math/big.Int.BitLen (method)

35 uses

	math/big (current package)
		float.go#L603: 	bits := uint32(x.BitLen())
		int.go#L541: func (x *Int) BitLen() int {

	crypto/dsa
		dsa.go#L129: 			if p.BitLen() < L {
		dsa.go#L174: 	xBytes := make([]byte, priv.Q.BitLen()/8)
		dsa.go#L223: 	n := priv.Q.BitLen()
		dsa.go#L309: 	n := pub.Q.BitLen()

	crypto/ecdsa
		ecdsa.go#L94: 	size := (k.Curve.Params().N.BitLen() + 7) / 8
		ecdsa.go#L95: 	if k.D.BitLen() > size*8 {
		ecdsa.go#L419: 	if x.BitLen() > bitSize || y.BitLen() > bitSize {
		ecdsa_legacy.go#L43: 	orderBits := c.Params().N.BitLen()
		ecdsa_legacy.go#L203: 		b := make([]byte, (N.BitLen()+7)/8)
		ecdsa_legacy.go#L207: 		if excess := len(b)*8 - N.BitLen(); excess > 0 {

	crypto/elliptic
		elliptic.go#L77: 	bitSize := N.BitLen()
		nistec.go#L149: 	if x.BitLen() > curve.params.BitSize || y.BitLen() > curve.params.BitSize {
		nistec.go#L197: 	byteSize := (curve.params.N.BitLen() + 7) / 8

	crypto/rand
		util.go#L74: 	bitLen := n.BitLen()

	crypto/rsa
		fips.go#L406: 	if pub.N.BitLen() < 2048 {
		fips.go#L409: 	if pub.N.BitLen()%2 == 1 {
		fips.go#L431: 	if priv.Primes[0] == nil || priv.Primes[1] == nil || priv.Primes[0].BitLen() != priv.Primes[1].BitLen() {
		rsa.go#L79: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L265: 	return checkKeySize(k.N.BitLen())
		rsa.go#L446: 			todo -= primes[i].BitLen()
		rsa.go#L466: 		if n.BitLen() != bits {

	crypto/tls
		common.go#L1736: 		size := k.N.BitLen()
		handshake_client.go#L1094: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L908: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server_tls13.go#L873: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS

	crypto/x509
		oid.go#L96: 	return (n.BitLen() + 6) / 7
		sec1.go#L61: 	privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
		sec1.go#L118: 	privateKey := make([]byte, (curveOrder.BitLen()+7)/8)

	go/constant
		value.go#L356: 	return x.BitLen() < maxExp
		value.go#L654: 		return x.val.BitLen()