What fields? All of them. An X.509 Public Key Certificate is, sort of, only 3 fields: "the stuff to sign" (TbsCertificate "To-Be-Signed Certificate"), "how I signed it", "the signature". The TbsCertificate is what contains everything that are sensibly thought of as a certificate's fields.
https://www.rfc-editor.org/rfc/rfc5280#section-4.1
Certificate ::= SEQUENCE {
tbsCertificate TBSCertificate,
signatureAlgorithm AlgorithmIdentifier,
signatureValue BIT STRING }
TBSCertificate ::= SEQUENCE {
version [0] EXPLICIT Version DEFAULT v1,
serialNumber CertificateSerialNumber,
signature AlgorithmIdentifier,
issuer Name,
validity Validity,
subject Name,
subjectPublicKeyInfo SubjectPublicKeyInfo,
issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
-- If present, version MUST be v2 or v3
subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
-- If present, version MUST be v2 or v3
extensions [3] EXPLICIT Extensions OPTIONAL
-- If present, version MUST be v3
}
As for your steps:
- Yes, and (for a correctly behaving server) also all of the certificates up to, but not including, the root certificate for that chain.
- The root certificate will ultimately be part of the OS (or data added to the OS after the fact), but a normal TLS server on the internet has a 3 certificate chain: the end-entity/leaf certificate, an intermediate issuer, and the root. The intermediate's public key verifies the signature in the leaf certificate, the root verifies the one in the intermediate, and the system trusts the root.
- No. "Decrypt the signature" is never how signatures are computed. For RSA signatures there's a step that looks an awful lot like decryption, but it's a different operation. For DSA, ECDSA, EdDSA, or any other signature algorithm "decrypt" makes no sense.
- Computing hashes is really a detail of the signature algorithm. For RSA/DSA/ECDSA it's true that the signature computation involves hashing the data first, and many libraries will accept just the hash. For EdDSA (pure, not the "ph" variant), hashes are involved, but it's not just over the input data... so this step is sort of overly specific.
- This is sort of how classic RSA signature verification works, but, as mentioned, RSA isn't the only algorithm.
Steps 3-5 are really one logical step of "perform signature verification per the algorithm used to sign the certificate". What that entails is different for RSA, RSA-PSS, DSA (defunct), ECDSA, EdDSA, EdDSAph, GOST R 34.10-2012, and any other signature algorithm.