type crypto/rsa.PSSOptions

13 uses

	crypto/rsa (current package)
		fips.go#L31: type PSSOptions struct {
		fips.go#L44: func (opts *PSSOptions) HashFunc() crypto.Hash {
		fips.go#L48: func (opts *PSSOptions) saltLength() int {
		fips.go#L64: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
		fips.go#L131: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L159: 	if pssOpts, ok := opts.(*PSSOptions); ok {

	crypto/tls
		auth.go#L54: 		signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
		handshake_client.go#L826: 			signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_client_tls13.go#L810: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_server_tls13.go#L867: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		key_agreement.go#L231: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}

	crypto/x509
		x509.go#L1003: 			return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
		x509.go#L1582: 		signerOpts = &rsa.PSSOptions{