golang.org/x/crypto/openpgp.Entity.PrimaryKey (field)

22 uses

	golang.org/x/crypto/openpgp (current package)
		keys.go#L27: 	PrimaryKey  *packet.PublicKey
		keys.go#L118: 		e.PrimaryKey.PubKeyAlgo.CanEncrypt() &&
		keys.go#L120: 		return Key{e, e.PrimaryKey, e.PrivateKey, i.SelfSignature}, true
		keys.go#L152: 		return Key{e, e.PrimaryKey, e.PrivateKey, i.SelfSignature}, true
		keys.go#L164: 		if e.PrimaryKey.KeyId == id {
		keys.go#L174: 			keys = append(keys, Key{e, e.PrimaryKey, e.PrivateKey, selfSig})
		keys.go#L324: 	if e.PrimaryKey, ok = p.(*packet.PublicKey); !ok {
		keys.go#L329: 		e.PrimaryKey = &e.PrivateKey.PublicKey
		keys.go#L332: 	if !e.PrimaryKey.PubKeyAlgo.CanSign() {
		keys.go#L389: 		err = e.PrimaryKey.VerifyRevocationSignature(revocation)
		keys.go#L423: 		if (sig.SigType == packet.SigTypePositiveCert || sig.SigType == packet.SigTypeGenericCert) && sig.IssuerKeyId != nil && *sig.IssuerKeyId == e.PrimaryKey.KeyId {
		keys.go#L424: 			if err = e.PrimaryKey.VerifyUserIdSignature(pkt.Id, e.PrimaryKey, sig); err != nil {
		keys.go#L460: 		if err := e.PrimaryKey.VerifyKeySignature(subKey.PublicKey, sig); err != nil {
		keys.go#L528: 		PrimaryKey: packet.NewRSAPublicKey(creationTime, &signingPriv.PublicKey),
		keys.go#L545: 			IssuerKeyId:  &e.PrimaryKey.KeyId,
		keys.go#L548: 	err = e.Identities[uid.Id].SelfSignature.SignUserId(uid.Id, e.PrimaryKey, e.PrivateKey, config)
		keys.go#L576: 			IssuerKeyId:               &e.PrimaryKey.KeyId,
		keys.go#L602: 		err = ident.SelfSignature.SignUserId(ident.UserId.Id, e.PrimaryKey, e.PrivateKey, config)
		keys.go#L631: 	err := e.PrimaryKey.Serialize(w)
		keys.go#L688: 	if err := sig.SignUserId(identity, e.PrimaryKey, signer.PrivateKey, config); err != nil {
		write.go#L290: 			return nil, errors.InvalidArgumentError("cannot encrypt a message to key id " + strconv.FormatUint(to[i].PrimaryKey.KeyId, 16) + " because it has no encryption keys")