crypto/tls.cipherSuiteTLS13.hash (field)
26 uses
crypto/tls (current package)
cipher_suites.go#L197: hash crypto.Hash
handshake_client.go#L328: if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
handshake_client.go#L344: hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
handshake_client.go#L348: session.nonce, cipherSuite.hash.Size())
handshake_client.go#L351: transcript := cipherSuite.hash.New()
handshake_client_tls13.go#L60: hs.transcript = hs.suite.hash.New()
handshake_client_tls13.go#L244: if pskSuite.hash == hs.suite.hash {
handshake_client_tls13.go#L249: transcript := hs.suite.hash.New()
handshake_client_tls13.go#L330: if pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L168: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L274: if pskSuite == nil || pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L291: nil, hs.suite.hash.Size())
handshake_server_tls13.go#L295: transcript := cloneHash(hs.transcript, hs.suite.hash)
key_schedule.go#L46: n, err := hkdf.Expand(c.hash.New, secret, hkdfLabel.BytesOrPanic()).Read(out)
key_schedule.go#L56: transcript = c.hash.New()
key_schedule.go#L58: return c.expandLabel(secret, label, transcript.Sum(nil), c.hash.Size())
key_schedule.go#L64: newSecret = make([]byte, c.hash.Size())
key_schedule.go#L66: return hkdf.Extract(c.hash.New, newSecret, currentSecret)
key_schedule.go#L72: return c.expandLabel(trafficSecret, trafficUpdateLabel, nil, c.hash.Size())
key_schedule.go#L86: finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
key_schedule.go#L87: verifyData := hmac.New(c.hash.New, finishedKey)
key_schedule.go#L98: h := c.hash.New()