func crypto/hmac.New

16 uses

	crypto/hmac (current package)
		hmac.go#L128: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/tls
		cipher_suites.go#L425: 	return hmac.New(newConstantTimeHash(sha1.New), key)
		cipher_suites.go#L431: 	return hmac.New(sha256.New, key)
		key_schedule.go#L87: 	verifyData := hmac.New(c.hash.New, finishedKey)
		prf.go#L28: 	h := hmac.New(hash, secret)
		ticket.go#L140: 	mac := hmac.New(sha256.New, key.hmacKey[:])
		ticket.go#L169: 	mac := hmac.New(sha256.New, key.hmacKey[:])

	github.com/aws/aws-sdk-go-v2/aws/signer/internal/v4
		hmac.go#L10: 	hash := hmac.New(sha256.New, key)

	github.com/aws/aws-sdk-go-v2/internal/v4a/internal/crypto
		ecc.go#L98: 	h := hmac.New(hash, key)

	github.com/aws/aws-sdk-go-v2/internal/v4a/internal/v4
		hmac.go#L10: 	hash := hmac.New(sha256.New, key)

	golang.org/x/crypto/pbkdf2
		pbkdf2.go#L43: 	prf := hmac.New(h, password)

	mellium.im/sasl
		scram.go#L225: 		h := hmac.New(fn, saltedPassword)
		scram.go#L239: 		h = hmac.New(fn, serverKey)
		scram.go#L252: 		h = hmac.New(fn, storedKey)

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L30: 	extractor := hmac.New(hash, salt)
		hkdf.go#L84: 	expander := hmac.New(hash, pseudorandomKey)