Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func WapWsgIdmEcidWtls1 ¶
func WapWsgIdmEcidWtls1() base_elliptic.Curve
WapWsgIdmEcidWtls1 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls1
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
func WapWsgIdmEcidWtls10 ¶
func WapWsgIdmEcidWtls10() base_elliptic.Curve
WapWsgIdmEcidWtls10 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls10
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
func WapWsgIdmEcidWtls11 ¶
func WapWsgIdmEcidWtls11() base_elliptic.Curve
WapWsgIdmEcidWtls11 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls11
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
func WapWsgIdmEcidWtls3 ¶
func WapWsgIdmEcidWtls3() base_elliptic.Curve
WapWsgIdmEcidWtls3 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls3
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
func WapWsgIdmEcidWtls4 ¶
func WapWsgIdmEcidWtls4() base_elliptic.Curve
WapWsgIdmEcidWtls4 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls4
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
func WapWsgIdmEcidWtls5 ¶
func WapWsgIdmEcidWtls5() base_elliptic.Curve
WapWsgIdmEcidWtls5 returns a Curve which implements WTLS wap-wsg-idm-ecid-wtls5
Multiple invocations of this function will return the same value, so it can be used for equality checks and switch statements.
The cryptographic operations are implemented using constant-time algorithms.
Types ¶
This section is empty.