type crypto/rsa.PublicKey
33 uses
crypto/rsa (current package)
pkcs1v15.go#L39: func EncryptPKCS1v15(rand io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
pkcs1v15.go#L266: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L42: type PublicKey struct {
rsa.go#L52: func (pub *PublicKey) Size() int {
rsa.go#L57: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
rsa.go#L58: xx, ok := x.(*PublicKey)
rsa.go#L86: func checkPub(pub *PublicKey) error {
rsa.go#L101: PublicKey // public part.
rsa.go#L387: func encrypt(c *big.Int, pub *PublicKey, m *big.Int) *big.Int {
rsa.go#L410: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
crypto/tls
auth.go#L41: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L49: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L133: case *rsa.PublicKey:
auth.go#L202: case *rsa.PublicKey:
auth.go#L277: case *rsa.PublicKey:
common.go#L1155: if _, ok := priv.Public().(*rsa.PublicKey); !ok {
common.go#L1229: case *rsa.PublicKey:
handshake_client.go#L876: case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
handshake_server.go#L258: case *rsa.PublicKey:
handshake_server.go#L267: case *rsa.PublicKey:
handshake_server.go#L840: case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
handshake_server_tls13.go#L625: if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
key_agreement.go#L89: rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
tls.go#L305: case *rsa.PublicKey:
crypto/x509
parser.go#L267: pub := &rsa.PublicKey{
pkcs1.go#L72: key.PublicKey = rsa.PublicKey{
pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
pkcs1.go#L158: return &rsa.PublicKey{
pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
x509.go#L74: case *rsa.PublicKey:
x509.go#L856: case *rsa.PublicKey:
x509.go#L1364: case *rsa.PublicKey: