crypto/tls.cipherSuiteTLS13.hash (field)

26 uses

	crypto/tls (current package)
		cipher_suites.go#L197: 	hash   crypto.Hash
		handshake_client.go#L328: 		if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
		handshake_client.go#L344: 	hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
		handshake_client.go#L348: 		session.nonce, cipherSuite.hash.Size())
		handshake_client.go#L351: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L60: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L244: 		if pskSuite.hash == hs.suite.hash {
		handshake_client_tls13.go#L249: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L330: 	if pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L168: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L274: 		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L291: 			nil, hs.suite.hash.Size())
		handshake_server_tls13.go#L295: 		transcript := cloneHash(hs.transcript, hs.suite.hash)
		key_schedule.go#L46: 	n, err := hkdf.Expand(c.hash.New, secret, hkdfLabel.BytesOrPanic()).Read(out)
		key_schedule.go#L56: 		transcript = c.hash.New()
		key_schedule.go#L58: 	return c.expandLabel(secret, label, transcript.Sum(nil), c.hash.Size())
		key_schedule.go#L64: 		newSecret = make([]byte, c.hash.Size())
		key_schedule.go#L66: 	return hkdf.Extract(c.hash.New, newSecret, currentSecret)
		key_schedule.go#L72: 	return c.expandLabel(trafficSecret, trafficUpdateLabel, nil, c.hash.Size())
		key_schedule.go#L86: 	finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
		key_schedule.go#L87: 	verifyData := hmac.New(c.hash.New, finishedKey)
		key_schedule.go#L98: 		h := c.hash.New()