type crypto/rsa.PublicKey

50 uses

	crypto/rsa (current package)
		notboring.go#L11: func boringPublicKey(*PublicKey) (*boring.PublicKeyRSA, error) {
		pkcs1v15.go#L41: func EncryptPKCS1v15(random io.Reader, pub *PublicKey, msg []byte) ([]byte, error) {
		pkcs1v15.go#L324: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
		pss.go#L341: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L46: type PublicKey struct {
		rsa.go#L56: func (pub *PublicKey) Size() int {
		rsa.go#L61: func (pub *PublicKey) Equal(x crypto.PublicKey) bool {
		rsa.go#L62: 	xx, ok := x.(*PublicKey)
		rsa.go#L95: func checkPub(pub *PublicKey) error {
		rsa.go#L110: 	PublicKey            // public part.
		rsa.go#L330: 			PublicKey: PublicKey{
		rsa.go#L478: func encrypt(pub *PublicKey, plaintext []byte) ([]byte, error) {
		rsa.go#L516: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {

	crypto/tls
		auth.go#L41: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L49: 		pubKey, ok := pubkey.(*rsa.PublicKey)
		auth.go#L133: 	case *rsa.PublicKey:
		auth.go#L203: 	case *rsa.PublicKey:
		auth.go#L281: 	case *rsa.PublicKey:
		common.go#L1207: 			if _, ok := priv.Public().(*rsa.PublicKey); !ok {
		common.go#L1281: 		case *rsa.PublicKey:
		handshake_client.go#L971: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_client.go#L1001: 	case *rsa.PublicKey, *ecdsa.PublicKey, ed25519.PublicKey:
		handshake_server.go#L262: 		case *rsa.PublicKey:
		handshake_server.go#L271: 		case *rsa.PublicKey:
		handshake_server.go#L868: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L919: 		case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
		handshake_server_tls13.go#L710: 		if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
		key_agreement.go#L90: 	rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
		tls.go#L305: 	case *rsa.PublicKey:

	crypto/x509
		parser.go#L247: 		pub := &rsa.PublicKey{
		pkcs1.go#L72: 	key.PublicKey = rsa.PublicKey{
		pkcs1.go#L138: func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) {
		pkcs1.go#L158: 	return &rsa.PublicKey{
		pkcs1.go#L167: func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte {
		x509.go#L86: 	case *rsa.PublicKey:
		x509.go#L913: 	case *rsa.PublicKey:
		x509.go#L1412: 	case *rsa.PublicKey:

	github.com/gotd/td/internal/crypto
		public_keys.go#L12: func ParseRSAPublicKeys(data []byte) ([]*rsa.PublicKey, error) {
		public_keys.go#L13: 	var keys []*rsa.PublicKey
		public_keys.go#L34: func ParseRSA(data []byte) (*rsa.PublicKey, error) {
		public_keys.go#L43: 	publicKey, ok := k.(*rsa.PublicKey)
		rsa.go#L27: func RSAPublicDecrypt(pub *rsa.PublicKey, sig []byte) ([]byte, error) {
		rsa.go#L40: func rsaEncrypt(data []byte, key *rsa.PublicKey) []byte {
		rsa_fingerprint.go#L13: func RSAFingerprint(key *rsa.PublicKey) int64 {
		rsa_hashed.go#L13: func RSAEncryptHashed(data []byte, key *rsa.PublicKey, randomSource io.Reader) ([]byte, error) {
		rsa_pad.go#L36: func RSAPad(data []byte, key *rsa.PublicKey, randomSource io.Reader) ([]byte, error) {

	github.com/gotd/td/internal/exchange
		key.go#L12: 	RSA *rsa.PublicKey

	github.com/gotd/td/telegram
		cdn.go#L13: func parseCDNKeys(keys ...tg.CDNPublicKey) ([]*rsa.PublicKey, error) {
		cdn.go#L14: 	r := make([]*rsa.PublicKey, 0, len(keys))

	github.com/gotd/td/telegram/dcs
		dns.go#L23: 	rsa.PublicKey