crypto.Hash.New (method)

29 uses

	crypto (current package)
		crypto.go#L127: func (h Hash) New() hash.Hash {

	crypto/rsa
		pss.go#L212: 	em, err := emsaPSSEncode(hashed, emBits, salt, hash.New())
		pss.go#L381: 	return emsaPSSVerify(digest, em, emBits, opts.saltLength(), hash.New())
		rsa.go#L179: 			return decryptOAEP(opts.Hash.New(), opts.Hash.New(), rand, priv, ciphertext, opts.Label)
		rsa.go#L181: 			return decryptOAEP(opts.Hash.New(), opts.MGFHash.New(), rand, priv, ciphertext, opts.Label)

	crypto/tls
		auth.go#L89: 	h := sigHash.New()
		handshake_client.go#L214: 		transcript := suite.hash.New()
		handshake_client.go#L403: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L64: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L263: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L178: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L371: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L411: 	out := h.New()
		key_agreement.go#L141: 		h := hashFunc.New()
		key_schedule.go#L62: 	n, err := hkdf.Expand(c.hash.New, secret, hkdfLabelBytes).Read(out)
		key_schedule.go#L72: 		transcript = c.hash.New()
		key_schedule.go#L82: 	return hkdf.Extract(c.hash.New, newSecret, currentSecret)
		key_schedule.go#L103: 	verifyData := hmac.New(c.hash.New, finishedKey)
		key_schedule.go#L114: 		h := c.hash.New()
		prf.go#L160: 		return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
		prf.go#L237: 		hash := hashAlg.New()

	crypto/x509
		x509.go#L907: 		h := hashType.New()
		x509.go#L1634: 		h := hashFunc.New()
		x509.go#L1756: 		h := hashFunc.New()
		x509.go#L2067: 		h := hashFunc.New()
		x509.go#L2430: 		h := hashFunc.New()