func crypto/hmac.New

24 uses

	crypto/hmac (current package)
		hmac.go#L128: func New(h func() hash.Hash, key []byte) hash.Hash {

	crypto/tls
		cipher_suites.go#L252: 	return hmac.New(newConstantTimeHash(sha1.New), key)
		cipher_suites.go#L258: 	return hmac.New(sha256.New, key)
		key_schedule.go#L87: 	verifyData := hmac.New(c.hash.New, finishedKey)
		prf.go#L28: 	h := hmac.New(hash, secret)
		ticket.go#L140: 	mac := hmac.New(sha256.New, key.hmacKey[:])
		ticket.go#L169: 	mac := hmac.New(sha256.New, key.hmacKey[:])

	github.com/aws/aws-sdk-go/aws/signer/v4
		v4.go#L745: 	hash := hmac.New(sha256.New, key)

	github.com/jackc/pgconn
		auth_scram.go#L240: 	mac := hmac.New(sha256.New, key)

	github.com/lib/pq/scram
		scram.go#L217: 	mac := hmac.New(c.newHash, []byte(c.pass))
		scram.go#L235: 	mac := hmac.New(c.newHash, c.saltedPass)
		scram.go#L241: 	mac = hmac.New(c.newHash, storedKey)
		scram.go#L253: 	mac := hmac.New(c.newHash, c.saltedPass)
		scram.go#L257: 	mac = hmac.New(c.newHash, serverKey)

	golang.org/x/crypto/pbkdf2
		pbkdf2.go#L43: 	prf := hmac.New(h, password)

	golang.org/x/crypto/ssh
		mac.go#L50: 		return hmac.New(sha256.New, key)
		mac.go#L53: 		return hmac.New(sha256.New, key)
		mac.go#L56: 		return hmac.New(sha1.New, key)
		mac.go#L59: 		return truncatingMAC{12, hmac.New(sha1.New, key)}

	golang.org/x/crypto/ssh/knownhosts
		knownhosts.go#L510: 	mac := hmac.New(sha1.New, salt)

	golang.org/x/pkgsite/internal/middleware
		quota.go#L114: 	mac := hmac.New(sha256.New, hmacKey)

	google.golang.org/grpc/credentials/alts/internal/conn
		aeadrekey.go#L127: 	mac := hmac.New(sha256.New, key)

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L30: 	extractor := hmac.New(hash, salt)
		hkdf.go#L84: 	expander := hmac.New(hash, pseudorandomKey)