type crypto/ecdsa.PublicKey

28 uses

	crypto/ecdsa (current package)
		ecdsa.go#L40: type PublicKey struct {
		ecdsa.go#L51: func (k *PublicKey) ECDH() (*ecdh.PublicKey, error) {
		ecdsa.go#L67: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		ecdsa.go#L68: 	xx, ok := x.(*PublicKey)
		ecdsa.go#L82: 	PublicKey
		ecdsa.go#L170: 		return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
		ecdsa.go#L328: func VerifyASN1(pub *PublicKey, hash, sig []byte) bool {
		ecdsa.go#L352: func verifyFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], pub *PublicKey, hash, sig []byte) bool {
		ecdsa.go#L380: func publicKeyFromFIPS(curve elliptic.Curve, pub *ecdsa.PublicKey) (*PublicKey, error) {
		ecdsa.go#L385: 	return &PublicKey{Curve: curve, X: x, Y: y}, nil
		ecdsa.go#L396: func publicKeyToFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], pub *PublicKey) (*ecdsa.PublicKey, error) {
		ecdsa_legacy.go#L144: func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool {
		ecdsa_legacy.go#L155: func verifyLegacy(pub *PublicKey, hash []byte, sig []byte) bool {
		notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyECDSA, error) {

	crypto/tls
		auth.go#L26: 		pubKey, ok := pubkey.(*ecdsa.PublicKey)
		auth.go#L136: 	case *ecdsa.PublicKey:
		auth.go#L182: 	case *ecdsa.PublicKey:
		auth.go#L274: 	case *ecdsa.PublicKey:
		common.go#L1379: 		case *ecdsa.PublicKey:
		common.go#L1738: 	case *ecdsa.PublicKey:
		handshake_client.go#L1159: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L288: 		case *ecdsa.PublicKey:
		handshake_server.go#L963: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		tls.go#L329: 	case *ecdsa.PublicKey:

	crypto/x509
		parser.go#L267: 		pub := &ecdsa.PublicKey{
		x509.go#L99: 	case *ecdsa.PublicKey:
		x509.go#L1007: 	case *ecdsa.PublicKey:
		x509.go#L1527: 	case *ecdsa.PublicKey: