type crypto/rsa.PSSOptions

14 uses

	crypto/rsa (current package)
		pss.go#L235: type PSSOptions struct {
		pss.go#L248: func (opts *PSSOptions) HashFunc() crypto.Hash {
		pss.go#L252: func (opts *PSSOptions) saltLength() int {
		pss.go#L264: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
		pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L145: 	if pssOpts, ok := opts.(*PSSOptions); ok {

	crypto/tls
		auth.go#L53: 		signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
		handshake_client.go#L630: 			signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_client_tls13.go#L595: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_server_tls13.go#L620: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		key_agreement.go#L230: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}

	crypto/x509
		x509.go#L861: 			return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
		x509.go#L1577: 		signerOpts = &rsa.PSSOptions{
		x509.go#L2208: 		signerOpts = &rsa.PSSOptions{