type crypto.Hash

45 uses

	crypto (current package)
		crypto.go#L16: type Hash uint
		crypto.go#L19: func (h Hash) HashFunc() Hash {
		crypto.go#L23: func (h Hash) String() string {
		crypto.go#L69: 	MD4         Hash = 1 + iota // import golang.org/x/crypto/md4
		crypto.go#L116: func (h Hash) Size() int {
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L138: func (h Hash) Available() bool {
		crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {
		crypto.go#L186: 	HashFunc() Hash

	crypto/ed25519
		ed25519.go#L89: 	if opts.HashFunc() != crypto.Hash(0) {

	crypto/rsa
		pkcs1v15.go#L207: var hashPrefixes = map[crypto.Hash][]byte{
		pkcs1v15.go#L231: func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
		pkcs1v15.go#L266: func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
		pkcs1v15.go#L307: func pkcs1v15HashInfo(hash crypto.Hash, inLen int) (hashLen int, prefix []byte, err error) {
		pss.go#L210: func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) ([]byte, error) {
		pss.go#L244: 	Hash crypto.Hash
		pss.go#L248: func (opts *PSSOptions) HashFunc() crypto.Hash {
		pss.go#L264: func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, digest []byte, opts *PSSOptions) ([]byte, error) {
		pss.go#L290: func VerifyPSS(pub *PublicKey, hash crypto.Hash, digest []byte, sig []byte, opts *PSSOptions) error {
		rsa.go#L69: 	Hash crypto.Hash

	crypto/sha512
		sha512.go#L87: 	function crypto.Hash

	crypto/tls
		auth.go#L22: func verifyHandshakeSignature(sigType uint8, pubkey crypto.PublicKey, hashFunc crypto.Hash, signed, sig []byte) error {
		auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
		auth.go#L98: func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
		auth.go#L131: func legacyTypeAndHashFromPublicKey(pub crypto.PublicKey) (sigType uint8, hash crypto.Hash, err error) {
		cipher_suites.go#L220: 	hash   crypto.Hash
		common.go#L174: var directSigning crypto.Hash = 0
		handshake_client.go#L596: 		var sigHash crypto.Hash
		handshake_server.go#L620: 		var sigHash crypto.Hash
		handshake_server_tls13.go#L339: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
		key_agreement.go#L108: func hashForServerKeyExchange(sigType uint8, hashFunc crypto.Hash, version uint16, slices ...[]byte) []byte {
		key_agreement.go#L183: 	var sigHash crypto.Hash
		key_agreement.go#L290: 	var sigHash crypto.Hash
		prf.go#L87: func prfAndHashForVersion(version uint16, suite *cipherSuite) (func(result, secret, label, seed []byte), crypto.Hash) {
		prf.go#L90: 		return prf10, crypto.Hash(0)
		prf.go#L218: func (h finishedHash) hashForClientCertificate(sigType uint8, hashAlg crypto.Hash, masterSecret []byte) []byte {

	crypto/x509
		x509.go#L334: 	hash       crypto.Hash
		x509.go#L336: 	{MD2WithRSA, "MD2-RSA", oidSignatureMD2WithRSA, RSA, crypto.Hash(0) /* no value for MD2 */},
		x509.go#L352: 	{PureEd25519, "Ed25519", oidSignatureEd25519, Ed25519, crypto.Hash(0) /* no pre-hashing */},
		x509.go#L362: var hashToPSSParameters = map[crypto.Hash]asn1.RawValue{
		x509.go#L813: 	var hashType crypto.Hash
		x509.go#L824: 	case crypto.Hash(0):
		x509.go#L2014: func signingParamsForPublicKey(pub interface{}, requestedSigAlgo SignatureAlgorithm) (hashFunc crypto.Hash, sigAlgo pkix.AlgorithmIdentifier, err error) {
		x509.go#L2510: 	var hashFunc crypto.Hash