type crypto/ecdsa.PublicKey
28 uses
crypto/ecdsa (current package)
ecdsa.go#L40: type PublicKey struct {
ecdsa.go#L51: func (k *PublicKey) ECDH() (*ecdh.PublicKey, error) {
ecdsa.go#L67: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
ecdsa.go#L68: xx, ok := x.(*PublicKey)
ecdsa.go#L82: PublicKey
ecdsa.go#L170: return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
ecdsa.go#L328: func VerifyASN1(pub *PublicKey, hash, sig []byte) bool {
ecdsa.go#L352: func verifyFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], pub *PublicKey, hash, sig []byte) bool {
ecdsa.go#L380: func publicKeyFromFIPS(curve elliptic.Curve, pub *ecdsa.PublicKey) (*PublicKey, error) {
ecdsa.go#L385: return &PublicKey{Curve: curve, X: x, Y: y}, nil
ecdsa.go#L396: func publicKeyToFIPS[P ecdsa.Point[P]](c *ecdsa.Curve[P], pub *PublicKey) (*ecdsa.PublicKey, error) {
ecdsa_legacy.go#L144: func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool {
ecdsa_legacy.go#L155: func verifyLegacy(pub *PublicKey, hash []byte, sig []byte) bool {
notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyECDSA, error) {
crypto/tls
auth.go#L26: pubKey, ok := pubkey.(*ecdsa.PublicKey)
auth.go#L136: case *ecdsa.PublicKey:
auth.go#L182: case *ecdsa.PublicKey:
auth.go#L274: case *ecdsa.PublicKey:
common.go#L1379: case *ecdsa.PublicKey:
common.go#L1738: case *ecdsa.PublicKey:
handshake_client.go#L1159: case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
handshake_server.go#L288: case *ecdsa.PublicKey:
handshake_server.go#L963: case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
tls.go#L329: case *ecdsa.PublicKey:
crypto/x509
parser.go#L267: pub := &ecdsa.PublicKey{
x509.go#L99: case *ecdsa.PublicKey:
x509.go#L1007: case *ecdsa.PublicKey:
x509.go#L1527: case *ecdsa.PublicKey: