*big.Int, *big.Int)

ScalarMult implements Curve.ScalarMult.

.GenerateKey()Neutral
#
Signature
GenerateKey(curve Curve, rand io.Reader) ([]byte, *big.Int, *big.Int, error)

GenerateKey returns a public/private key pair. The private key is

.Marshal()Neutral
#
Signature
Marshal(curve Curve, x *big.Int, y *big.Int) []byte

Marshal converts a point on the curve into the uncompressed form specified in

.MarshalCompressed()Neutral
#
Signature
MarshalCompressed(curve Curve, x *big.Int, y *big.Int) []byte

MarshalCompressed converts a point on the curve into the compressed form

.P224()Neutral
#
Signature
P224() Curve

P224 returns a Curve which implements NIST P-224 (FIPS 186-3, section D.2.2),

Fully-Qualified Names

FQNField
crypto/ellipticfqns[0]

Wrong FQN → 0 findings. Verify with: change fqns to garbage → must produce 0 results.

Import

go.mod
// standard library — no go.mod entry required
rule.py
from codepathfinder.go_rule import ...  # crypto/elliptic