crypto/tls.cipherSuiteTLS13.hash (field)
41 uses
crypto/tls (current package)
cipher_suites.go#L200: hash crypto.Hash
handshake_client.go#L319: transcript := suite.hash.New()
handshake_client.go#L477: if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
handshake_client.go#L510: hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
handshake_client.go#L513: earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
handshake_client.go#L515: transcript := cipherSuite.hash.New()
handshake_client_tls13.go#L66: hs.transcript = hs.suite.hash.New()
handshake_client_tls13.go#L73: hs.echContext.innerTranscript = hs.suite.hash.New()
handshake_client_tls13.go#L89: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L93: h := hs.suite.hash.New
handshake_client_tls13.go#L263: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L268: h := hs.suite.hash.New
handshake_client_tls13.go#L346: if pskSuite.hash == hs.suite.hash {
handshake_client_tls13.go#L351: transcript := hs.suite.hash.New()
handshake_client_tls13.go#L461: if pskSuite.hash != hs.suite.hash {
handshake_client_tls13.go#L512: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_client_tls13.go#L893: psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
handshake_client_tls13.go#L894: msg.nonce, cipherSuite.hash.Size())
handshake_server_tls13.go#L199: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L394: if pskSuite == nil || pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L423: hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
handshake_server_tls13.go#L426: transcript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L448: transcript := hs.suite.hash.New()
handshake_server_tls13.go#L573: confTranscript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L577: h := hs.suite.hash.New
handshake_server_tls13.go#L735: echTranscript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L741: h := hs.suite.hash.New
handshake_server_tls13.go#L765: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_server_tls13.go#L998: psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
handshake_server_tls13.go#L999: nil, suite.hash.Size())
key_schedule.go#L23: return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
key_schedule.go#L28: key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
key_schedule.go#L29: iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
key_schedule.go#L37: finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
key_schedule.go#L38: verifyData := hmac.New(c.hash.New, finishedKey)