crypto/tls.cipherSuiteTLS13.hash (field)

45 uses

	crypto/tls (current package)
		cipher_suites.go#L200: 	hash   crypto.Hash
		handshake_client.go#L331: 		transcript := suite.hash.New()
		handshake_client.go#L484: 		if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
		handshake_client.go#L517: 	hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
		handshake_client.go#L520: 	earlySecret = tls13.NewEarlySecret(cipherSuite.hash.New, session.secret)
		handshake_client.go#L522: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L66: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L73: 		hs.echContext.innerTranscript = hs.suite.hash.New()
		handshake_client_tls13.go#L89: 		confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L93: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L94: 			hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L262: 			confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L267: 			acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L268: 				hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L344: 		if pskSuite.hash == hs.suite.hash {
		handshake_client_tls13.go#L349: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L459: 	if pskSuite.hash != hs.suite.hash {
		handshake_client_tls13.go#L511: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_client_tls13.go#L884: 	psk := tls13.ExpandLabel(cipherSuite.hash.New, c.resumptionSecret, "resumption",
		handshake_client_tls13.go#L885: 		msg.nonce, cipherSuite.hash.Size())
		handshake_server_tls13.go#L197: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L392: 		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L421: 		hs.earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, sessionState.secret)
		handshake_server_tls13.go#L424: 		transcript := cloneHash(hs.transcript, hs.suite.hash)
		handshake_server_tls13.go#L446: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L571: 		confTranscript := cloneHash(hs.transcript, hs.suite.hash)
		handshake_server_tls13.go#L575: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_server_tls13.go#L576: 			hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
		handshake_server_tls13.go#L732: 		echTranscript := cloneHash(hs.transcript, hs.suite.hash)
		handshake_server_tls13.go#L738: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_server_tls13.go#L739: 			hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
		handshake_server_tls13.go#L761: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_server_tls13.go#L986: 	psk := tls13.ExpandLabel(suite.hash.New, c.resumptionSecret, "resumption",
		handshake_server_tls13.go#L987: 		nil, suite.hash.Size())
		key_schedule.go#L23: 	return tls13.ExpandLabel(c.hash.New, trafficSecret, "traffic upd", nil, c.hash.Size())
		key_schedule.go#L28: 	key = tls13.ExpandLabel(c.hash.New, trafficSecret, "key", nil, c.keyLen)
		key_schedule.go#L29: 	iv = tls13.ExpandLabel(c.hash.New, trafficSecret, "iv", nil, aeadNonceLength)
		key_schedule.go#L37: 	finishedKey := tls13.ExpandLabel(c.hash.New, baseKey, "finished", nil, c.hash.Size())
		key_schedule.go#L38: 	verifyData := hmac.New(c.hash.New, finishedKey)