golang.org/x/crypto/openpgp/packet.parsedMPI.bytes (field)
102 uses
golang.org/x/crypto/openpgp/packet (current package)
encrypted_key.go#L45: e.encryptedMPI1.bytes, e.encryptedMPI1.bitLength, err = readMPI(r)
encrypted_key.go#L50: e.encryptedMPI1.bytes, e.encryptedMPI1.bitLength, err = readMPI(r)
encrypted_key.go#L54: e.encryptedMPI2.bytes, e.encryptedMPI2.bitLength, err = readMPI(r)
encrypted_key.go#L84: b, err = k.Decrypt(config.Random(), padToKeySize(k.Public().(*rsa.PublicKey), e.encryptedMPI1.bytes), nil)
encrypted_key.go#L86: c1 := new(big.Int).SetBytes(e.encryptedMPI1.bytes)
encrypted_key.go#L87: c2 := new(big.Int).SetBytes(e.encryptedMPI2.bytes)
encrypted_key.go#L113: mpiLen = 2 + len(e.encryptedMPI1.bytes)
encrypted_key.go#L115: mpiLen = 2 + len(e.encryptedMPI1.bytes) + 2 + len(e.encryptedMPI2.bytes)
public_key.go#L69: f.p.bytes, f.p.bitLength, err = readMPI(r)
public_key.go#L94: x, y := elliptic.Unmarshal(c, f.p.bytes)
public_key.go#L102: return 1 + len(f.oid) + 2 + len(f.p.bytes)
public_key.go#L177: bytes: n.Bytes(),
public_key.go#L246: pk.ec.p.bytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y)
public_key.go#L317: pk.n.bytes, pk.n.bitLength, err = readMPI(r)
public_key.go#L321: pk.e.bytes, pk.e.bitLength, err = readMPI(r)
public_key.go#L326: if len(pk.e.bytes) > 3 {
public_key.go#L331: N: new(big.Int).SetBytes(pk.n.bytes),
public_key.go#L334: for i := 0; i < len(pk.e.bytes); i++ {
public_key.go#L336: rsa.E |= int(pk.e.bytes[i])
public_key.go#L345: pk.p.bytes, pk.p.bitLength, err = readMPI(r)
public_key.go#L349: pk.q.bytes, pk.q.bitLength, err = readMPI(r)
public_key.go#L353: pk.g.bytes, pk.g.bitLength, err = readMPI(r)
public_key.go#L357: pk.y.bytes, pk.y.bitLength, err = readMPI(r)
public_key.go#L363: dsa.P = new(big.Int).SetBytes(pk.p.bytes)
public_key.go#L364: dsa.Q = new(big.Int).SetBytes(pk.q.bytes)
public_key.go#L365: dsa.G = new(big.Int).SetBytes(pk.g.bytes)
public_key.go#L366: dsa.Y = new(big.Int).SetBytes(pk.y.bytes)
public_key.go#L374: pk.p.bytes, pk.p.bitLength, err = readMPI(r)
public_key.go#L378: pk.g.bytes, pk.g.bitLength, err = readMPI(r)
public_key.go#L382: pk.y.bytes, pk.y.bitLength, err = readMPI(r)
public_key.go#L388: elgamal.P = new(big.Int).SetBytes(pk.p.bytes)
public_key.go#L389: elgamal.G = new(big.Int).SetBytes(pk.g.bytes)
public_key.go#L390: elgamal.Y = new(big.Int).SetBytes(pk.y.bytes)
public_key.go#L402: pLength += 2 + uint16(len(pk.n.bytes))
public_key.go#L403: pLength += 2 + uint16(len(pk.e.bytes))
public_key.go#L405: pLength += 2 + uint16(len(pk.p.bytes))
public_key.go#L406: pLength += 2 + uint16(len(pk.q.bytes))
public_key.go#L407: pLength += 2 + uint16(len(pk.g.bytes))
public_key.go#L408: pLength += 2 + uint16(len(pk.y.bytes))
public_key.go#L410: pLength += 2 + uint16(len(pk.p.bytes))
public_key.go#L411: pLength += 2 + uint16(len(pk.g.bytes))
public_key.go#L412: pLength += 2 + uint16(len(pk.y.bytes))
public_key.go#L431: length += 2 + len(pk.n.bytes)
public_key.go#L432: length += 2 + len(pk.e.bytes)
public_key.go#L434: length += 2 + len(pk.p.bytes)
public_key.go#L435: length += 2 + len(pk.q.bytes)
public_key.go#L436: length += 2 + len(pk.g.bytes)
public_key.go#L437: length += 2 + len(pk.y.bytes)
public_key.go#L439: length += 2 + len(pk.p.bytes)
public_key.go#L440: length += 2 + len(pk.g.bytes)
public_key.go#L441: length += 2 + len(pk.y.bytes)
public_key.go#L523: err = rsa.VerifyPKCS1v15(rsaPublicKey, sig.Hash, hashBytes, padToKeySize(rsaPublicKey, sig.RSASignature.bytes))
public_key.go#L535: if !dsa.Verify(dsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.DSASigR.bytes), new(big.Int).SetBytes(sig.DSASigS.bytes)) {
public_key.go#L541: if !ecdsa.Verify(ecdsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.ECDSASigR.bytes), new(big.Int).SetBytes(sig.ECDSASigS.bytes)) {
public_key.go#L574: if err = rsa.VerifyPKCS1v15(rsaPublicKey, sig.Hash, hashBytes, padToKeySize(rsaPublicKey, sig.RSASignature.bytes)); err != nil {
public_key.go#L585: if !dsa.Verify(dsaPublicKey, hashBytes, new(big.Int).SetBytes(sig.DSASigR.bytes), new(big.Int).SetBytes(sig.DSASigS.bytes)) {
public_key.go#L724: bytes []byte
public_key.go#L732: err = writeMPI(w, mpi.bitLength, mpi.bytes)
public_key_v3.go#L82: fingerPrint.Write(pk.n.bytes)
public_key_v3.go#L83: fingerPrint.Write(pk.e.bytes)
public_key_v3.go#L85: pk.KeyId = binary.BigEndian.Uint64(pk.n.bytes[len(pk.n.bytes)-8:])
public_key_v3.go#L91: if pk.n.bytes, pk.n.bitLength, err = readMPI(r); err != nil {
public_key_v3.go#L94: if pk.e.bytes, pk.e.bitLength, err = readMPI(r); err != nil {
public_key_v3.go#L100: if len(pk.n.bytes) < 8 {
public_key_v3.go#L103: if len(pk.e.bytes) > 3 {
public_key_v3.go#L107: rsa := &rsa.PublicKey{N: new(big.Int).SetBytes(pk.n.bytes)}
public_key_v3.go#L108: for i := 0; i < len(pk.e.bytes); i++ {
public_key_v3.go#L110: rsa.E |= int(pk.e.bytes[i])
public_key_v3.go#L123: pLength += 2 + uint16(len(pk.n.bytes))
public_key_v3.go#L124: pLength += 2 + uint16(len(pk.e.bytes))
public_key_v3.go#L138: length += 2 + len(pk.n.bytes)
public_key_v3.go#L139: length += 2 + len(pk.e.bytes)
public_key_v3.go#L211: if err = rsa.VerifyPKCS1v15(pk.PublicKey, sig.Hash, hashBytes, sig.RSASignature.bytes); err != nil {
signature.go#L159: sig.RSASignature.bytes, sig.RSASignature.bitLength, err = readMPI(r)
signature.go#L161: sig.DSASigR.bytes, sig.DSASigR.bitLength, err = readMPI(r)
signature.go#L163: sig.DSASigS.bytes, sig.DSASigS.bitLength, err = readMPI(r)
signature.go#L166: sig.ECDSASigR.bytes, sig.ECDSASigR.bitLength, err = readMPI(r)
signature.go#L168: sig.ECDSASigS.bytes, sig.ECDSASigS.bitLength, err = readMPI(r)
signature.go#L521: sig.RSASignature.bytes, err = priv.PrivateKey.(crypto.Signer).Sign(config.Random(), digest, sig.Hash)
signature.go#L522: sig.RSASignature.bitLength = uint16(8 * len(sig.RSASignature.bytes))
signature.go#L533: sig.DSASigR.bytes = r.Bytes()
signature.go#L534: sig.DSASigR.bitLength = uint16(8 * len(sig.DSASigR.bytes))
signature.go#L535: sig.DSASigS.bytes = s.Bytes()
signature.go#L536: sig.DSASigS.bitLength = uint16(8 * len(sig.DSASigS.bytes))
signature.go#L603: if sig.RSASignature.bytes == nil && sig.DSASigR.bytes == nil && sig.ECDSASigR.bytes == nil {
signature.go#L610: sigLength = 2 + len(sig.RSASignature.bytes)
signature.go#L612: sigLength = 2 + len(sig.DSASigR.bytes)
signature.go#L613: sigLength += 2 + len(sig.DSASigS.bytes)
signature.go#L615: sigLength = 2 + len(sig.ECDSASigR.bytes)
signature.go#L616: sigLength += 2 + len(sig.ECDSASigS.bytes)
signature_v3.go#L91: sig.RSASignature.bytes, sig.RSASignature.bitLength, err = readMPI(r)
signature_v3.go#L93: if sig.DSASigR.bytes, sig.DSASigR.bitLength, err = readMPI(r); err != nil {
signature_v3.go#L96: sig.DSASigS.bytes, sig.DSASigS.bitLength, err = readMPI(r)
signature_v3.go#L133: if sig.RSASignature.bytes == nil && sig.DSASigR.bytes == nil {
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |