crypto.Hash.New (method)
47 uses
crypto (current package)
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto/ecdsa
ecdsa.go#L285: h := fips140hash.UnwrapNew(hashFunc.New)
crypto/internal/hpke
hpke.go#L35: return hkdf.Extract(kdf.hash.New, labeledIKM, salt)
hpke.go#L45: return hkdf.Expand(kdf.hash.New, randomKey, string(labeledInfo), int(length))
crypto/rsa
fips.go#L82: h := fips140hash.Unwrap(hash.New())
fips.go#L147: h := fips140hash.Unwrap(hash.New())
fips.go#L326: if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
fips.go#L372: if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
rsa.go#L177: return decryptOAEP(opts.Hash.New(), opts.Hash.New(), priv, ciphertext, opts.Label)
rsa.go#L179: return decryptOAEP(opts.Hash.New(), opts.MGFHash.New(), priv, ciphertext, opts.Label)
crypto/tls
auth.go#L90: h := sigHash.New()
handshake_client.go#L331: transcript := suite.hash.New()
handshake_client.go#L520: earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
handshake_client.go#L522: transcript := cipherSuite.hash.New()
handshake_client_tls13.go#L66: hs.transcript = hs.suite.hash.New()
handshake_client_tls13.go#L73: hs.echContext.innerTranscript = hs.suite.hash.New()
handshake_client_tls13.go#L93: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_client_tls13.go#L94: hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L267: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_client_tls13.go#L268: hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L349: transcript := hs.suite.hash.New()
handshake_client_tls13.go#L511: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_client_tls13.go#L884: psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
handshake_server_tls13.go#L197: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L421: hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
handshake_server_tls13.go#L446: transcript := hs.suite.hash.New()
handshake_server_tls13.go#L486: out := h.New()
handshake_server_tls13.go#L575: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_server_tls13.go#L576: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L738: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_server_tls13.go#L739: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L761: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_server_tls13.go#L986: psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
key_agreement.go#L141: h := hashFunc.New()
key_schedule.go#L23: return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
key_schedule.go#L28: key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
key_schedule.go#L29: iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
key_schedule.go#L37: finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
key_schedule.go#L38: verifyData := hmac.New(c.hash.New, finishedKey)
prf.go#L126: return tls12.MasterSecret(hash.New, preMasterSecret, transcript)
prf.go#L163: return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
prf.go#L236: hash := hashAlg.New()
crypto/x509
x509.go#L992: h := hashType.New()
x509.go#L1575: h := hashFunc.New()