type crypto/ecdsa.PublicKey

30 uses

	crypto/ecdsa (current package)
		ecdsa.go#L50: type PublicKey struct {
		ecdsa.go#L61: func (k *PublicKey) ECDH() (*ecdh.PublicKey, error) {
		ecdsa.go#L77: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		ecdsa.go#L78: 	xx, ok := x.(*PublicKey)
		ecdsa.go#L92: 	PublicKey
		ecdsa.go#L170: 		return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
		ecdsa.go#L473: func VerifyASN1(pub *PublicKey, hash, sig []byte) bool {
		ecdsa.go#L501: func verifyNISTEC[Point nistPoint[Point]](c *nistCurve[Point], pub *PublicKey, hash, sig []byte) bool {
		ecdsa_legacy.go#L121: func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool {
		ecdsa_legacy.go#L132: func verifyLegacy(pub *PublicKey, hash []byte, sig []byte) bool {
		ecdsa_noasm.go#L11: func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error {
		notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyECDSA, error) {

	crypto/tls
		auth.go#L25: 		pubKey, ok := pubkey.(*ecdsa.PublicKey)
		auth.go#L135: 	case *ecdsa.PublicKey:
		auth.go#L181: 	case *ecdsa.PublicKey:
		auth.go#L273: 	case *ecdsa.PublicKey:
		common.go#L1333: 		case *ecdsa.PublicKey:
		handshake_client.go#L1136: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L264: 		case *ecdsa.PublicKey:
		handshake_server.go#L935: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		tls.go#L329: 	case *ecdsa.PublicKey:

	crypto/x509
		parser.go#L267: 		pub := &ecdsa.PublicKey{
		x509.go#L98: 	case *ecdsa.PublicKey:
		x509.go#L941: 	case *ecdsa.PublicKey:
		x509.go#L1461: 	case *ecdsa.PublicKey:

	github.com/golang-jwt/jwt/v5
		ecdsa.go#L60: 	var ecdsaKey *ecdsa.PublicKey
		ecdsa.go#L62: 	case *ecdsa.PublicKey:
		ecdsa_utils.go#L43: func ParseECPublicKeyFromPEM(key []byte) (*ecdsa.PublicKey, error) {
		ecdsa_utils.go#L62: 	var pkey *ecdsa.PublicKey
		ecdsa_utils.go#L64: 	if pkey, ok = parsedKey.(*ecdsa.PublicKey); !ok {