golang.org/x/crypto/openpgp/packet.parsedMPI.bytes (field)

102 uses

	golang.org/x/crypto/openpgp/packet (current package)
		encrypted_key.go#L45: 		e.encryptedMPI1.bytes, e.encryptedMPI1.bitLength, err = readMPI(r)
		encrypted_key.go#L50: 		e.encryptedMPI1.bytes, e.encryptedMPI1.bitLength, err = readMPI(r)
		encrypted_key.go#L54: 		e.encryptedMPI2.bytes, e.encryptedMPI2.bitLength, err = readMPI(r)
		encrypted_key.go#L84: 		b, err = k.Decrypt(config.Random(), padToKeySize(k.Public().(*rsa.PublicKey), e.encryptedMPI1.bytes), nil)
		encrypted_key.go#L86: 		c1 := new(big.Int).SetBytes(e.encryptedMPI1.bytes)
		encrypted_key.go#L87: 		c2 := new(big.Int).SetBytes(e.encryptedMPI2.bytes)
		encrypted_key.go#L113: 		mpiLen = 2 + len(e.encryptedMPI1.bytes)
		encrypted_key.go#L115: 		mpiLen = 2 + len(e.encryptedMPI1.bytes) + 2 + len(e.encryptedMPI2.bytes)
		public_key.go#L69: 	f.p.bytes, f.p.bitLength, err = readMPI(r)
		public_key.go#L94: 	x, y := elliptic.Unmarshal(c, f.p.bytes)
		public_key.go#L102: 	return 1 + len(f.oid) + 2 + len(f.p.bytes)
		public_key.go#L177: 		bytes:     n.Bytes(),
		public_key.go#L246: 	pk.ec.p.bytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y)
		public_key.go#L317: 	pk.n.bytes, pk.n.bitLength, err = readMPI(r)
		public_key.go#L321: 	pk.e.bytes, pk.e.bitLength, err = readMPI(r)
		public_key.go#L326: 	if len(pk.e.bytes) > 3 {
		public_key.go#L331: 		N: new(big.Int).SetBytes(pk.n.bytes),
		public_key.go#L334: 	for i := 0; i < len(pk.e.bytes); i++ {
		public_key.go#L336: 		rsa.E |= int(pk.e.bytes[i])
		public_key.go#L345: 	pk.p.bytes, pk.p.bitLength, err = readMPI(r)
		public_key.go#L349: 	pk.q.bytes, pk.q.bitLength, err = readMPI(r)
		public_key.go#L353: 	pk.g.bytes, pk.g.bitLength, err = readMPI(r)
		public_key.go#L357: 	pk.y.bytes, pk.y.bitLength, err = readMPI(r)
		public_key.go#L363: 	dsa.P = new(big.Int).SetBytes(pk.p.bytes)
		public_key.go#L364: 	dsa.Q = new(big.Int).SetBytes(pk.q.bytes)
		public_key.go#L365: 	dsa.G = new(big.Int).SetBytes(pk.g.bytes)
		public_key.go#L366: 	dsa.Y = new(big.Int).SetBytes(pk.y.bytes)
		public_key.go#L374: 	pk.p.bytes, pk.p.bitLength, err = readMPI(r)
		public_key.go#L378: 	pk.g.bytes, pk.g.bitLength, err = readMPI(r)
		public_key.go#L382: 	pk.y.bytes, pk.y.bitLength, err = readMPI(r)
		public_key.go#L388: 	elgamal.P = new(big.Int).SetBytes(pk.p.bytes)
		public_key.go#L389: 	elgamal.G = new(big.Int).SetBytes(pk.g.bytes)
		public_key.go#L390: 	elgamal.Y = new(big.Int).SetBytes(pk.y.bytes)
		public_key.go#L402: 		pLength += 2 + uint16(len(pk.n.bytes))
		public_key.go#L403: 		pLength += 2 + uint16(len(pk.e.bytes))
		public_key.go#L405: 		pLength += 2 + uint16(len(pk.p.bytes))
		public_key.go#L406: 		pLength += 2 + uint16(len(pk.q.bytes))
		public_key.go#L407: 		pLength += 2 + uint16(len(pk.g.bytes))
		public_key.go#L408: 		pLength += 2 + uint16(len(pk.y.bytes))
		public_key.go#L410: 		pLength += 2 + uint16(len(pk.p.bytes))
		public_key.go#L411: 		pLength += 2 + uint16(len(pk.g.bytes))
		public_key.go#L412: 		pLength += 2 + uint16(len(pk.y.bytes))
		public_key.go#L431: 		length += 2 + len(pk.n.bytes)
		public_key.go#L432: 		length += 2 + len(pk.e.bytes)
		public_key.go#L434: 		length += 2 + len(pk.p.bytes)
		public_key.go#L435: 		length += 2 + len(pk.q.bytes)
		public_key.go#L436: 		length += 2 + len(pk.g.bytes)
		public_key.go#L437: 		length += 2 + len(pk.y.bytes)
		public_key.go#L439: 		length += 2 + len(pk.p.bytes)
		public_key.go#L440: 		length += 2 + len(pk.g.bytes)
		public_key.go#L441: 		length += 2 + len(pk.y.bytes)
		public_key.go#L523: 		err = rsa.VerifyPKCS1v15(rsaPublicKey, sig.Hash, hashBytes, padToKeySize(rsaPublicKey, sig.RSASignature.bytes))
		public_key.go#L535: 		if !dsa.Verify(dsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.DSASigR.bytes), new(big.Int).SetBytes(sig.DSASigS.bytes)) {
		public_key.go#L541: 		if !ecdsa.Verify(ecdsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.ECDSASigR.bytes), new(big.Int).SetBytes(sig.ECDSASigS.bytes)) {
		public_key.go#L574: 		if err = rsa.VerifyPKCS1v15(rsaPublicKey, sig.Hash, hashBytes, padToKeySize(rsaPublicKey, sig.RSASignature.bytes)); err != nil {
		public_key.go#L585: 		if !dsa.Verify(dsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.DSASigR.bytes), new(big.Int).SetBytes(sig.DSASigS.bytes)) {
		public_key.go#L724: 	bytes     []byte
		public_key.go#L732: 		err = writeMPI(w, mpi.bitLength, mpi.bytes)
		public_key_v3.go#L82: 	fingerPrint.Write(pk.n.bytes)
		public_key_v3.go#L83: 	fingerPrint.Write(pk.e.bytes)
		public_key_v3.go#L85: 	pk.KeyId = binary.BigEndian.Uint64(pk.n.bytes[len(pk.n.bytes)-8:])
		public_key_v3.go#L91: 	if pk.n.bytes, pk.n.bitLength, err = readMPI(r); err != nil {
		public_key_v3.go#L94: 	if pk.e.bytes, pk.e.bitLength, err = readMPI(r); err != nil {
		public_key_v3.go#L100: 	if len(pk.n.bytes) < 8 {
		public_key_v3.go#L103: 	if len(pk.e.bytes) > 3 {
		public_key_v3.go#L107: 	rsa := &rsa.PublicKey{N: new(big.Int).SetBytes(pk.n.bytes)}
		public_key_v3.go#L108: 	for i := 0; i < len(pk.e.bytes); i++ {
		public_key_v3.go#L110: 		rsa.E |= int(pk.e.bytes[i])
		public_key_v3.go#L123: 		pLength += 2 + uint16(len(pk.n.bytes))
		public_key_v3.go#L124: 		pLength += 2 + uint16(len(pk.e.bytes))
		public_key_v3.go#L138: 		length += 2 + len(pk.n.bytes)
		public_key_v3.go#L139: 		length += 2 + len(pk.e.bytes)
		public_key_v3.go#L211: 		if err = rsa.VerifyPKCS1v15(pk.PublicKey, sig.Hash, hashBytes, sig.RSASignature.bytes); err != nil {
		signature.go#L159: 		sig.RSASignature.bytes, sig.RSASignature.bitLength, err = readMPI(r)
		signature.go#L161: 		sig.DSASigR.bytes, sig.DSASigR.bitLength, err = readMPI(r)
		signature.go#L163: 			sig.DSASigS.bytes, sig.DSASigS.bitLength, err = readMPI(r)
		signature.go#L166: 		sig.ECDSASigR.bytes, sig.ECDSASigR.bitLength, err = readMPI(r)
		signature.go#L168: 			sig.ECDSASigS.bytes, sig.ECDSASigS.bitLength, err = readMPI(r)
		signature.go#L521: 		sig.RSASignature.bytes, err = priv.PrivateKey.(crypto.Signer).Sign(config.Random(), digest, sig.Hash)
		signature.go#L522: 		sig.RSASignature.bitLength = uint16(8 * len(sig.RSASignature.bytes))
		signature.go#L533: 			sig.DSASigR.bytes = r.Bytes()
		signature.go#L534: 			sig.DSASigR.bitLength = uint16(8 * len(sig.DSASigR.bytes))
		signature.go#L535: 			sig.DSASigS.bytes = s.Bytes()
		signature.go#L536: 			sig.DSASigS.bitLength = uint16(8 * len(sig.DSASigS.bytes))
		signature.go#L603: 	if sig.RSASignature.bytes == nil && sig.DSASigR.bytes == nil && sig.ECDSASigR.bytes == nil {
		signature.go#L610: 		sigLength = 2 + len(sig.RSASignature.bytes)
		signature.go#L612: 		sigLength = 2 + len(sig.DSASigR.bytes)
		signature.go#L613: 		sigLength += 2 + len(sig.DSASigS.bytes)
		signature.go#L615: 		sigLength = 2 + len(sig.ECDSASigR.bytes)
		signature.go#L616: 		sigLength += 2 + len(sig.ECDSASigS.bytes)
		signature_v3.go#L91: 		sig.RSASignature.bytes, sig.RSASignature.bitLength, err = readMPI(r)
		signature_v3.go#L93: 		if sig.DSASigR.bytes, sig.DSASigR.bitLength, err = readMPI(r); err != nil {
		signature_v3.go#L96: 		sig.DSASigS.bytes, sig.DSASigS.bitLength, err = readMPI(r)
		signature_v3.go#L133: 	if sig.RSASignature.bytes == nil && sig.DSASigR.bytes == nil {