crypto/x509.Certificate.PublicKey (field)

21 uses

	crypto/x509 (current package)
		parser.go#L923: 		cert.PublicKey, err = parsePublicKey(&publicKeyInfo{
		verify.go#L867: 		if !candidate.PublicKey.(pubKeyEqual).Equal(cert.PublicKey) {
		x509.go#L688: 	PublicKey          any
		x509.go#L841: 	return checkSignature(c.SignatureAlgorithm, c.RawTBSCertificate, c.Signature, parent.PublicKey, false)
		x509.go#L852: 	return checkSignature(algo, signed, signature, c.PublicKey, true)
		x509.go#L1605: 	} else if parent.PublicKey != nil && !privPub.Equal(parent.PublicKey) {

	crypto/tls
		handshake_client.go#L971: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_client.go#L1000: 	switch certs[0].PublicKey.(type) {
		handshake_client.go#L1005: 		return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
		handshake_client_tls13.go#L563: 	if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
		handshake_server.go#L642: 			pub = c.peerCertificates[0].PublicKey
		handshake_server.go#L868: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L918: 		switch certs[0].PublicKey.(type) {
		handshake_server.go#L922: 			return fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", certs[0].PublicKey)
		handshake_server_tls13.go#L948: 		if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
		key_agreement.go#L90: 	rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
		key_agreement.go#L338: 		sigType, sigHash, err = legacyTypeAndHashFromPublicKey(cert.PublicKey)
		key_agreement.go#L354: 	if err := verifyHandshakeSignature(sigType, cert.PublicKey, sigHash, signed, sig); err != nil {
		tls.go#L304: 	switch pub := x509Cert.PublicKey.(type) {