const crypto/x509.RSA

17 uses

	crypto/x509 (current package)
		x509.go#L257: 	RSA
		x509.go#L264: 	RSA:     "RSA",
		x509.go#L362: 	{MD2WithRSA, "MD2-RSA", oidSignatureMD2WithRSA, RSA, crypto.Hash(0) /* no value for MD2 */},
		x509.go#L363: 	{MD5WithRSA, "MD5-RSA", oidSignatureMD5WithRSA, RSA, crypto.MD5},
		x509.go#L364: 	{SHA1WithRSA, "SHA1-RSA", oidSignatureSHA1WithRSA, RSA, crypto.SHA1},
		x509.go#L365: 	{SHA1WithRSA, "SHA1-RSA", oidISOSignatureSHA1WithRSA, RSA, crypto.SHA1},
		x509.go#L366: 	{SHA256WithRSA, "SHA256-RSA", oidSignatureSHA256WithRSA, RSA, crypto.SHA256},
		x509.go#L367: 	{SHA384WithRSA, "SHA384-RSA", oidSignatureSHA384WithRSA, RSA, crypto.SHA384},
		x509.go#L368: 	{SHA512WithRSA, "SHA512-RSA", oidSignatureSHA512WithRSA, RSA, crypto.SHA512},
		x509.go#L369: 	{SHA256WithRSAPSS, "SHA256-RSAPSS", oidSignatureRSAPSS, RSA, crypto.SHA256},
		x509.go#L370: 	{SHA384WithRSAPSS, "SHA384-RSAPSS", oidSignatureRSAPSS, RSA, crypto.SHA384},
		x509.go#L371: 	{SHA512WithRSAPSS, "SHA512-RSAPSS", oidSignatureRSAPSS, RSA, crypto.SHA512},
		x509.go#L493: 		return RSA
		x509.go#L914: 		if pubKeyAlgo != RSA {
		x509.go#L1413: 		pubType = RSA

	crypto/tls
		handshake_client.go#L970: 		if cert.cert.PublicKeyAlgorithm == x509.RSA {
		handshake_server.go#L867: 		if certs[i].PublicKeyAlgorithm == x509.RSA {