type hash.Hash
67 uses
hash (current package)
hash.go#L26: type Hash interface {
hash.go#L50: Hash
hash.go#L56: Hash
crypto
crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
crypto/hmac
hmac.go#L48: outer, inner hash.Hash
hmac.go#L129: func New(h func() hash.Hash, key []byte) hash.Hash {
crypto/internal/boring
notboring.go#L37: func NewSHA1() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
notboring.go#L76: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
notboring.go#L85: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {
crypto/md5
md5.go#L101: func New() hash.Hash {
crypto/rsa
pss.go#L31: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash hash.Hash) ([]byte, error) {
pss.go#L106: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash hash.Hash) error {
rsa.go#L454: func mgf1XOR(out []byte, hash hash.Hash, seed []byte) {
rsa.go#L516: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
rsa.go#L708: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
rsa.go#L712: func decryptOAEP(hash, mgfHash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
crypto/sha1
boring.go#L21: func boringNewSHA1() hash.Hash { return boring.NewSHA1() }
sha1.go#L109: func New() hash.Hash {
crypto/sha256
sha256.go#L150: func New() hash.Hash {
sha256.go#L160: func New224() hash.Hash {
crypto/sha512
sha512.go#L208: func New() hash.Hash {
sha512.go#L218: func New512_224() hash.Hash {
sha512.go#L225: func New512_256() hash.Hash {
sha512.go#L232: func New384() hash.Hash {
crypto/tls
auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
cipher_suites.go#L145: mac func(key []byte) hash.Hash
cipher_suites.go#L416: func macSHA1(key []byte) hash.Hash {
cipher_suites.go#L428: func macSHA256(key []byte) hash.Hash {
cipher_suites.go#L560: hash.Hash
cipher_suites.go#L576: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
cipher_suites.go#L578: return func() hash.Hash {
cipher_suites.go#L584: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
conn.go#L173: mac hash.Hash
conn.go#L179: nextMac hash.Hash // next MAC algorithm
conn.go#L205: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
handshake_client.go#L725: var clientHash, serverHash hash.Hash
handshake_client_tls13.go#L34: transcript hash.Hash
handshake_server.go#L744: var clientHash, serverHash hash.Hash
handshake_server_tls13.go#L41: transcript hash.Hash
handshake_server_tls13.go#L397: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
key_schedule.go#L70: func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
key_schedule.go#L101: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
key_schedule.go#L110: func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
prf.go#L27: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
prf.go#L67: func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
prf.go#L169: client hash.Hash
prf.go#L170: server hash.Hash
prf.go#L173: clientMD5 hash.Hash
prf.go#L174: serverMD5 hash.Hash
github.com/gotd/td/internal/crypto
sha256.go#L25: func getSHA256() hash.Hash {
sha256.go#L26: h := sha256Pool.Get().(hash.Hash)
golang.org/x/crypto/pbkdf2
pbkdf2.go#L42: func Key(password, salt []byte, iter, keyLen int, h func() hash.Hash) []byte {
vendor/golang.org/x/crypto/hkdf
hkdf.go#L26: func Extract(hash func() hash.Hash, secret, salt []byte) []byte {
hkdf.go#L36: expander hash.Hash
hkdf.go#L83: func Expand(hash func() hash.Hash, pseudorandomKey, info []byte) io.Reader {
hkdf.go#L90: func New(hash func() hash.Hash, secret, salt, info []byte) io.Reader {
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |