Go stdlib package — crypto/ecdsa. Auto-indexed from CDN. Method-level security roles have not been annotated; rule writers should inspect the source before use.
.GenerateKey()NeutralGenerateKey(c elliptic.Curve, rand io.Reader) (*PrivateKey, error)
GenerateKey generates a new ECDSA private key for the specified curve.
.PrivateKey.ECDH()NeutralPrivateKey.ECDH() (*ecdh.PrivateKey, error)
ECDH returns k as a [ecdh.PrivateKey]. It returns an error if the key is
.PrivateKey.Equal()NeutralPrivateKey.Equal(x crypto.PrivateKey) bool
Equal reports whether priv and x have the same value.
.PrivateKey.Public()NeutralPrivateKey.Public() crypto.PublicKey
Public returns the public key corresponding to priv.
.PrivateKey.Sign()NeutralPrivateKey.Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error)
Sign signs digest with priv, reading randomness from rand. The opts argument
.PublicKey.ECDH()NeutralPublicKey.ECDH() (*ecdh.PublicKey, error)
ECDH returns k as a [ecdh.PublicKey]. It returns an error if the key is
.PublicKey.Equal()NeutralPublicKey.Equal(x crypto.PublicKey) bool
Equal reports whether pub and x have the same value.
.Sign()NeutralSign(rand io.Reader, priv *PrivateKey, hash []byte) (*big.Int, *big.Int, error)
Sign signs a hash (which should be the result of hashing a larger message)
.SignASN1()NeutralSignASN1(rand io.Reader, priv *PrivateKey, hash []byte) ([]byte, error)
SignASN1 signs a hash (which should be the result of hashing a larger message)
.Verify()NeutralVerify(pub *PublicKey, hash []byte, r *big.Int, s *big.Int) bool
Verify verifies the signature in r, s of hash using the public key, pub. Its
| FQN | Field | |
|---|---|---|
| crypto/ecdsa | fqns[0] |
Wrong FQN → 0 findings. Verify with: change fqns to garbage → must produce 0 results.
// standard library — no go.mod entry required
from codepathfinder.go_rule import ... # crypto/ecdsa