type crypto/rsa.PublicKey

57 uses

	crypto/rsa (current package)
		pkcs1v15.go#L39: func EncryptPKCS1v15(rand io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
		pkcs1v15.go#L266: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
		pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L42: type PublicKey struct {
		rsa.go#L52: func (pub *PublicKey) Size() int {
		rsa.go#L57: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		rsa.go#L58: 	xx, ok := x.(*PublicKey)
		rsa.go#L86: func checkPub(pub *PublicKey) error {
		rsa.go#L101: 	PublicKey            // public part.
		rsa.go#L387: func encrypt(c *big.Int, pub *PublicKey, m *big.Int) *big.Int {
		rsa.go#L410: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {

	crypto/tls
		auth.go#L41: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L49: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L133: 	case *rsa.PublicKey:
		auth.go#L202: 	case *rsa.PublicKey:
		auth.go#L277: 	case *rsa.PublicKey:
		common.go#L1108: 			if _, ok := priv.Public().(*rsa.PublicKey); !ok {
		common.go#L1182: 		case *rsa.PublicKey:
		handshake_client.go#L855: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L253: 		case *rsa.PublicKey:
		handshake_server.go#L262: 		case *rsa.PublicKey:
		handshake_server.go#L814: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		handshake_server_tls13.go#L639: 		if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
		key_agreement.go#L70: 	encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret)
		tls.go#L336: 	case *rsa.PublicKey:

	crypto/x509
		pkcs1.go#L72: 	key.PublicKey = rsa.PublicKey{
		pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
		pkcs1.go#L158: 	return &rsa.PublicKey{
		pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
		x509.go#L75: 	case *rsa.PublicKey:
		x509.go#L840: 	case *rsa.PublicKey:
		x509.go#L943: 		pub := &rsa.PublicKey{
		x509.go#L2018: 	case *rsa.PublicKey:

	golang.org/x/crypto/openpgp/packet
		encrypted_key.go#L84: 		b, err = k.Decrypt(config.Random(), padToKeySize(k.Public().(*rsa.PublicKey), e.encryptedMPI1.bytes), nil)
		encrypted_key.go#L156: 		return serializeEncryptedKeyRSA(w, config.Random(), buf, pub.PublicKey.(*rsa.PublicKey), keyBlock)
		encrypted_key.go#L166: func serializeEncryptedKeyRSA(w io.Writer, rand io.Reader, header [10]byte, pub *rsa.PublicKey, keyBlock []byte) error {
		packet.go#L565: func padToKeySize(pub *rsa.PublicKey, b []byte) []byte {
		private_key.go#L74: 	case *rsa.PublicKey:
		private_key.go#L76: 	case rsa.PublicKey:
		private_key.go#L297: 	rsaPub := pk.PublicKey.PublicKey.(*rsa.PublicKey)
		public_key.go#L183: func NewRSAPublicKey(creationTime time.Time, pub *rsa.PublicKey) *PublicKey {
		public_key.go#L330: 	rsa := &rsa.PublicKey{
		public_key.go#L522: 		rsaPublicKey, _ := pk.PublicKey.(*rsa.PublicKey)
		public_key.go#L573: 		rsaPublicKey := pk.PublicKey.(*rsa.PublicKey)
		public_key_v3.go#L30: 	PublicKey    *rsa.PublicKey
		public_key_v3.go#L41: func newRSAPublicKeyV3(creationTime time.Time, pub *rsa.PublicKey) *PublicKeyV3 {
		public_key_v3.go#L107: 	rsa := &rsa.PublicKey{N: new(big.Int).SetBytes(pk.n.bytes)}

	golang.org/x/crypto/ssh
		keys.go#L336: type rsaPublicKey rsa.PublicKey
		keys.go#L361: 	var key rsa.PublicKey
		keys.go#L398: 	return rsa.VerifyPKCS1v15((*rsa.PublicKey)(r), hash, digest, sig.Blob)
		keys.go#L402: 	return (*rsa.PublicKey)(r)
		keys.go#L1054: 	case *rsa.PublicKey:
		keys.go#L1351: 			PublicKey: rsa.PublicKey{

	golang.org/x/crypto/ssh/agent
		server.go#L249: 		PublicKey: rsa.PublicKey{
		server.go#L398: 		PublicKey: rsa.PublicKey{

	golang.org/x/oauth2/jws
		jws.go#L167: func Verify(token string, key *rsa.PublicKey) error {

	google.golang.org/api/idtoken
		validate.go#L175: 	pk := &rsa.PublicKey{