type hash.Hash

82 uses

	hash (current package)
		hash.go#L26: type Hash interface {
		hash.go#L50: 	Hash
		hash.go#L56: 	Hash

	hash/fnv
		fnv.go#L72: func New128() hash.Hash {
		fnv.go#L81: func New128a() hash.Hash {

	crypto
		crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {

	crypto/hmac
		hmac.go#L39: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/internal/boring
		notboring.go#L37: func NewSHA1() hash.Hash   { panic("boringcrypto: not available") }
		notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L77: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
		notboring.go#L86: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {

	crypto/internal/fips140hash
		hash.go#L23: func Unwrap(h hash.Hash) hash.Hash {
		hash.go#L32: func UnwrapNew[Hash hash.Hash](newHash func() Hash) func() hash.Hash {
		hash.go#L33: 	return func() hash.Hash { return Unwrap(newHash()) }

	crypto/internal/fips140only
		fips140only.go#L21: func ApprovedHash(h hash.Hash) bool {

	crypto/md5
		md5.go#L106: func New() hash.Hash {

	crypto/rsa
		fips.go#L193: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
		fips.go#L243: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
		fips.go#L248: func decryptOAEP(hash, mgfHash hash.Hash, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {

	crypto/sha1
		sha1.go#L110: func New() hash.Hash {

	crypto/sha256
		sha256.go#L34: func New() hash.Hash {
		sha256.go#L45: func New224() hash.Hash {

	crypto/sha3
		sha3.go#L17: 	crypto.RegisterHash(crypto.SHA3_224, func() hash.Hash { return New224() })
		sha3.go#L18: 	crypto.RegisterHash(crypto.SHA3_256, func() hash.Hash { return New256() })
		sha3.go#L19: 	crypto.RegisterHash(crypto.SHA3_384, func() hash.Hash { return New384() })
		sha3.go#L20: 	crypto.RegisterHash(crypto.SHA3_512, func() hash.Hash { return New512() })

	crypto/sha512
		sha512.go#L49: func New() hash.Hash {
		sha512.go#L60: func New512_224() hash.Hash {
		sha512.go#L68: func New512_256() hash.Hash {
		sha512.go#L76: func New384() hash.Hash {

	crypto/tls
		auth.go#L82: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
		cipher_suites.go#L147: 	mac    func(key []byte) hash.Hash
		cipher_suites.go#L426: func macSHA1(key []byte) hash.Hash {
		cipher_suites.go#L438: func macSHA256(key []byte) hash.Hash {
		cipher_suites.go#L586: 	hash.Hash
		cipher_suites.go#L602: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
		cipher_suites.go#L604: 	return func() hash.Hash {
		cipher_suites.go#L610: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
		conn.go#L177: 	mac     hash.Hash
		conn.go#L183: 	nextMac    hash.Hash // next MAC algorithm
		conn.go#L209: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
		handshake_client.go#L259: 	innerTranscript hash.Hash
		handshake_client.go#L850: 	var clientHash, serverHash hash.Hash
		handshake_client.go#L1300: func computeAndUpdatePSK(m *clientHelloMsg, binderKey []byte, transcript hash.Hash, finishedHash func([]byte, hash.Hash) []byte) error {
		handshake_client_tls13.go#L38: 	transcript    hash.Hash
		handshake_server.go#L786: 	var clientHash, serverHash hash.Hash
		handshake_server_tls13.go#L36: 	transcript  hash.Hash
		handshake_server_tls13.go#L60: 	transcript      hash.Hash
		handshake_server_tls13.go#L472: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
		key_schedule.go#L36: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
		key_schedule.go#L45: func (c *cipherSuiteTLS13) exportKeyingMaterial(s *tls13.MasterSecret, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
		prf.go#L30: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
		prf.go#L73: func prf12(hashFunc func() hash.Hash) prfFunc {
		prf.go#L172: 	client hash.Hash
		prf.go#L173: 	server hash.Hash
		prf.go#L176: 	clientMD5 hash.Hash
		prf.go#L177: 	serverMD5 hash.Hash

	go.pact.im/x/extraio
		hash.go#L11: 	h hash.Hash
		hash.go#L19: func NewStrippedHashReader(h hash.Hash, n int64) io.Reader {
		hash.go#L24: func NewHashReader(h hash.Hash) *HashReader {
		hash.go#L33: func (r *HashReader) Hash() hash.Hash {

	golang.org/x/crypto/argon2
		blake2b.go#L17: 	var b2 hash.Hash

	golang.org/x/crypto/blake2b
		blake2b.go#L81: func New512(key []byte) (hash.Hash, error) { return newDigest(Size, key) }
		blake2b.go#L85: func New384(key []byte) (hash.Hash, error) { return newDigest(Size384, key) }
		blake2b.go#L89: func New256(key []byte) (hash.Hash, error) { return newDigest(Size256, key) }
		blake2b.go#L99: func New(size int, key []byte) (hash.Hash, error) { return newDigest(size, key) }
		register.go#L13: 	newHash256 := func() hash.Hash {
		register.go#L17: 	newHash384 := func() hash.Hash {
		register.go#L22: 	newHash512 := func() hash.Hash {