type crypto/internal/fips140.Hash
42 uses
crypto/internal/fips140 (current package)
hash.go#L12: type Hash interface {
crypto/internal/fips140/ecdsa
ecdsa.go#L274: func Sign[P Point[P], H fips140.Hash](c *Curve[P], h func() H, priv *PrivateKey, rand io.Reader, hash []byte) (*Signature, error) {
ecdsa.go#L307: func SignDeterministic[P Point[P], H fips140.Hash](c *Curve[P], h func() H, priv *PrivateKey, hash []byte) (*Signature, error) {
hmacdrbg.go#L51: func newDRBG[H fips140.Hash](hash func() H, entropy, nonce []byte, s personalizationString) *hmacDRBG {
hmacdrbg.go#L124: func TestingOnlyNewDRBG(hash func() fips140.Hash, entropy, nonce []byte, s []byte) *hmacDRBG {
crypto/internal/fips140/hkdf
hkdf.go#L12: func Extract[H fips140.Hash](h func() H, secret, salt []byte) []byte {
hkdf.go#L26: func Expand[H fips140.Hash](h func() H, pseudorandomKey []byte, info string, keyLen int) []byte {
hkdf.go#L53: func Key[H fips140.Hash](h func() H, secret, salt []byte, info string, keyLen int) []byte {
crypto/internal/fips140/hmac
hmac.go#L32: outer, inner fips140.Hash
hmac.go#L131: func New[H fips140.Hash](h func() H, key []byte) *HMAC {
crypto/internal/fips140/rsa
pkcs1v22.go#L51: func mgf1XOR(out []byte, hash fips140.Hash, seed []byte) {
pkcs1v22.go#L70: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash fips140.Hash) ([]byte, error) {
pkcs1v22.go#L147: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash fips140.Hash) error {
pkcs1v22.go#L253: func PSSMaxSaltLength(pub *PublicKey, hash fips140.Hash) (int, error) {
pkcs1v22.go#L267: func SignPSS(rand io.Reader, priv *PrivateKey, hash fips140.Hash, hashed []byte, saltLength int) ([]byte, error) {
pkcs1v22.go#L314: func VerifyPSS(pub *PublicKey, hash fips140.Hash, digest []byte, sig []byte) error {
pkcs1v22.go#L319: func VerifyPSSWithSaltLength(pub *PublicKey, hash fips140.Hash, digest []byte, sig []byte, saltLength int) error {
pkcs1v22.go#L326: func verifyPSS(pub *PublicKey, hash fips140.Hash, digest []byte, sig []byte, saltLength int) error {
pkcs1v22.go#L362: func checkApprovedHash(hash fips140.Hash) {
pkcs1v22.go#L371: func EncryptOAEP(hash, mgfHash fips140.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
pkcs1v22.go#L414: func DecryptOAEP(hash, mgfHash fips140.Hash, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
crypto/internal/fips140/tls12
tls12.go#L16: func PRF[H fips140.Hash](hash func() H, secret []byte, label string, seed []byte, keyLen int) []byte {
tls12.go#L27: func pHash[H fips140.Hash](hash func() H, result, secret, seed []byte) {
tls12.go#L51: func MasterSecret[H fips140.Hash](hash func() H, preMasterSecret, transcript []byte) []byte {
crypto/internal/fips140/tls13
tls13.go#L20: func ExpandLabel[H fips140.Hash](hash func() H, secret []byte, label string, context []byte, length int) []byte {
tls13.go#L42: func extract[H fips140.Hash](hash func() H, newSecret, currentSecret []byte) []byte {
tls13.go#L49: func deriveSecret[H fips140.Hash](hash func() H, secret []byte, label string, transcript fips140.Hash) []byte {
tls13.go#L70: hash func() fips140.Hash
tls13.go#L73: func NewEarlySecret[H fips140.Hash](hash func() H, psk []byte) *EarlySecret {
tls13.go#L76: hash: func() fips140.Hash { return hash() },
tls13.go#L86: func (s *EarlySecret) ClientEarlyTrafficSecret(transcript fips140.Hash) []byte {
tls13.go#L92: hash func() fips140.Hash
tls13.go#L105: func (s *HandshakeSecret) ClientHandshakeTrafficSecret(transcript fips140.Hash) []byte {
tls13.go#L111: func (s *HandshakeSecret) ServerHandshakeTrafficSecret(transcript fips140.Hash) []byte {
tls13.go#L117: hash func() fips140.Hash
tls13.go#L130: func (s *MasterSecret) ClientApplicationTrafficSecret(transcript fips140.Hash) []byte {
tls13.go#L136: func (s *MasterSecret) ServerApplicationTrafficSecret(transcript fips140.Hash) []byte {
tls13.go#L142: func (s *MasterSecret) ResumptionMasterSecret(transcript fips140.Hash) []byte {
tls13.go#L148: hash func() fips140.Hash
tls13.go#L153: func (s *MasterSecret) ExporterMasterSecret(transcript fips140.Hash) *ExporterMasterSecret {
tls13.go#L162: func (s *EarlySecret) EarlyExporterMasterSecret(transcript fips140.Hash) *ExporterMasterSecret {