type crypto/rsa.PSSOptions

14 uses

	crypto/rsa (current package)
		pss.go#L257: type PSSOptions struct {
		pss.go#L270: func (opts *PSSOptions) HashFunc() crypto.Hash {
		pss.go#L274: func (opts *PSSOptions) saltLength() int {
		pss.go#L292: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
		pss.go#L341: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L161: 	if pssOpts, ok := opts.(*PSSOptions); ok {

	crypto/tls
		auth.go#L53: 		signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
		handshake_client.go#L701: 			signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_client_tls13.go#L678: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		handshake_server_tls13.go#L705: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
		key_agreement.go#L231: 		signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}

	crypto/x509
		x509.go#L918: 			return rsa.VerifyPSS(pub, hashType, signed, signature, &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash})
		x509.go#L1641: 		signerOpts = &rsa.PSSOptions{
		x509.go#L2436: 		signerOpts = &rsa.PSSOptions{