type crypto/rsa.PrivateKey

42 uses

	crypto/rsa (current package)
		pkcs1v15.go#L75: func DecryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) ([]byte, error) {
		pkcs1v15.go#L108: func DecryptPKCS1v15SessionKey(rand io.Reader, priv *PrivateKey, ciphertext []byte, key []byte) error {
		pkcs1v15.go#L139: func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) {
		pkcs1v15.go#L231: func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
		pss.go#L210: func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) ([]byte, error) {
		pss.go#L264: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
		rsa.go#L100: type PrivateKey struct {
		rsa.go#L111: func (priv *PrivateKey) Public() crypto.PublicKey {
		rsa.go#L117: func (priv *PrivateKey) Equal(x crypto.PrivateKey) bool {
		rsa.go#L118: 	xx, ok := x.(*PrivateKey)
		rsa.go#L144: func (priv *PrivateKey) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error) {
		rsa.go#L155: func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) {
		rsa.go#L203: func (priv *PrivateKey) Validate() error {
		rsa.go#L241: func GenerateKey(random io.Reader, bits int) (*PrivateKey, error) {
		rsa.go#L256: func GenerateMultiPrimeKey(random io.Reader, nprimes int, bits int) (*PrivateKey, error) {
		rsa.go#L259: 	priv := new(PrivateKey)
		rsa.go#L458: func (priv *PrivateKey) Precompute() {
		rsa.go#L489: func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) {
		rsa.go#L569: func decryptAndCheck(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) {
		rsa.go#L596: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {

	crypto/tls
		auth.go#L255: 	case rsa.PrivateKey, ecdsa.PrivateKey:
		tls.go#L337: 		priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
		tls.go#L376: 		case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:

	crypto/x509
		pkcs1.go#L47: func ParsePKCS1PrivateKey(der []byte) (*rsa.PrivateKey, error) {
		pkcs1.go#L71: 	key := new(rsa.PrivateKey)
		pkcs1.go#L104: func MarshalPKCS1PrivateKey(key *rsa.PrivateKey) []byte {
		pkcs8.go#L92: 	case *rsa.PrivateKey:

	cloud.google.com/go/storage
		storage.go#L1026: func parseKey(key []byte) (*rsa.PrivateKey, error) {
		storage.go#L1037: 	parsed, ok := parsedKey.(*rsa.PrivateKey)

	golang.org/x/crypto/openpgp/packet
		private_key.go#L39: func NewRSAPrivateKey(creationTime time.Time, priv *rsa.PrivateKey) *PrivateKey {
		private_key.go#L168: 	case *rsa.PrivateKey:
		private_key.go#L211: func serializeRSAPrivateKey(w io.Writer, priv *rsa.PrivateKey) error {
		private_key.go#L298: 	rsaPriv := new(rsa.PrivateKey)

	golang.org/x/crypto/ssh
		keys.go#L1350: 		pk := &rsa.PrivateKey{

	golang.org/x/crypto/ssh/agent
		client.go#L533: 	case *rsa.PrivateKey:
		client.go#L667: 	case *rsa.PrivateKey:
		server.go#L248: 	priv := &rsa.PrivateKey{
		server.go#L397: 	priv := rsa.PrivateKey{

	golang.org/x/oauth2/google
		jwt.go#L50: 	pk              *rsa.PrivateKey

	golang.org/x/oauth2/internal
		oauth2.go#L20: func ParseKey(key []byte) (*rsa.PrivateKey, error) {
		oauth2.go#L32: 	parsed, ok := parsedKey.(*rsa.PrivateKey)

	golang.org/x/oauth2/jws
		jws.go#L156: func Encode(header *Header, c *ClaimSet, key *rsa.PrivateKey) (string, error) {