crypto/tls.cipherSuiteTLS13.hash (field)

26 uses

	crypto/tls (current package)
		cipher_suites.go#L220: 	hash   crypto.Hash
		handshake_client.go#L318: 		if offeredSuite != nil && offeredSuite.hash == cipherSuite.hash {
		handshake_client.go#L334: 	hello.pskBinders = [][]byte{make([]byte, cipherSuite.hash.Size())}
		handshake_client.go#L338: 		session.nonce, cipherSuite.hash.Size())
		handshake_client.go#L341: 	transcript := cipherSuite.hash.New()
		handshake_client_tls13.go#L58: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L242: 		if pskSuite.hash == hs.suite.hash {
		handshake_client_tls13.go#L247: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L328: 	if pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L183: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L289: 		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L306: 			nil, hs.suite.hash.Size())
		handshake_server_tls13.go#L310: 		transcript := cloneHash(hs.transcript, hs.suite.hash)
		key_schedule.go#L46: 	n, err := hkdf.Expand(c.hash.New, secret, hkdfLabel.BytesOrPanic()).Read(out)
		key_schedule.go#L56: 		transcript = c.hash.New()
		key_schedule.go#L58: 	return c.expandLabel(secret, label, transcript.Sum(nil), c.hash.Size())
		key_schedule.go#L64: 		newSecret = make([]byte, c.hash.Size())
		key_schedule.go#L66: 	return hkdf.Extract(c.hash.New, newSecret, currentSecret)
		key_schedule.go#L72: 	return c.expandLabel(trafficSecret, trafficUpdateLabel, nil, c.hash.Size())
		key_schedule.go#L86: 	finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
		key_schedule.go#L87: 	verifyData := hmac.New(c.hash.New, finishedKey)
		key_schedule.go#L98: 		h := c.hash.New()