type crypto/rsa.PublicKey
45 uses
crypto/rsa (current package)
notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyRSA, error) {
pkcs1v15.go#L42: func EncryptPKCS1v15(random io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
pkcs1v15.go#L307: func pkcs1v15ConstructEM(pub *PublicKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
pkcs1v15.go#L345: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
pss.go#L344: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L49: type PublicKey struct {
rsa.go#L59: func (pub *PublicKey) Size() int {
rsa.go#L64: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
rsa.go#L65: xx, ok := x.(*PublicKey)
rsa.go#L98: func checkPub(pub *PublicKey) error {
rsa.go#L113: PublicKey // public part.
rsa.go#L333: PublicKey: PublicKey{
rsa.go#L481: func encrypt(pub *PublicKey, plaintext []byte) ([]byte, error) {
rsa.go#L515: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
crypto/tls
auth.go#L41: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L49: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L133: case *rsa.PublicKey:
auth.go#L203: case *rsa.PublicKey:
auth.go#L281: case *rsa.PublicKey:
common.go#L1287: if _, ok := priv.Public().(*rsa.PublicKey); !ok {
common.go#L1361: case *rsa.PublicKey:
handshake_client.go#L1081: n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_client.go#L1136: case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
handshake_server.go#L268: case *rsa.PublicKey:
handshake_server.go#L277: case *rsa.PublicKey:
handshake_server.go#L884: n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server.go#L935: case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
handshake_server_tls13.go#L757: if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
key_agreement.go#L90: rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
tls.go#L321: case *rsa.PublicKey:
crypto/x509
parser.go#L248: pub := &rsa.PublicKey{
pkcs1.go#L72: key.PublicKey = rsa.PublicKey{
pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
pkcs1.go#L158: return &rsa.PublicKey{
pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
x509.go#L86: case *rsa.PublicKey:
x509.go#L932: case *rsa.PublicKey:
x509.go#L1457: case *rsa.PublicKey:
github.com/golang-jwt/jwt/v5
rsa.go#L50: var rsaKey *rsa.PublicKey
rsa.go#L53: if rsaKey, ok = key.(*rsa.PublicKey); !ok {
rsa_pss.go#L86: var rsaKey *rsa.PublicKey
rsa_pss.go#L88: case *rsa.PublicKey:
rsa_utils.go#L79: func ParseRSAPublicKeyFromPEM(key []byte) (*rsa.PublicKey, error) {
rsa_utils.go#L100: var pkey *rsa.PublicKey
rsa_utils.go#L102: if pkey, ok = parsedKey.(*rsa.PublicKey); !ok {
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |