crypto/rsa.PublicKey.N (field)

39 uses

	crypto/rsa (current package)
		pss.go#L211: 	emBits := priv.N.BitLen() - 1
		pss.go#L296: 	emBits := pub.N.BitLen() - 1
		rsa.go#L43: 	N *big.Int // modulus
		rsa.go#L53: 	return (pub.N.BitLen() + 7) / 8
		rsa.go#L62: 	return pub.N.Cmp(xx.N) == 0 && pub.E == xx.E
		rsa.go#L87: 	if pub.N == nil {
		rsa.go#L217: 	if modulus.Cmp(priv.N) != 0 {
		rsa.go#L339: 			priv.N = n
		rsa.go#L389: 	c.Exp(m, e, pub.N)
		rsa.go#L491: 	if c.Cmp(priv.N) > 0 {
		rsa.go#L495: 	if priv.N.Sign() == 0 {
		rsa.go#L511: 			r, err = rand.Int(random, priv.N)
		rsa.go#L518: 			ok := ir.ModInverse(r, priv.N)
		rsa.go#L524: 		rpowe := new(big.Int).Exp(r, bigE, priv.N) // N != 0
		rsa.go#L527: 		cCopy.Mod(cCopy, priv.N)
		rsa.go#L532: 		m = new(big.Int).Exp(c, priv.D, priv.N)
		rsa.go#L563: 		m.Mod(m, priv.N)

	crypto/tls
		handshake_server_tls13.go#L640: 			rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
		tls.go#L341: 		if pub.N.Cmp(priv.N) != 0 {

	crypto/x509
		pkcs1.go#L74: 		N: priv.N,
		pkcs1.go#L114: 		N:       key.N,
		pkcs1.go#L160: 		N: pub.N,
		pkcs1.go#L169: 		N: key.N,
		x509.go#L77: 			N: pub.N,
		x509.go#L945: 			N: p.N,

	golang.org/x/crypto/openpgp/packet
		packet.go#L566: 	k := (pub.N.BitLen() + 7) / 8
		public_key.go#L188: 		n:            fromBig(pub.N),
		public_key.go#L331: 		N: new(big.Int).SetBytes(pk.n.bytes),
		public_key_v3.go#L45: 		n:            fromBig(pub.N),
		public_key_v3.go#L107: 	rsa := &rsa.PublicKey{N: new(big.Int).SetBytes(pk.n.bytes)}

	golang.org/x/crypto/ssh
		keys.go#L363: 	key.N = w.N
		keys.go#L378: 		r.N,
		keys.go#L1352: 				N: key.N,

	golang.org/x/crypto/ssh/agent
		client.go#L540: 			N:           k.N,
		server.go#L251: 			N: k.N,
		server.go#L400: 			N: rsaPub.N,

	google.golang.org/api/idtoken
		validate.go#L176: 		N: new(big.Int).SetBytes(dn),