math/big.Int.BitLen (method)
35 uses
math/big (current package)
float.go#L603: bits := uint32(x.BitLen())
int.go#L541: func (x *Int) BitLen() int {
crypto/dsa
dsa.go#L129: if p.BitLen() < L {
dsa.go#L174: xBytes := make([]byte, priv.Q.BitLen()/8)
dsa.go#L223: n := priv.Q.BitLen()
dsa.go#L309: n := pub.Q.BitLen()
crypto/ecdsa
ecdsa.go#L94: size := (k.Curve.Params().N.BitLen() + 7) / 8
ecdsa.go#L95: if k.D.BitLen() > size*8 {
ecdsa.go#L419: if x.BitLen() > bitSize || y.BitLen() > bitSize {
ecdsa_legacy.go#L43: orderBits := c.Params().N.BitLen()
ecdsa_legacy.go#L203: b := make([]byte, (N.BitLen()+7)/8)
ecdsa_legacy.go#L207: if excess := len(b)*8 - N.BitLen(); excess > 0 {
crypto/elliptic
elliptic.go#L77: bitSize := N.BitLen()
nistec.go#L149: if x.BitLen() > curve.params.BitSize || y.BitLen() > curve.params.BitSize {
nistec.go#L197: byteSize := (curve.params.N.BitLen() + 7) / 8
crypto/rand
util.go#L74: bitLen := n.BitLen()
crypto/rsa
fips.go#L406: if pub.N.BitLen() < 2048 {
fips.go#L409: if pub.N.BitLen()%2 == 1 {
fips.go#L431: if priv.Primes[0] == nil || priv.Primes[1] == nil || priv.Primes[0].BitLen() != priv.Primes[1].BitLen() {
rsa.go#L79: return (pub.N.BitLen() + 7) / 8
rsa.go#L265: return checkKeySize(k.N.BitLen())
rsa.go#L446: todo -= primes[i].BitLen()
rsa.go#L466: if n.BitLen() != bits {
crypto/tls
common.go#L1736: size := k.N.BitLen()
handshake_client.go#L1094: n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server.go#L908: n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
handshake_server_tls13.go#L873: rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
crypto/x509
oid.go#L96: return (n.BitLen() + 6) / 7
sec1.go#L61: privateKey := make([]byte, (key.Curve.Params().N.BitLen()+7)/8)
sec1.go#L118: privateKey := make([]byte, (curveOrder.BitLen()+7)/8)
go/constant
value.go#L356: return x.BitLen() < maxExp
value.go#L654: return x.val.BitLen()
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)