crypto/x509.Certificate.PublicKey (field)

23 uses

	crypto/x509 (current package)
		parser.go#L1008: 		cert.PublicKey, err = parsePublicKey(&publicKeyInfo{
		verify.go#L930: 		if !candidate.PublicKey.(pubKeyEqual).Equal(cert.PublicKey) {
		verify.go#L965: 		if candidate.cert.PublicKey == nil || alreadyInChain(candidate.cert, currentChain) {
		x509.go#L698: 	PublicKey          any
		x509.go#L930: 	return checkSignature(c.SignatureAlgorithm, c.RawTBSCertificate, c.Signature, parent.PublicKey, false)
		x509.go#L941: 	return checkSignature(algo, signed, signature, c.PublicKey, true)
		x509.go#L1754: 	} else if parent.PublicKey != nil && !privPub.Equal(parent.PublicKey) {

	crypto/tls
		common.go#L1734: 	switch k := c.PublicKey.(type) {
		handshake_client.go#L1094: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_client.go#L1158: 	switch certs[0].PublicKey.(type) {
		handshake_client.go#L1163: 		return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
		handshake_client_tls13.go#L690: 	if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
		handshake_server.go#L684: 			pub = c.peerCertificates[0].PublicKey
		handshake_server.go#L908: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L962: 		switch certs[0].PublicKey.(type) {
		handshake_server.go#L966: 			return fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", certs[0].PublicKey)
		handshake_server_tls13.go#L1104: 		if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
		key_agreement.go#L90: 	rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
		key_agreement.go#L338: 		sigType, sigHash, err = legacyTypeAndHashFromPublicKey(cert.PublicKey)
		key_agreement.go#L354: 	if err := verifyHandshakeSignature(sigType, cert.PublicKey, sigHash, signed, sig); err != nil {
		tls.go#L320: 	switch pub := x509Cert.PublicKey.(type) {