crypto/x509.pkcs1PublicKey.N (field)

31 uses

	crypto/x509 (current package)
		parser.go#L249: 			N: p.N,
		pkcs1.go#L74: 		N: priv.N,
		pkcs1.go#L114: 		N:       key.N,
		pkcs1.go#L160: 		N: pub.N,
		pkcs1.go#L169: 		N: key.N,
		x509.go#L88: 			N: pub.N,

	crypto/rsa
		pss.go#L211: 	emBits := priv.N.BitLen() - 1
		pss.go#L315: 		saltLength = (priv.N.BitLen()-1+7)/8 - 2 - hash.Size()
		pss.go#L362: 	emBits := pub.N.BitLen() - 1
		rsa.go#L47: 	N *big.Int // modulus
		rsa.go#L57: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L66: 	return bigIntEqual(pub.N, xx.N) && pub.E == xx.E
		rsa.go#L96: 	if pub.N == nil {
		rsa.go#L244: 	if modulus.Cmp(priv.N) != 0 {
		rsa.go#L331: 				N: N,
		rsa.go#L429: 			priv.N = n
		rsa.go#L485: 	N, err := bigmod.NewModulusFromBig(pub.N)
		rsa.go#L588: 		priv.Precomputed.n, err = bigmod.NewModulusFromBig(priv.N)
		rsa.go#L653: 		N, err = bigmod.NewModulusFromBig(priv.N)

	crypto/tls
		handshake_client.go#L971: 			n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server.go#L868: 			n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
		handshake_server_tls13.go#L711: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
		tls.go#L310: 		if pub.N.Cmp(priv.N) != 0 {

	github.com/gotd/td/internal/crypto
		rsa.go#L35: 	m := new(big.Int).Exp(c, e, pub.N)
		rsa.go#L43: 	c := new(big.Int).Exp(z, e, key.N)
		rsa.go#L51: 	m := new(big.Int).Exp(c, key.D, key.N)
		rsa_fingerprint.go#L20: 	buf.PutBytes(key.N.Bytes())
		rsa_pad.go#L106: 		if keyAESEncryptedBig.Cmp(key.N) >= 0 {

	github.com/gotd/td/telegram/dcs
		dns.go#L54: 	y := new(big.Int).Exp(x, dnsKey.eBig, dnsKey.N)