crypto/x509.pkcs1PublicKey.N (field)

29 uses

	crypto/x509 (current package)
		parser.go#L250: 			N: p.N,
		pkcs1.go#L84: 		N: priv.N,
		pkcs1.go#L143: 		N:       key.N,
		pkcs1.go#L189: 		N: pub.N,
		pkcs1.go#L198: 		N: key.N,
		x509.go#L89: 			N: pub.N,

	crypto/rsa
		fips.go#L403: 	if pub.N == nil {
		fips.go#L406: 	if pub.N.BitLen() < 2048 {
		fips.go#L409: 	if pub.N.BitLen()%2 == 1 {
		rsa.go#L69: 	N *big.Int // modulus
		rsa.go#L79: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L88: 	return bigIntEqual(pub.N, xx.N) && pub.E == xx.E
		rsa.go#L262: 	if k.N == nil {
		rsa.go#L265: 	return checkKeySize(k.N.BitLen())
		rsa.go#L304: 				N: N,
		rsa.go#L351: 			N: new(big.Int).SetBytes(N),
		rsa.go#L479: 			priv.N = n
		rsa.go#L524: 	if priv.N == nil {
		rsa.go#L542: 		k, err := rsa.NewPrivateKeyWithPrecomputation(priv.N.Bytes(), priv.E, priv.D.Bytes(),
		rsa.go#L554: 	k, err := rsa.NewPrivateKey(priv.N.Bytes(), priv.E, priv.D.Bytes(),
		rsa.go#L572: 	k, err := rsa.NewPrivateKeyWithoutCRT(priv.N.Bytes(), priv.E, priv.D.Bytes())
		rsa.go#L625: 	N, err := bigmod.NewModulus(pub.N.Bytes())

	crypto/tls
		common.go#L1736: 		size := k.N.BitLen()
		handshake_client.go#L1094: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L908: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server_tls13.go#L873: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
		tls.go#L326: 		if pub.N.Cmp(priv.N) != 0 {