const crypto.SHA384

25 uses

	crypto (current package)
		crypto.go#L35: 	case SHA384:
		crypto.go#L74: 	SHA384                      // import crypto/sha512
		crypto.go#L97: 	SHA384:      48,

	crypto/rsa
		pkcs1v15.go#L270: 	crypto.SHA384:    {0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30},

	crypto/sha512
		sha512.go#L22: 	crypto.RegisterHash(crypto.SHA384, New384)
		sha512.go#L93: 	case crypto.SHA384:
		sha512.go#L145: 	case crypto.SHA384:
		sha512.go#L175: 	case d.function == crypto.SHA384 && string(b[:len(magic384)]) == magic384:
		sha512.go#L233: 	d := &digest{function: crypto.SHA384}
		sha512.go#L244: 	case crypto.SHA384:
		sha512.go#L288: 	case crypto.SHA384:
		sha512.go#L331: 	if d.function != crypto.SHA384 {
		sha512.go#L355: 	d := digest{function: crypto.SHA384}

	crypto/tls
		auth.go#L117: 		hash = crypto.SHA384
		auth.go#L156: 	{PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
		auth.go#L162: 	{PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
		cipher_suites.go#L214: 	{TLS_AES_256_GCM_SHA384, 32, aeadAESGCMTLS13, crypto.SHA384},
		prf.go#L94: 			return prf12(sha512.New384), crypto.SHA384

	crypto/x509
		x509.go#L374: 	{SHA384WithRSA, "SHA384-RSA", oidSignatureSHA384WithRSA, asn1.NullRawValue, RSA, crypto.SHA384, false},
		x509.go#L377: 	{SHA384WithRSAPSS, "SHA384-RSAPSS", oidSignatureRSAPSS, pssParametersSHA384, RSA, crypto.SHA384, true},
		x509.go#L383: 	{ECDSAWithSHA384, "ECDSA-SHA384", oidSignatureECDSAWithSHA384, emptyRawValue, ECDSA, crypto.SHA384, false},

	github.com/golang-jwt/jwt/v5
		ecdsa.go#L40: 	SigningMethodES384 = &SigningMethodECDSA{"ES384", crypto.SHA384, 48, 384}
		hmac.go#L32: 	SigningMethodHS384 = &SigningMethodHMAC{"HS384", crypto.SHA384}
		rsa.go#L31: 	SigningMethodRS384 = &SigningMethodRSA{"RS384", crypto.SHA384}
		rsa_pss.go#L52: 			Hash: crypto.SHA384,