crypto/x509.Certificate.PublicKey (field)
23 uses
crypto/x509 (current package)
parser.go#L1008: cert.PublicKey, err = parsePublicKey(&publicKeyInfo{
verify.go#L930: if !candidate.PublicKey.(pubKeyEqual).Equal(cert.PublicKey) {
verify.go#L965: if candidate.cert.PublicKey == nil || alreadyInChain(candidate.cert, currentChain) {
x509.go#L698: PublicKey any
x509.go#L930: return checkSignature(c.SignatureAlgorithm, c.RawTBSCertificate, c.Signature, parent.PublicKey, false)
x509.go#L941: return checkSignature(algo, signed, signature, c.PublicKey, true)
x509.go#L1754: } else if parent.PublicKey != nil && !privPub.Equal(parent.PublicKey) {
crypto/tls
common.go#L1734: switch k := c.PublicKey.(type) {
handshake_client.go#L1094: n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_client.go#L1158: switch certs[0].PublicKey.(type) {
handshake_client.go#L1163: return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
handshake_client_tls13.go#L690: if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
handshake_server.go#L684: pub = c.peerCertificates[0].PublicKey
handshake_server.go#L908: n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server.go#L962: switch certs[0].PublicKey.(type) {
handshake_server.go#L966: return fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", certs[0].PublicKey)
handshake_server_tls13.go#L1104: if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
key_agreement.go#L90: rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
key_agreement.go#L338: sigType, sigHash, err = legacyTypeAndHashFromPublicKey(cert.PublicKey)
key_agreement.go#L354: if err := verifyHandshakeSignature(sigType, cert.PublicKey, sigHash, signed, sig); err != nil {
tls.go#L320: switch pub := x509Cert.PublicKey.(type) {