type crypto/rsa.PublicKey

45 uses

	crypto/rsa (current package)
		notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyRSA, error) {
		pkcs1v15.go#L42: func EncryptPKCS1v15(random io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
		pkcs1v15.go#L307: func pkcs1v15ConstructEM(pub *PublicKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
		pkcs1v15.go#L345: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
		pss.go#L344: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L49: type PublicKey struct {
		rsa.go#L59: func (pub *PublicKey) Size() int {
		rsa.go#L64: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		rsa.go#L65: 	xx, ok := x.(*PublicKey)
		rsa.go#L98: func checkPub(pub *PublicKey) error {
		rsa.go#L113: 	PublicKey            // public part.
		rsa.go#L333: 			PublicKey: PublicKey{
		rsa.go#L481: func encrypt(pub *PublicKey, plaintext []byte) ([]byte, error) {
		rsa.go#L515: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {

	crypto/tls
		auth.go#L41: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L49: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L133: 	case *rsa.PublicKey:
		auth.go#L203: 	case *rsa.PublicKey:
		auth.go#L281: 	case *rsa.PublicKey:
		common.go#L1287: 			if _, ok := priv.Public().(*rsa.PublicKey); !ok {
		common.go#L1361: 		case *rsa.PublicKey:
		handshake_client.go#L1081: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_client.go#L1136: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L268: 		case *rsa.PublicKey:
		handshake_server.go#L277: 		case *rsa.PublicKey:
		handshake_server.go#L884: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L935: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		handshake_server_tls13.go#L757: 		if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
		key_agreement.go#L90: 	rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
		tls.go#L321: 	case *rsa.PublicKey:

	crypto/x509
		parser.go#L248: 		pub := &rsa.PublicKey{
		pkcs1.go#L72: 	key.PublicKey = rsa.PublicKey{
		pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
		pkcs1.go#L158: 	return &rsa.PublicKey{
		pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
		x509.go#L86: 	case *rsa.PublicKey:
		x509.go#L932: 	case *rsa.PublicKey:
		x509.go#L1457: 	case *rsa.PublicKey:

	github.com/golang-jwt/jwt/v5
		rsa.go#L50: 	var rsaKey *rsa.PublicKey
		rsa.go#L53: 	if rsaKey, ok = key.(*rsa.PublicKey); !ok {
		rsa_pss.go#L86: 	var rsaKey *rsa.PublicKey
		rsa_pss.go#L88: 	case *rsa.PublicKey:
		rsa_utils.go#L79: func ParseRSAPublicKeyFromPEM(key []byte) (*rsa.PublicKey, error) {
		rsa_utils.go#L100: 	var pkey *rsa.PublicKey
		rsa_utils.go#L102: 	if pkey, ok = parsedKey.(*rsa.PublicKey); !ok {