crypto/ecdsa.PublicKey.X (field)

27 uses

	crypto/ecdsa (current package)
		ecdsa.go#L62: 	X, Y *big.Int
		ecdsa.go#L78: 	return pub.X.Cmp(xx.X) == 0 && pub.Y.Cmp(xx.Y) == 0 &&
		ecdsa.go#L158: 	priv.PublicKey.X, priv.PublicKey.Y = c.ScalarBaseMult(k.Bytes())
		ecdsa.go#L323: 		x, y = opt.CombinedMult(pub.X, pub.Y, u1.Bytes(), u2.Bytes())
		ecdsa.go#L326: 		x2, y2 := c.ScalarMult(pub.X, pub.Y, u2.Bytes())

	crypto/tls
		tls.go#L349: 		if pub.X.Cmp(priv.X) != 0 || pub.Y.Cmp(priv.Y) != 0 {

	crypto/x509
		sec1.go#L60: 		PublicKey:     asn1.BitString{Bytes: elliptic.Marshal(key.Curve, key.X, key.Y)},
		sec1.go#L117: 	priv.X, priv.Y = curve.ScalarBaseMult(privateKey)
		x509.go#L88: 		publicKeyBytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y)
		x509.go#L998: 			X:     x,

	golang.org/x/crypto/openpgp/packet
		public_key.go#L98: 	return &ecdsa.PublicKey{Curve: c, X: x, Y: y}, nil
		public_key.go#L246: 	pk.ec.p.bytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y)

	golang.org/x/crypto/ssh
		kex.go#L231: 		ClientPubKey: elliptic.Marshal(kex.curve, ephKey.PublicKey.X, ephKey.PublicKey.Y),
		kex.go#L343: 	serializedEphKey := elliptic.Marshal(kex.curve, ephKey.PublicKey.X, ephKey.PublicKey.Y)
		keys.go#L644: 	key.X, key.Y = elliptic.Unmarshal(key.Curve, w.KeyBytes)
		keys.go#L645: 	if key.X == nil || key.Y == nil {
		keys.go#L653: 	keyBytes := elliptic.Marshal(k.Curve, k.X, k.Y)
		keys.go#L747: 	key.X, key.Y = elliptic.Unmarshal(key.Curve, w.KeyBytes)
		keys.go#L748: 	if key.X == nil || key.Y == nil {
		keys.go#L757: 	keyBytes := elliptic.Marshal(k.Curve, k.X, k.Y)
		keys.go#L1435: 				X:     X,

	golang.org/x/crypto/ssh/agent
		client.go#L565: 			KeyBytes:    elliptic.Marshal(k.Curve, k.X, k.Y),
		server.go#L319: 	priv.X, priv.Y = elliptic.Unmarshal(priv.Curve, keyBytes)
		server.go#L320: 	if priv.X == nil || priv.Y == nil {

	google.golang.org/api/idtoken
		validate.go#L202: 		X:     new(big.Int).SetBytes(dx),