func crypto/hmac.New
16 uses
crypto/hmac (current package)
hmac.go#L128: func New(h func() hash.Hash, key []byte) hash.Hash {
crypto/tls
cipher_suites.go#L425: return hmac.New(newConstantTimeHash(sha1.New), key)
cipher_suites.go#L431: return hmac.New(sha256.New, key)
key_schedule.go#L87: verifyData := hmac.New(c.hash.New, finishedKey)
prf.go#L28: h := hmac.New(hash, secret)
ticket.go#L140: mac := hmac.New(sha256.New, key.hmacKey[:])
ticket.go#L169: mac := hmac.New(sha256.New, key.hmacKey[:])
github.com/aws/aws-sdk-go-v2/aws/signer/internal/v4
hmac.go#L10: hash := hmac.New(sha256.New, key)
github.com/aws/aws-sdk-go-v2/internal/v4a/internal/crypto
ecc.go#L98: h := hmac.New(hash, key)
github.com/aws/aws-sdk-go-v2/internal/v4a/internal/v4
hmac.go#L10: hash := hmac.New(sha256.New, key)
golang.org/x/crypto/pbkdf2
pbkdf2.go#L43: prf := hmac.New(h, password)
mellium.im/sasl
scram.go#L225: h := hmac.New(fn, saltedPassword)
scram.go#L239: h = hmac.New(fn, serverKey)
scram.go#L252: h = hmac.New(fn, storedKey)
vendor/golang.org/x/crypto/hkdf
hkdf.go#L30: extractor := hmac.New(hash, salt)
hkdf.go#L84: expander := hmac.New(hash, pseudorandomKey)