type crypto/rsa.PSSOptions
14 uses
crypto/rsa (current package)
pss.go#L235: type PSSOptions struct {
pss.go#L248: func (opts *PSSOptions) HashFunc() crypto.Hash {
pss.go#L252: func (opts *PSSOptions) saltLength() int {
pss.go#L264: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L145: if pssOpts, ok := opts.(*PSSOptions); ok {
crypto/tls
auth.go#L53: signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
handshake_client.go#L630: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
handshake_client_tls13.go#L595: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
handshake_server_tls13.go#L620: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
key_agreement.go#L230: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
crypto/x509
x509.go#L861: return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
x509.go#L1577: signerOpts = &rsa.PSSOptions{
x509.go#L2208: signerOpts = &rsa.PSSOptions{