type hash.Hash
74 uses
hash (current package)
hash.go#L26: type Hash interface {
hash.go#L50: Hash
hash.go#L56: Hash
crypto
crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
crypto/hmac
hmac.go#L48: outer, inner hash.Hash
hmac.go#L129: func New(h func() hash.Hash, key []byte) hash.Hash {
crypto/internal/boring
notboring.go#L37: func NewSHA1() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
notboring.go#L76: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
notboring.go#L85: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {
crypto/md5
md5.go#L101: func New() hash.Hash {
crypto/rsa
pss.go#L31: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash hash.Hash) ([]byte, error) {
pss.go#L106: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash hash.Hash) error {
rsa.go#L457: func mgf1XOR(out []byte, hash hash.Hash, seed []byte) {
rsa.go#L515: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
rsa.go#L707: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
rsa.go#L711: func decryptOAEP(hash, mgfHash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
crypto/sha1
sha1.go#L105: func New() hash.Hash {
crypto/sha256
sha256.go#L145: func New() hash.Hash {
sha256.go#L155: func New224() hash.Hash {
crypto/sha512
sha512.go#L205: func New() hash.Hash {
sha512.go#L215: func New512_224() hash.Hash {
sha512.go#L222: func New512_256() hash.Hash {
sha512.go#L229: func New384() hash.Hash {
crypto/tls
auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
cipher_suites.go#L145: mac func(key []byte) hash.Hash
cipher_suites.go#L426: func macSHA1(key []byte) hash.Hash {
cipher_suites.go#L438: func macSHA256(key []byte) hash.Hash {
cipher_suites.go#L580: hash.Hash
cipher_suites.go#L596: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
cipher_suites.go#L598: return func() hash.Hash {
cipher_suites.go#L604: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
conn.go#L177: mac hash.Hash
conn.go#L183: nextMac hash.Hash // next MAC algorithm
conn.go#L209: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
handshake_client.go#L247: innerTranscript hash.Hash
handshake_client.go#L837: var clientHash, serverHash hash.Hash
handshake_client.go#L1277: func computeAndUpdatePSK(m *clientHelloMsg, binderKey []byte, transcript hash.Hash, finishedHash func([]byte, hash.Hash) []byte) error {
handshake_client_tls13.go#L36: transcript hash.Hash
handshake_server.go#L762: var clientHash, serverHash hash.Hash
handshake_server_tls13.go#L43: transcript hash.Hash
handshake_server_tls13.go#L437: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
key_schedule.go#L72: func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
key_schedule.go#L103: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
key_schedule.go#L112: func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
prf.go#L27: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
prf.go#L67: func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
prf.go#L169: client hash.Hash
prf.go#L170: server hash.Hash
prf.go#L173: clientMD5 hash.Hash
prf.go#L174: serverMD5 hash.Hash
github.com/google/uuid
hash.go#L27: func NewHash(h hash.Hash, space UUID, data []byte, version int) UUID {
vendor/golang.org/x/crypto/hkdf
hkdf.go#L26: func Extract(hash func() hash.Hash, secret, salt []byte) []byte {
hkdf.go#L36: expander hash.Hash
hkdf.go#L85: func Expand(hash func() hash.Hash, pseudorandomKey, info []byte) io.Reader {
hkdf.go#L92: func New(hash func() hash.Hash, secret, salt, info []byte) io.Reader {
vendor/golang.org/x/crypto/sha3
hashes.go#L18: func New224() hash.Hash {
hashes.go#L25: func New256() hash.Hash {
hashes.go#L32: func New384() hash.Hash {
hashes.go#L39: func New512() hash.Hash {
hashes.go#L63: func NewLegacyKeccak256() hash.Hash { return &state{rate: 136, outputLen: 32, dsbyte: 0x01} }
hashes.go#L69: func NewLegacyKeccak512() hash.Hash { return &state{rate: 72, outputLen: 64, dsbyte: 0x01} }
shake.go#L29: hash.Hash
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |