crypto/rsa.PublicKey.N (field)
28 uses
crypto/rsa (current package)
pss.go#L211: emBits := priv.N.BitLen() - 1
pss.go#L272: saltLength = (priv.N.BitLen()-1+7)/8 - 2 - hash.Size()
pss.go#L296: emBits := pub.N.BitLen() - 1
rsa.go#L43: N *big.Int // modulus
rsa.go#L53: return (pub.N.BitLen() + 7) / 8
rsa.go#L62: return pub.N.Cmp(xx.N) == 0 && pub.E == xx.E
rsa.go#L87: if pub.N == nil {
rsa.go#L217: if modulus.Cmp(priv.N) != 0 {
rsa.go#L339: priv.N = n
rsa.go#L389: c.Exp(m, e, pub.N)
rsa.go#L491: if c.Cmp(priv.N) > 0 {
rsa.go#L495: if priv.N.Sign() == 0 {
rsa.go#L511: r, err = rand.Int(random, priv.N)
rsa.go#L518: ok := ir.ModInverse(r, priv.N)
rsa.go#L524: rpowe := new(big.Int).Exp(r, bigE, priv.N) // N != 0
rsa.go#L527: cCopy.Mod(cCopy, priv.N)
rsa.go#L532: m = new(big.Int).Exp(c, priv.D, priv.N)
rsa.go#L563: m.Mod(m, priv.N)
crypto/tls
handshake_server_tls13.go#L626: rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
tls.go#L310: if pub.N.Cmp(priv.N) != 0 {
crypto/x509
parser.go#L269: N: p.N,
pkcs1.go#L74: N: priv.N,
pkcs1.go#L114: N: key.N,
pkcs1.go#L160: N: pub.N,
pkcs1.go#L169: N: key.N,
x509.go#L76: N: pub.N,