crypto/x509.pkcs1PublicKey.N (field)

25 uses

	crypto/x509 (current package)
		parser.go#L250: 			N: p.N,
		pkcs1.go#L74: 		N: priv.N,
		pkcs1.go#L114: 		N:       key.N,
		pkcs1.go#L160: 		N: pub.N,
		pkcs1.go#L169: 		N: key.N,
		x509.go#L88: 			N: pub.N,

	crypto/rsa
		pss.go#L211: 	emBits := priv.N.BitLen() - 1
		pss.go#L315: 		saltLength = (priv.N.BitLen()-1+7)/8 - 2 - hash.Size()
		pss.go#L365: 	emBits := pub.N.BitLen() - 1
		rsa.go#L50: 	N *big.Int // modulus
		rsa.go#L60: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L69: 	return bigIntEqual(pub.N, xx.N) && pub.E == xx.E
		rsa.go#L99: 	if pub.N == nil {
		rsa.go#L247: 	if modulus.Cmp(priv.N) != 0 {
		rsa.go#L334: 				N: N,
		rsa.go#L432: 			priv.N = n
		rsa.go#L484: 	N, err := bigmod.NewModulusFromBig(pub.N)
		rsa.go#L587: 		priv.Precomputed.n, err = bigmod.NewModulusFromBig(priv.N)
		rsa.go#L652: 		N, err = bigmod.NewModulusFromBig(priv.N)

	crypto/tls
		handshake_client.go#L1081: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L884: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server_tls13.go#L758: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
		tls.go#L326: 		if pub.N.Cmp(priv.N) != 0 {