type hash.Hash

55 uses

	hash (current package)
		hash.go#L26: type Hash interface {
		hash.go#L50: 	Hash
		hash.go#L56: 	Hash

	hash/fnv
		fnv.go#L71: func New128() hash.Hash {
		fnv.go#L80: func New128a() hash.Hash {

	crypto
		crypto.go#L123: var hashes = make([]func() hash.Hash, maxHash)
		crypto.go#L127: func (h Hash) New() hash.Hash {
		crypto.go#L145: func RegisterHash(h Hash, f func() hash.Hash) {

	crypto/hmac
		hmac.go#L47: 	outer, inner hash.Hash
		hmac.go#L128: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/md5
		md5.go#L113: func New() hash.Hash {

	crypto/rsa
		pss.go#L31: func emsaPSSEncode(mHash []byte, emBits int, salt []byte, hash hash.Hash) ([]byte, error) {
		pss.go#L106: func emsaPSSVerify(mHash, em []byte, emBits, sLen int, hash hash.Hash) error {
		rsa.go#L364: func mgf1XOR(out []byte, hash hash.Hash, seed []byte) {
		rsa.go#L410: func EncryptOAEP(hash hash.Hash, random io.Reader, pub *PublicKey, msg []byte, label []byte) ([]byte, error) {
		rsa.go#L596: func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) ([]byte, error) {

	crypto/sha1
		sha1.go#L121: func New() hash.Hash {

	crypto/sha256
		sha256.go#L161: func New() hash.Hash {
		sha256.go#L168: func New224() hash.Hash {

	crypto/sha512
		sha512.go#L213: func New() hash.Hash {
		sha512.go#L220: func New512_224() hash.Hash {
		sha512.go#L227: func New512_256() hash.Hash {
		sha512.go#L234: func New384() hash.Hash {

	crypto/tls
		auth.go#L81: func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
		cipher_suites.go#L163: 	mac    func(key []byte) hash.Hash
		cipher_suites.go#L251: func macSHA1(key []byte) hash.Hash {
		cipher_suites.go#L257: func macSHA256(key []byte) hash.Hash {
		cipher_suites.go#L383: 	hash.Hash
		cipher_suites.go#L399: func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
		cipher_suites.go#L400: 	return func() hash.Hash {
		cipher_suites.go#L406: func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
		conn.go#L161: 	mac     hash.Hash
		conn.go#L167: 	nextMac    hash.Hash   // next MAC algorithm
		conn.go#L192: func (hc *halfConn) prepareCipherSpec(version uint16, cipher interface{}, mac hash.Hash) {
		handshake_client.go#L651: 	var clientHash, serverHash hash.Hash
		handshake_client_tls13.go#L32: 	transcript    hash.Hash
		handshake_server.go#L659: 	var clientHash, serverHash hash.Hash
		handshake_server_tls13.go#L38: 	transcript      hash.Hash
		handshake_server_tls13.go#L339: func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
		key_schedule.go#L54: func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
		key_schedule.go#L85: func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
		key_schedule.go#L94: func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
		prf.go#L27: func pHash(result, secret, seed []byte, hash func() hash.Hash) {
		prf.go#L67: func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
		prf.go#L160: 	client hash.Hash
		prf.go#L161: 	server hash.Hash
		prf.go#L164: 	clientMD5 hash.Hash
		prf.go#L165: 	serverMD5 hash.Hash

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L26: func Extract(hash func() hash.Hash, secret, salt []byte) []byte {
		hkdf.go#L36: 	expander hash.Hash
		hkdf.go#L83: func Expand(hash func() hash.Hash, pseudorandomKey, info []byte) io.Reader {
		hkdf.go#L90: func New(hash func() hash.Hash, secret, salt, info []byte) io.Reader {