crypto/x509.pkcs1PublicKey.N (field)
29 uses
crypto/x509 (current package)
parser.go#L250: N: p.N,
pkcs1.go#L84: N: priv.N,
pkcs1.go#L143: N: key.N,
pkcs1.go#L189: N: pub.N,
pkcs1.go#L198: N: key.N,
x509.go#L89: N: pub.N,
crypto/rsa
fips.go#L403: if pub.N == nil {
fips.go#L406: if pub.N.BitLen() < 2048 {
fips.go#L409: if pub.N.BitLen()%2 == 1 {
rsa.go#L69: N *big.Int // modulus
rsa.go#L79: return (pub.N.BitLen() + 7) / 8
rsa.go#L88: return bigIntEqual(pub.N, xx.N) && pub.E == xx.E
rsa.go#L262: if k.N == nil {
rsa.go#L265: return checkKeySize(k.N.BitLen())
rsa.go#L304: N: N,
rsa.go#L351: N: new(big.Int).SetBytes(N),
rsa.go#L479: priv.N = n
rsa.go#L524: if priv.N == nil {
rsa.go#L542: k, err := rsa.NewPrivateKeyWithPrecomputation(priv.N.Bytes(), priv.E, priv.D.Bytes(),
rsa.go#L554: k, err := rsa.NewPrivateKey(priv.N.Bytes(), priv.E, priv.D.Bytes(),
rsa.go#L572: k, err := rsa.NewPrivateKeyWithoutCRT(priv.N.Bytes(), priv.E, priv.D.Bytes())
rsa.go#L625: N, err := bigmod.NewModulus(pub.N.Bytes())
crypto/tls
common.go#L1736: size := k.N.BitLen()
handshake_client.go#L1094: n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server.go#L908: n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server_tls13.go#L873: rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
tls.go#L326: if pub.N.Cmp(priv.N) != 0 {