type crypto/rsa.PSSOptions
13 uses
crypto/rsa (current package)
fips.go#L31: type PSSOptions struct {
fips.go#L44: func (opts *PSSOptions) HashFunc() crypto.Hash {
fips.go#L48: func (opts *PSSOptions) saltLength() int {
fips.go#L64: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
fips.go#L131: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L159: if pssOpts, ok := opts.(*PSSOptions); ok {
crypto/tls
auth.go#L54: signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
handshake_client.go#L826: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
handshake_client_tls13.go#L810: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
handshake_server_tls13.go#L867: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
key_agreement.go#L231: signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
crypto/x509
x509.go#L1003: return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
x509.go#L1582: signerOpts = &rsa.PSSOptions{