type golang.org/x/crypto/openpgp/errors.UnsupportedError
51 uses
golang.org/x/crypto/openpgp/errors (current package)
errors.go#L22: type UnsupportedError string
errors.go#L24: func (s UnsupportedError) Error() string {
golang.org/x/crypto/openpgp
keys.go#L262: if _, ok := err.(errors.UnsupportedError); ok {
keys.go#L298: if _, ok := err.(errors.UnsupportedError); ok {
read.go#L247: return nil, errors.UnsupportedError("nested signatures")
read.go#L286: return nil, nil, errors.UnsupportedError("hash not available: " + strconv.Itoa(int(hashId)))
read.go#L297: return nil, nil, errors.UnsupportedError("unsupported signature type: " + strconv.Itoa(int(sigType)))
golang.org/x/crypto/openpgp/packet
compressed.go#L57: err = errors.UnsupportedError("unknown compression algorithm: " + strconv.Itoa(int(buf[0])))
compressed.go#L114: err = errors.UnsupportedError("Unsupported compression algorithm: " + s)
encrypted_key.go#L39: return errors.UnsupportedError("unknown EncryptedKey version " + strconv.Itoa(int(buf[0])))
encrypted_key.go#L163: return errors.UnsupportedError("encrypting a key to public key of type " + strconv.Itoa(int(pub.PubKeyAlgo)))
one_pass_signature.go#L36: err = errors.UnsupportedError("one-pass-signature packet version " + strconv.Itoa(int(buf[0])))
one_pass_signature.go#L42: return errors.UnsupportedError("hash function: " + strconv.Itoa(int(buf[2])))
one_pass_signature.go#L60: return errors.UnsupportedError("hash type: " + strconv.Itoa(int(ops.Hash)))
private_key.go#L121: return errors.UnsupportedError("deprecated s2k function in private key")
private_key.go#L127: return errors.UnsupportedError("unsupported cipher in private key: " + strconv.Itoa(int(pk.cipher)))
public_key.go#L57: err = errors.UnsupportedError("invalid oid length: " + strconv.Itoa(int(oidLen)))
public_key.go#L92: return nil, errors.UnsupportedError(fmt.Sprintf("unsupported oid: %x", f.oid))
public_key.go#L96: return nil, errors.UnsupportedError("failed to parse EC point")
public_key.go#L122: return errors.UnsupportedError("Unsupported ECDH KDF length: " + strconv.Itoa(kdfLen))
public_key.go#L132: return errors.UnsupportedError("Unsupported KDF reserved field: " + strconv.Itoa(reserved))
public_key.go#L266: return errors.UnsupportedError("public key version")
public_key.go#L295: err = errors.UnsupportedError("public key type: " + strconv.Itoa(int(pk.PubKeyAlgo)))
public_key.go#L327: err = errors.UnsupportedError("large public exponent")
public_key.go#L598: return nil, errors.UnsupportedError("hash function")
public_key.go#L643: return nil, errors.UnsupportedError("hash function")
public_key.go#L668: return nil, errors.UnsupportedError("hash function")
public_key_v3.go#L60: return errors.UnsupportedError("public key version")
public_key_v3.go#L69: err = errors.UnsupportedError("public key type: " + strconv.Itoa(int(pk.PubKeyAlgo)))
public_key_v3.go#L104: err = errors.UnsupportedError("large public exponent")
public_key_v3.go#L245: return nil, errors.UnsupportedError("hash function")
signature.go#L90: err = errors.UnsupportedError("signature packet version " + strconv.Itoa(int(buf[0])))
signature.go#L103: err = errors.UnsupportedError("public key algorithm " + strconv.Itoa(int(sig.PubKeyAlgo)))
signature.go#L110: return errors.UnsupportedError("hash function " + strconv.Itoa(int(buf[2])))
signature.go#L387: err = errors.UnsupportedError("unknown critical signature subpacket type " + strconv.Itoa(int(packetType)))
signature.go#L555: err = errors.UnsupportedError("public key algorithm: " + strconv.Itoa(int(sig.PubKeyAlgo)))
signature_v3.go#L42: err = errors.UnsupportedError("signature packet version " + strconv.Itoa(int(buf[0])))
signature_v3.go#L49: err = errors.UnsupportedError(
signature_v3.go#L76: err = errors.UnsupportedError("public key algorithm " + strconv.Itoa(int(sig.PubKeyAlgo)))
signature_v3.go#L81: return errors.UnsupportedError("hash function " + strconv.Itoa(int(buf[2])))
signature_v3.go#L125: return errors.UnsupportedError(fmt.Sprintf("hash function %v", sig.Hash))
symmetric_key_encrypted.go#L38: return errors.UnsupportedError("SymmetricKeyEncrypted version")
symmetric_key_encrypted.go#L43: return errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(buf[1])))
symmetric_key_encrypted.go#L62: return errors.UnsupportedError("oversized encrypted session key")
symmetric_key_encrypted.go#L88: return nil, ske.CipherFunc, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(cipherFunc)))
symmetric_key_encrypted.go#L107: return nil, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(cipherFunc)))
symmetrically_encrypted.go#L37: return errors.UnsupportedError("unknown SymmetricallyEncrypted version")
symmetrically_encrypted.go#L50: return nil, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(c)))
golang.org/x/crypto/openpgp/s2k
s2k.go#L166: return nil, errors.UnsupportedError("hash for S2K function: " + strconv.Itoa(int(buf[1])))
s2k.go#L169: return nil, errors.UnsupportedError("hash not available: " + strconv.Itoa(int(hash)))
s2k.go#L200: return nil, errors.UnsupportedError("S2K function")
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |