type crypto/rsa.PublicKey
50 uses
crypto/rsa (current package)
notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyRSA, error) {
pkcs1v15.go#L41: func EncryptPKCS1v15(random io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
pkcs1v15.go#L324: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
pss.go#L341: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L46: type PublicKey struct {
rsa.go#L56: func (pub *PublicKey) Size() int {
rsa.go#L61: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
rsa.go#L62: xx, ok := x.(*PublicKey)
rsa.go#L95: func checkPub(pub *PublicKey) error {
rsa.go#L110: PublicKey // public part.
rsa.go#L330: PublicKey: PublicKey{
rsa.go#L478: func encrypt(pub *PublicKey, plaintext []byte) ([]byte, error) {
rsa.go#L516: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
crypto/tls
auth.go#L41: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L49: pubKey, ok := pubkey.(*rsa.PublicKey)
auth.go#L133: case *rsa.PublicKey:
auth.go#L203: case *rsa.PublicKey:
auth.go#L281: case *rsa.PublicKey:
common.go#L1207: if _, ok := priv.Public().(*rsa.PublicKey); !ok {
common.go#L1281: case *rsa.PublicKey:
handshake_client.go#L971: n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_client.go#L1001: case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
handshake_server.go#L262: case *rsa.PublicKey:
handshake_server.go#L271: case *rsa.PublicKey:
handshake_server.go#L868: n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server.go#L919: case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
handshake_server_tls13.go#L710: if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
key_agreement.go#L90: rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
tls.go#L305: case *rsa.PublicKey:
crypto/x509
parser.go#L247: pub := &rsa.PublicKey{
pkcs1.go#L72: key.PublicKey = rsa.PublicKey{
pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
pkcs1.go#L158: return &rsa.PublicKey{
pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
x509.go#L86: case *rsa.PublicKey:
x509.go#L913: case *rsa.PublicKey:
x509.go#L1412: case *rsa.PublicKey:
github.com/gotd/td/internal/crypto
public_keys.go#L12: func ParseRSAPublicKeys(data []byte) ([]*rsa.PublicKey, error) {
public_keys.go#L13: var keys []*rsa.PublicKey
public_keys.go#L34: func ParseRSA(data []byte) (*rsa.PublicKey, error) {
public_keys.go#L43: publicKey, ok := k.(*rsa.PublicKey)
rsa.go#L27: func RSAPublicDecrypt(pub *rsa.PublicKey, sig []byte) ([]byte, error) {
rsa.go#L40: func rsaEncrypt(data []byte, key *rsa.PublicKey) []byte {
rsa_fingerprint.go#L13: func RSAFingerprint(key *rsa.PublicKey) int64 {
rsa_hashed.go#L13: func RSAEncryptHashed(data []byte, key *rsa.PublicKey, randomSource io.Reader) ([]byte, error) {
rsa_pad.go#L36: func RSAPad(data []byte, key *rsa.PublicKey, randomSource io.Reader) ([]byte, error) {
github.com/gotd/td/internal/exchange
key.go#L12: RSA *rsa.PublicKey
github.com/gotd/td/telegram
cdn.go#L13: func parseCDNKeys(keys ...tg.CDNPublicKey) ([]*rsa.PublicKey, error) {
cdn.go#L14: r := make([]*rsa.PublicKey, 0, len(keys))
github.com/gotd/td/telegram/dcs
dns.go#L23: rsa.PublicKey
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |