type hash.Hash

67 uses

	hash (current package)
		hash.go#L26: type Hash interface {
		hash.go#L50: 	Hash
		hash.go#L56: 	Hash

	crypto
		crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {

	crypto/hmac
		hmac.go#L48: 	outer, inner hash.Hash
		hmac.go#L129: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/internal/boring
		notboring.go#L37: func NewSHA1() hash.Hash   { panic("boringcrypto: not available") }
		notboring.go#L38: func NewSHA224() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L39: func NewSHA256() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L40: func NewSHA384() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L41: func NewSHA512() hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L49: func NewHMAC(h func() hash.Hash, key []byte) hash.Hash { panic("boringcrypto: not available") }
		notboring.go#L76: func DecryptRSAOAEP(h, mgfHash hash.Hash, priv *PrivateKeyRSA, ciphertext, label []byte) ([]byte, error) {
		notboring.go#L85: func EncryptRSAOAEP(h, mgfHash hash.Hash, pub *PublicKeyRSA, msg, label []byte) ([]byte, error) {

	crypto/md5
		md5.go#L101: func New() hash.Hash {

	crypto/rsa
		pss.go#L31: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash hash.Hash) ([]byte, error) {
		pss.go#L106: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash hash.Hash) error {
		rsa.go#L454: func mgf1XOR(out []byte, hash hash.Hash, seed []byte) {
		rsa.go#L516: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
		rsa.go#L708: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {
		rsa.go#L712: func decryptOAEP(hash, mgfHash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {

	crypto/sha1
		boring.go#L21: func boringNewSHA1() hash.Hash { return boring.NewSHA1() }
		sha1.go#L109: func New() hash.Hash {

	crypto/sha256
		sha256.go#L150: func New() hash.Hash {
		sha256.go#L160: func New224() hash.Hash {

	crypto/sha512
		sha512.go#L208: func New() hash.Hash {
		sha512.go#L218: func New512_224() hash.Hash {
		sha512.go#L225: func New512_256() hash.Hash {
		sha512.go#L232: func New384() hash.Hash {

	crypto/tls
		auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
		cipher_suites.go#L145: 	mac    func(key []byte) hash.Hash
		cipher_suites.go#L416: func macSHA1(key []byte) hash.Hash {
		cipher_suites.go#L428: func macSHA256(key []byte) hash.Hash {
		cipher_suites.go#L560: 	hash.Hash
		cipher_suites.go#L576: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
		cipher_suites.go#L578: 	return func() hash.Hash {
		cipher_suites.go#L584: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
		conn.go#L173: 	mac     hash.Hash
		conn.go#L179: 	nextMac    hash.Hash // next MAC algorithm
		conn.go#L205: func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
		handshake_client.go#L725: 	var clientHash, serverHash hash.Hash
		handshake_client_tls13.go#L34: 	transcript    hash.Hash
		handshake_server.go#L744: 	var clientHash, serverHash hash.Hash
		handshake_server_tls13.go#L41: 	transcript      hash.Hash
		handshake_server_tls13.go#L397: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
		key_schedule.go#L70: func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
		key_schedule.go#L101: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
		key_schedule.go#L110: func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
		prf.go#L27: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
		prf.go#L67: func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
		prf.go#L169: 	client hash.Hash
		prf.go#L170: 	server hash.Hash
		prf.go#L173: 	clientMD5 hash.Hash
		prf.go#L174: 	serverMD5 hash.Hash

	github.com/gotd/td/internal/crypto
		sha256.go#L25: func getSHA256() hash.Hash {
		sha256.go#L26: 	h := sha256Pool.Get().(hash.Hash)

	golang.org/x/crypto/pbkdf2
		pbkdf2.go#L42: func Key(password, salt []byte, iter, keyLen int, h func() hash.Hash) []byte {

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L26: func Extract(hash func() hash.Hash, secret, salt []byte) []byte {
		hkdf.go#L36: 	expander hash.Hash
		hkdf.go#L83: func Expand(hash func() hash.Hash, pseudorandomKey, info []byte) io.Reader {
		hkdf.go#L90: func New(hash func() hash.Hash, secret, salt, info []byte) io.Reader {