type hash.Hash
82 uses
hash (current package)
hash.go#L26: type Hash interface {
hash.go#L50: Hash
hash.go#L56: Hash
hash/fnv
fnv.go#L72: func New128() hash.Hash {
fnv.go#L81: func New128a() hash.Hash {
crypto
crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
crypto/hmac
hmac.go#L39: func New(h func() hash.Hash, key []byte) hash.Hash {
crypto/internal/boring
notboring.go#L37: func NewSHA1() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
notboring.go#L77: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
notboring.go#L86: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {
crypto/internal/fips140hash
hash.go#L23: func Unwrap(h hash.Hash) hash.Hash {
hash.go#L32: func UnwrapNew[Hash hash.Hash](newHash func() Hash) func() hash.Hash {
hash.go#L33: return func() hash.Hash { return Unwrap(newHash()) }
crypto/internal/fips140only
fips140only.go#L21: func ApprovedHash(h hash.Hash) bool {
crypto/md5
md5.go#L106: func New() hash.Hash {
crypto/rsa
fips.go#L193: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
fips.go#L243: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
fips.go#L248: func decryptOAEP(hash, mgfHash hash.Hash, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
crypto/sha1
sha1.go#L110: func New() hash.Hash {
crypto/sha256
sha256.go#L34: func New() hash.Hash {
sha256.go#L45: func New224() hash.Hash {
crypto/sha3
sha3.go#L17: crypto.RegisterHash(crypto.SHA3_224, func() hash.Hash { return New224() })
sha3.go#L18: crypto.RegisterHash(crypto.SHA3_256, func() hash.Hash { return New256() })
sha3.go#L19: crypto.RegisterHash(crypto.SHA3_384, func() hash.Hash { return New384() })
sha3.go#L20: crypto.RegisterHash(crypto.SHA3_512, func() hash.Hash { return New512() })
crypto/sha512
sha512.go#L49: func New() hash.Hash {
sha512.go#L60: func New512_224() hash.Hash {
sha512.go#L68: func New512_256() hash.Hash {
sha512.go#L76: func New384() hash.Hash {
crypto/tls
auth.go#L82: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
cipher_suites.go#L147: mac func(key []byte) hash.Hash
cipher_suites.go#L426: func macSHA1(key []byte) hash.Hash {
cipher_suites.go#L438: func macSHA256(key []byte) hash.Hash {
cipher_suites.go#L586: hash.Hash
cipher_suites.go#L602: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
cipher_suites.go#L604: return func() hash.Hash {
cipher_suites.go#L610: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
conn.go#L177: mac hash.Hash
conn.go#L183: nextMac hash.Hash // next MAC algorithm
conn.go#L209: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
handshake_client.go#L259: innerTranscript hash.Hash
handshake_client.go#L850: var clientHash, serverHash hash.Hash
handshake_client.go#L1300: func computeAndUpdatePSK(m *clientHelloMsg, binderKey []byte, transcript hash.Hash, finishedHash func([]byte, hash.Hash) []byte) error {
handshake_client_tls13.go#L38: transcript hash.Hash
handshake_server.go#L786: var clientHash, serverHash hash.Hash
handshake_server_tls13.go#L36: transcript hash.Hash
handshake_server_tls13.go#L60: transcript hash.Hash
handshake_server_tls13.go#L472: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
key_schedule.go#L36: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
key_schedule.go#L45: func (c *cipherSuiteTLS13) exportKeyingMaterial(s *tls13.MasterSecret, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
prf.go#L30: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
prf.go#L73: func prf12(hashFunc func() hash.Hash) prfFunc {
prf.go#L172: client hash.Hash
prf.go#L173: server hash.Hash
prf.go#L176: clientMD5 hash.Hash
prf.go#L177: serverMD5 hash.Hash
go.pact.im/x/extraio
hash.go#L11: h hash.Hash
hash.go#L19: func NewStrippedHashReader(h hash.Hash, n int64) io.Reader {
hash.go#L24: func NewHashReader(h hash.Hash) *HashReader {
hash.go#L33: func (r *HashReader) Hash() hash.Hash {
golang.org/x/crypto/argon2
blake2b.go#L17: var b2 hash.Hash
golang.org/x/crypto/blake2b
blake2b.go#L81: func New512(key []byte) (hash.Hash, error) { return newDigest(Size, key) }
blake2b.go#L85: func New384(key []byte) (hash.Hash, error) { return newDigest(Size384, key) }
blake2b.go#L89: func New256(key []byte) (hash.Hash, error) { return newDigest(Size256, key) }
blake2b.go#L99: func New(size int, key []byte) (hash.Hash, error) { return newDigest(size, key) }
register.go#L13: newHash256 := func() hash.Hash {
register.go#L17: newHash384 := func() hash.Hash {
register.go#L22: newHash512 := func() hash.Hash {