type crypto/ecdsa.PublicKey

25 uses

	crypto/ecdsa (current package)
		ecdsa.go#L46: type PublicKey struct {
		ecdsa.go#L57: func (k *PublicKey) ECDH() (*ecdh.PublicKey, error) {
		ecdsa.go#L73: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		ecdsa.go#L74: 	xx, ok := x.(*PublicKey)
		ecdsa.go#L88: 	PublicKey
		ecdsa.go#L166: 		return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil
		ecdsa.go#L468: func VerifyASN1(pub *PublicKey, hash, sig []byte) bool {
		ecdsa.go#L496: func verifyNISTEC[Point nistPoint[Point]](c *nistCurve[Point], pub *PublicKey, hash, sig []byte) bool {
		ecdsa_legacy.go#L118: func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool {
		ecdsa_legacy.go#L129: func verifyLegacy(pub *PublicKey, hash []byte, sig []byte) bool {
		ecdsa_noasm.go#L11: func verifyAsm(pub *PublicKey, hash []byte, sig []byte) error {
		notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyECDSA, error) {

	crypto/tls
		auth.go#L25: 		pubKey, ok := pubkey.(*ecdsa.PublicKey)
		auth.go#L135: 	case *ecdsa.PublicKey:
		auth.go#L181: 	case *ecdsa.PublicKey:
		auth.go#L273: 	case *ecdsa.PublicKey:
		common.go#L1253: 		case *ecdsa.PublicKey:
		handshake_client.go#L1001: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L258: 		case *ecdsa.PublicKey:
		handshake_server.go#L919: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		tls.go#L313: 	case *ecdsa.PublicKey:

	crypto/x509
		parser.go#L266: 		pub := &ecdsa.PublicKey{
		x509.go#L98: 	case *ecdsa.PublicKey:
		x509.go#L922: 	case *ecdsa.PublicKey:
		x509.go#L1418: 	case *ecdsa.PublicKey: