crypto.Hash.New (method)

47 uses

	crypto (current package)
		crypto.go#L127: func (h Hash) New() hash.Hash {

	crypto/ecdsa
		ecdsa.go#L285: 	h := fips140hash.UnwrapNew(hashFunc.New)

	crypto/internal/hpke
		hpke.go#L35: 	return hkdf.Extract(kdf.hash.New, labeledIKM, salt)
		hpke.go#L45: 	return hkdf.Expand(kdf.hash.New, randomKey, string(labeledInfo), int(length))

	crypto/rsa
		fips.go#L82: 	h := fips140hash.Unwrap(hash.New())
		fips.go#L147: 	h := fips140hash.Unwrap(hash.New())
		fips.go#L326: 	if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
		fips.go#L372: 	if fips140only.Enabled && !fips140only.ApprovedHash(fips140hash.Unwrap(hash.New())) {
		rsa.go#L177: 			return decryptOAEP(opts.Hash.New(), opts.Hash.New(), priv, ciphertext, opts.Label)
		rsa.go#L179: 			return decryptOAEP(opts.Hash.New(), opts.MGFHash.New(), priv, ciphertext, opts.Label)

	crypto/tls
		auth.go#L90: 	h := sigHash.New()
		handshake_client.go#L331: 		transcript := suite.hash.New()
		handshake_client.go#L520: 	earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
		handshake_client.go#L522: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L66: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L73: 		hs.echContext.innerTranscript = hs.suite.hash.New()
		handshake_client_tls13.go#L93: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L94: 			hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L267: 			acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L268: 				hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L349: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L511: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_client_tls13.go#L884: 	psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
		handshake_server_tls13.go#L197: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L421: 		hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
		handshake_server_tls13.go#L446: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L486: 	out := h.New()
		handshake_server_tls13.go#L575: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_server_tls13.go#L576: 			hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
		handshake_server_tls13.go#L738: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_server_tls13.go#L739: 			hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
		handshake_server_tls13.go#L761: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_server_tls13.go#L986: 	psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
		key_agreement.go#L141: 		h := hashFunc.New()
		key_schedule.go#L23: 	return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
		key_schedule.go#L28: 	key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
		key_schedule.go#L29: 	iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
		key_schedule.go#L37: 	finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
		key_schedule.go#L38: 	verifyData := hmac.New(c.hash.New, finishedKey)
		prf.go#L126: 		return tls12.MasterSecret(hash.New, preMasterSecret, transcript)
		prf.go#L163: 		return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
		prf.go#L236: 		hash := hashAlg.New()

	crypto/x509
		x509.go#L992: 		h := hashType.New()
		x509.go#L1575: 		h := hashFunc.New()