crypto.Hash.New (method)

43 uses

	crypto (current package)
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L250: 		h := opts.HashFunc().New()

	crypto/ecdsa
		ecdsa.go#L457: 	h := fips140hash.UnwrapNew(hashFunc.New)

	crypto/internal/hpke
		hpke.go#L35: 	return hkdf.Extract(kdf.hash.New, labeledIKM, salt)
		hpke.go#L45: 	return hkdf.Expand(kdf.hash.New, randomKey, string(labeledInfo), int(length))

	crypto/rsa
		fips.go#L82: 	h := fips140hash.Unwrap(hash.New())
		fips.go#L147: 	h := fips140hash.Unwrap(hash.New())
		fips.go#L326: 	if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
		fips.go#L372: 	if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
		rsa.go#L177: 			return decryptOAEP(opts.Hash.New(), opts.Hash.New(), priv, ciphertext, opts.Label)
		rsa.go#L179: 			return decryptOAEP(opts.Hash.New(), opts.MGFHash.New(), priv, ciphertext, opts.Label)

	crypto/tls
		auth.go#L90: 	h := sigHash.New()
		handshake_client.go#L319: 		transcript := suite.hash.New()
		handshake_client.go#L513: 	earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
		handshake_client.go#L515: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L66: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L73: 		hs.echContext.innerTranscript = hs.suite.hash.New()
		handshake_client_tls13.go#L93: 		h := hs.suite.hash.New
		handshake_client_tls13.go#L268: 			h := hs.suite.hash.New
		handshake_client_tls13.go#L351: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L512: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_client_tls13.go#L893: 	psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
		handshake_server_tls13.go#L199: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L423: 		hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
		handshake_server_tls13.go#L448: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L488: 	out := h.New()
		handshake_server_tls13.go#L577: 		h := hs.suite.hash.New
		handshake_server_tls13.go#L741: 		h := hs.suite.hash.New
		handshake_server_tls13.go#L765: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_server_tls13.go#L998: 	psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
		key_agreement.go#L142: 		h := hashFunc.New()
		key_schedule.go#L23: 	return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
		key_schedule.go#L28: 	key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
		key_schedule.go#L29: 	iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
		key_schedule.go#L37: 	finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
		key_schedule.go#L38: 	verifyData := hmac.New(c.hash.New, finishedKey)
		prf.go#L126: 		return tls12.MasterSecret(hash.New, preMasterSecret, transcript)
		prf.go#L163: 		return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
		prf.go#L236: 		hash := hashAlg.New()

	crypto/x509
		x509.go#L992: 		h := hashType.New()