crypto/tls.cipherSuiteTLS13.hash (field)
45 uses
crypto/tls (current package)
cipher_suites.go#L200: hash crypto.Hash
handshake_client.go#L331: transcript := suite.hash.New()
handshake_client.go#L484: if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
handshake_client.go#L517: hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
handshake_client.go#L520: earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
handshake_client.go#L522: transcript := cipherSuite.hash.New()
handshake_client_tls13.go#L66: hs.transcript = hs.suite.hash.New()
handshake_client_tls13.go#L73: hs.echContext.innerTranscript = hs.suite.hash.New()
handshake_client_tls13.go#L89: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L93: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_client_tls13.go#L94: hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L262: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L267: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_client_tls13.go#L268: hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L344: if pskSuite.hash == hs.suite.hash {
handshake_client_tls13.go#L349: transcript := hs.suite.hash.New()
handshake_client_tls13.go#L459: if pskSuite.hash != hs.suite.hash {
handshake_client_tls13.go#L511: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_client_tls13.go#L884: psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
handshake_client_tls13.go#L885: msg.nonce, cipherSuite.hash.Size())
handshake_server_tls13.go#L197: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L392: if pskSuite == nil || pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L421: hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
handshake_server_tls13.go#L424: transcript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L446: transcript := hs.suite.hash.New()
handshake_server_tls13.go#L571: confTranscript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L575: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_server_tls13.go#L576: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L732: echTranscript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L738: acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
handshake_server_tls13.go#L739: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L761: earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
handshake_server_tls13.go#L986: psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
handshake_server_tls13.go#L987: nil, suite.hash.Size())
key_schedule.go#L23: return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
key_schedule.go#L28: key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
key_schedule.go#L29: iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
key_schedule.go#L37: finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
key_schedule.go#L38: verifyData := hmac.New(c.hash.New, finishedKey)