type hash.Hash

74 uses

	hash (current package)
		hash.go#L26: type Hash interface {
		hash.go#L50: 	Hash
		hash.go#L56: 	Hash

	crypto
		crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {

	crypto/hmac
		hmac.go#L48: 	outer, inner hash.Hash
		hmac.go#L129: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/internal/boring
		notboring.go#L37: func NewSHA1() hash.Hash   { panic("boringcrypto: not available") }
		notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L76: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
		notboring.go#L85: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {

	crypto/md5
		md5.go#L101: func New() hash.Hash {

	crypto/rsa
		pss.go#L31: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash hash.Hash) ([]byte, error) {
		pss.go#L106: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash hash.Hash) error {
		rsa.go#L457: func mgf1XOR(out []byte, hash hash.Hash, seed []byte) {
		rsa.go#L515: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
		rsa.go#L707: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
		rsa.go#L711: func decryptOAEP(hash, mgfHash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {

	crypto/sha1
		sha1.go#L105: func New() hash.Hash {

	crypto/sha256
		sha256.go#L145: func New() hash.Hash {
		sha256.go#L155: func New224() hash.Hash {

	crypto/sha512
		sha512.go#L205: func New() hash.Hash {
		sha512.go#L215: func New512_224() hash.Hash {
		sha512.go#L222: func New512_256() hash.Hash {
		sha512.go#L229: func New384() hash.Hash {

	crypto/tls
		auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
		cipher_suites.go#L145: 	mac    func(key []byte) hash.Hash
		cipher_suites.go#L426: func macSHA1(key []byte) hash.Hash {
		cipher_suites.go#L438: func macSHA256(key []byte) hash.Hash {
		cipher_suites.go#L580: 	hash.Hash
		cipher_suites.go#L596: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
		cipher_suites.go#L598: 	return func() hash.Hash {
		cipher_suites.go#L604: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
		conn.go#L177: 	mac     hash.Hash
		conn.go#L183: 	nextMac    hash.Hash // next MAC algorithm
		conn.go#L209: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
		handshake_client.go#L247: 	innerTranscript hash.Hash
		handshake_client.go#L837: 	var clientHash, serverHash hash.Hash
		handshake_client.go#L1277: func computeAndUpdatePSK(m *clientHelloMsg, binderKey []byte, transcript hash.Hash, finishedHash func([]byte, hash.Hash) []byte) error {
		handshake_client_tls13.go#L36: 	transcript    hash.Hash
		handshake_server.go#L762: 	var clientHash, serverHash hash.Hash
		handshake_server_tls13.go#L43: 	transcript      hash.Hash
		handshake_server_tls13.go#L437: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
		key_schedule.go#L72: func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
		key_schedule.go#L103: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
		key_schedule.go#L112: func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
		prf.go#L27: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
		prf.go#L67: func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
		prf.go#L169: 	client hash.Hash
		prf.go#L170: 	server hash.Hash
		prf.go#L173: 	clientMD5 hash.Hash
		prf.go#L174: 	serverMD5 hash.Hash

	github.com/google/uuid
		hash.go#L27: func NewHash(h hash.Hash, space UUID, data []byte, version int) UUID {

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L26: func Extract(hash func() hash.Hash, secret, salt []byte) []byte {
		hkdf.go#L36: 	expander hash.Hash
		hkdf.go#L85: func Expand(hash func() hash.Hash, pseudorandomKey, info []byte) io.Reader {
		hkdf.go#L92: func New(hash func() hash.Hash, secret, salt, info []byte) io.Reader {

	vendor/golang.org/x/crypto/sha3
		hashes.go#L18: func New224() hash.Hash {
		hashes.go#L25: func New256() hash.Hash {
		hashes.go#L32: func New384() hash.Hash {
		hashes.go#L39: func New512() hash.Hash {
		hashes.go#L63: func NewLegacyKeccak256() hash.Hash { return &state{rate: 136, outputLen: 32, dsbyte: 0x01} }
		hashes.go#L69: func NewLegacyKeccak512() hash.Hash { return &state{rate: 72, outputLen: 64, dsbyte: 0x01} }
		shake.go#L29: 	hash.Hash