type crypto.Hash
45 uses
crypto (current package)
crypto.go#L16: type Hash uint
crypto.go#L19: func (h Hash) HashFunc() Hash {
crypto.go#L23: func (h Hash) String() string {
crypto.go#L69: MD4 Hash = 1 + iota // import golang.org/x/crypto/md4
crypto.go#L116: func (h Hash) Size() int {
crypto.go#L127: func (h Hash) New() hash.Hash {
crypto.go#L138: func (h Hash) Available() bool {
crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
crypto.go#L186: HashFunc() Hash
crypto/ed25519
ed25519.go#L89: if opts.HashFunc() != crypto.Hash(0) {
crypto/rsa
pkcs1v15.go#L207: var hashPrefixes = map[crypto.Hash][]byte{
pkcs1v15.go#L231: func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
pkcs1v15.go#L266: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
pkcs1v15.go#L307: func pkcs1v15HashInfo(hash crypto.Hash, inLen int) (hashLen int, prefix []byte, err error) {
pss.go#L210: func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) ([]byte, error) {
pss.go#L244: Hash crypto.Hash
pss.go#L248: func (opts *PSSOptions) HashFunc() crypto.Hash {
pss.go#L264: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
rsa.go#L69: Hash crypto.Hash
crypto/sha512
sha512.go#L87: function crypto.Hash
crypto/tls
auth.go#L22: func verifyHandshakeSignature(sigType uint8, pubkey crypto.PublicKey, hashFunc crypto.Hash, signed, sig []byte) error {
auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
auth.go#L98: func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
auth.go#L131: func legacyTypeAndHashFromPublicKey(pub crypto.PublicKey) (sigType uint8, hash crypto.Hash, err error) {
cipher_suites.go#L220: hash crypto.Hash
common.go#L174: var directSigning crypto.Hash = 0
handshake_client.go#L596: var sigHash crypto.Hash
handshake_server.go#L620: var sigHash crypto.Hash
handshake_server_tls13.go#L339: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
key_agreement.go#L108: func hashForServerKeyExchange(sigType uint8, hashFunc crypto.Hash, version uint16, slices ...[]byte) []byte {
key_agreement.go#L183: var sigHash crypto.Hash
key_agreement.go#L290: var sigHash crypto.Hash
prf.go#L87: func prfAndHashForVersion(version uint16, suite *cipherSuite) (func(result, secret, label, seed []byte), crypto.Hash) {
prf.go#L90: return prf10, crypto.Hash(0)
prf.go#L218: func (h finishedHash) hashForClientCertificate(sigType uint8, hashAlg crypto.Hash, masterSecret []byte) []byte {
crypto/x509
x509.go#L334: hash crypto.Hash
x509.go#L336: {MD2WithRSA, "MD2-RSA", oidSignatureMD2WithRSA, RSA, crypto.Hash(0) /* no value for MD2 */},
x509.go#L352: {PureEd25519, "Ed25519", oidSignatureEd25519, Ed25519, crypto.Hash(0) /* no pre-hashing */},
x509.go#L362: var hashToPSSParameters = map[crypto.Hash]asn1.RawValue{
x509.go#L813: var hashType crypto.Hash
x509.go#L824: case crypto.Hash(0):
x509.go#L2014: func signingParamsForPublicKey(pub interface{}, requestedSigAlgo SignatureAlgorithm) (hashFunc crypto.Hash, sigAlgo pkix.AlgorithmIdentifier, err error) {
x509.go#L2510: var hashFunc crypto.Hash