type crypto.Hash
55 uses
crypto (current package)
crypto.go#L16: type Hash uint
crypto.go#L19: func (h Hash) HashFunc() Hash {
crypto.go#L23: func (h Hash) String() string {
crypto.go#L69: MD4 Hash = 1 + iota // import golang.org/x/crypto/md4
crypto.go#L116: func (h Hash) Size() int {
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto.go#L138: func (h Hash) Available() bool {
crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
crypto.go#L206: HashFunc() Hash
crypto/ecdsa
ecdsa.go#L280: func signFIPSDeterministic[P ecdsa.Point[P]](c *ecdsa.Curve[P], hashFunc crypto.Hash, priv *PrivateKey, hash []byte) ([]byte, error) {
crypto/ed25519
ed25519.go#L106: case hash == crypto.Hash(0) && context != "": // Ed25519ctx
ed25519.go#L111: case hash == crypto.Hash(0): // Ed25519
ed25519.go#L122: Hash crypto.Hash
ed25519.go#L130: func (o *Options) HashFunc() crypto.Hash { return o.Hash }
ed25519.go#L200: return VerifyWithOptions(publicKey, message, sig, &Options{Hash: crypto.Hash(0)}) == nil
ed25519.go#L225: case opts.Hash == crypto.Hash(0) && opts.Context != "": // Ed25519ctx
ed25519.go#L230: case opts.Hash == crypto.Hash(0): // Ed25519
crypto/internal/boring
notboring.go#L102: func SignRSAPKCS1v15(priv *PrivateKeyRSA, h crypto.Hash, hashed []byte) ([]byte, error) {
notboring.go#L105: func SignRSAPSS(priv *PrivateKeyRSA, h crypto.Hash, hashed []byte, saltLen int) ([]byte, error) {
notboring.go#L108: func VerifyRSAPKCS1v15(pub *PublicKeyRSA, h crypto.Hash, hashed, sig []byte) error {
notboring.go#L111: func VerifyRSAPSS(pub *PublicKeyRSA, h crypto.Hash, hashed, sig []byte, saltLen int) error {
crypto/internal/hpke
hpke.go#L26: hash crypto.Hash
hpke.go#L63: hash crypto.Hash
crypto/rsa
fips.go#L40: Hash crypto.Hash
fips.go#L44: func (opts *PSSOptions) HashFunc() crypto.Hash {
fips.go#L64: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
fips.go#L131: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
fips.go#L302: func SignPKCS1v15(random io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
fips.go#L304: if hash != crypto.Hash(0) {
fips.go#L345: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
fips.go#L347: if hash != crypto.Hash(0) {
rsa.go#L95: Hash crypto.Hash
rsa.go#L99: MGFHash crypto.Hash
crypto/tls
auth.go#L23: func verifyHandshakeSignature(sigType uint8, pubkey crypto.PublicKey, hashFunc crypto.Hash, signed, sig []byte) error {
auth.go#L82: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
auth.go#L99: func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
auth.go#L132: func legacyTypeAndHashFromPublicKey(pub crypto.PublicKey) (sigType uint8, hash crypto.Hash, err error) {
cipher_suites.go#L200: hash crypto.Hash
common.go#L211: var directSigning crypto.Hash = 0
handshake_client.go#L802: var sigHash crypto.Hash
handshake_server.go#L745: var sigHash crypto.Hash
handshake_server_tls13.go#L472: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
key_agreement.go#L132: func hashForServerKeyExchange(sigType uint8, hashFunc crypto.Hash, version uint16, slices ...[]byte) []byte {
key_agreement.go#L207: var sigHash crypto.Hash
key_agreement.go#L322: var sigHash crypto.Hash
prf.go#L90: func prfAndHashForVersion(version uint16, suite *cipherSuite) (prfFunc, crypto.Hash) {
prf.go#L93: return prf10, crypto.Hash(0)
prf.go#L226: func (h finishedHash) hashForClientCertificate(sigType uint8, hashAlg crypto.Hash) []byte {
crypto/x509
x509.go#L245: func (algo SignatureAlgorithm) hashFunc() crypto.Hash {
x509.go#L251: return crypto.Hash(0)
x509.go#L368: hash crypto.Hash
x509.go#L386: {PureEd25519, "Ed25519", oidSignatureEd25519, emptyRawValue, Ed25519, crypto.Hash(0) /* no pre-hashing */, false},
x509.go#L964: var hashType crypto.Hash
x509.go#L976: case crypto.Hash(0):