crypto/x509.pkcs1PublicKey.N (field)

28 uses

	crypto/x509 (current package)
		parser.go#L269: 			N: p.N,
		pkcs1.go#L74: 		N: priv.N,
		pkcs1.go#L114: 		N:       key.N,
		pkcs1.go#L160: 		N: pub.N,
		pkcs1.go#L169: 		N: key.N,
		x509.go#L76: 			N: pub.N,

	crypto/rsa
		pss.go#L211: 	emBits := priv.N.BitLen() - 1
		pss.go#L272: 		saltLength = (priv.N.BitLen()-1+7)/8 - 2 - hash.Size()
		pss.go#L296: 	emBits := pub.N.BitLen() - 1
		rsa.go#L43: 	N *big.Int // modulus
		rsa.go#L53: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L62: 	return pub.N.Cmp(xx.N) == 0 && pub.E == xx.E
		rsa.go#L87: 	if pub.N == nil {
		rsa.go#L217: 	if modulus.Cmp(priv.N) != 0 {
		rsa.go#L339: 			priv.N = n
		rsa.go#L389: 	c.Exp(m, e, pub.N)
		rsa.go#L491: 	if c.Cmp(priv.N) > 0 {
		rsa.go#L495: 	if priv.N.Sign() == 0 {
		rsa.go#L511: 			r, err = rand.Int(random, priv.N)
		rsa.go#L518: 			ok := ir.ModInverse(r, priv.N)
		rsa.go#L524: 		rpowe := new(big.Int).Exp(r, bigE, priv.N) // N != 0
		rsa.go#L527: 		cCopy.Mod(cCopy, priv.N)
		rsa.go#L532: 		m = new(big.Int).Exp(c, priv.D, priv.N)
		rsa.go#L563: 		m.Mod(m, priv.N)

	crypto/tls
		handshake_server_tls13.go#L626: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
		tls.go#L310: 		if pub.N.Cmp(priv.N) != 0 {