crypto.Hash.Size (method)
20 uses
crypto (current package)
crypto.go#L116: func (h Hash) Size() int {
crypto/internal/hpke
hpke.go#L186: exporterSecret := kdf.LabeledExpand(suiteID, secret, "exp", ksContext, uint16(kdf.hash.Size()) /* Nh - hash output size of the kdf*/)
crypto/rsa
pkcs1v15.go#L312: if len(hashed) != hash.Size() {
pss.go#L315: saltLength = (priv.N.BitLen()-1+7)/8 - 2 - hash.Size()
pss.go#L320: saltLength = hash.Size()
crypto/tls
auth.go#L155: {PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
auth.go#L156: {PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
auth.go#L157: {PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
auth.go#L161: {PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
auth.go#L162: {PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
auth.go#L163: {PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
auth.go#L164: {PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
handshake_client.go#L504: hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
handshake_client_tls13.go#L895: msg.nonce, cipherSuite.hash.Size())
handshake_server_tls13.go#L758: rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
handshake_server_tls13.go#L876: nil, suite.hash.Size())
key_schedule.go#L76: return c.expandLabel(secret, label, transcript.Sum(nil), c.hash.Size())
key_schedule.go#L82: newSecret = make([]byte, c.hash.Size())
key_schedule.go#L90: return c.expandLabel(trafficSecret, trafficUpdateLabel, nil, c.hash.Size())
key_schedule.go#L104: finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |