type golang.org/x/crypto/openpgp/errors.UnsupportedError

51 uses

	golang.org/x/crypto/openpgp/errors (current package)
		errors.go#L22: type UnsupportedError string
		errors.go#L24: func (s UnsupportedError) Error() string {

	golang.org/x/crypto/openpgp
		keys.go#L262: 			if _, ok := err.(errors.UnsupportedError); ok {
		keys.go#L298: 			if _, ok := err.(errors.UnsupportedError); ok {
		read.go#L247: 				return nil, errors.UnsupportedError("nested signatures")
		read.go#L286: 		return nil, nil, errors.UnsupportedError("hash not available: " + strconv.Itoa(int(hashId)))
		read.go#L297: 	return nil, nil, errors.UnsupportedError("unsupported signature type: " + strconv.Itoa(int(sigType)))

	golang.org/x/crypto/openpgp/packet
		compressed.go#L57: 		err = errors.UnsupportedError("unknown compression algorithm: " + strconv.Itoa(int(buf[0])))
		compressed.go#L114: 		err = errors.UnsupportedError("Unsupported compression algorithm: " + s)
		encrypted_key.go#L39: 		return errors.UnsupportedError("unknown EncryptedKey version " + strconv.Itoa(int(buf[0])))
		encrypted_key.go#L163: 	return errors.UnsupportedError("encrypting a key to public key of type " + strconv.Itoa(int(pub.PubKeyAlgo)))
		one_pass_signature.go#L36: 		err = errors.UnsupportedError("one-pass-signature packet version " + strconv.Itoa(int(buf[0])))
		one_pass_signature.go#L42: 		return errors.UnsupportedError("hash function: " + strconv.Itoa(int(buf[2])))
		one_pass_signature.go#L60: 		return errors.UnsupportedError("hash type: " + strconv.Itoa(int(ops.Hash)))
		private_key.go#L121: 		return errors.UnsupportedError("deprecated s2k function in private key")
		private_key.go#L127: 			return errors.UnsupportedError("unsupported cipher in private key: " + strconv.Itoa(int(pk.cipher)))
		public_key.go#L57: 		err = errors.UnsupportedError("invalid oid length: " + strconv.Itoa(int(oidLen)))
		public_key.go#L92: 		return nil, errors.UnsupportedError(fmt.Sprintf("unsupported oid: %x", f.oid))
		public_key.go#L96: 		return nil, errors.UnsupportedError("failed to parse EC point")
		public_key.go#L122: 		return errors.UnsupportedError("Unsupported ECDH KDF length: " + strconv.Itoa(kdfLen))
		public_key.go#L132: 		return errors.UnsupportedError("Unsupported KDF reserved field: " + strconv.Itoa(reserved))
		public_key.go#L266: 		return errors.UnsupportedError("public key version")
		public_key.go#L295: 		err = errors.UnsupportedError("public key type: " + strconv.Itoa(int(pk.PubKeyAlgo)))
		public_key.go#L327: 		err = errors.UnsupportedError("large public exponent")
		public_key.go#L598: 		return nil, errors.UnsupportedError("hash function")
		public_key.go#L643: 		return nil, errors.UnsupportedError("hash function")
		public_key.go#L668: 		return nil, errors.UnsupportedError("hash function")
		public_key_v3.go#L60: 		return errors.UnsupportedError("public key version")
		public_key_v3.go#L69: 		err = errors.UnsupportedError("public key type: " + strconv.Itoa(int(pk.PubKeyAlgo)))
		public_key_v3.go#L104: 		err = errors.UnsupportedError("large public exponent")
		public_key_v3.go#L245: 		return nil, errors.UnsupportedError("hash function")
		signature.go#L90: 		err = errors.UnsupportedError("signature packet version " + strconv.Itoa(int(buf[0])))
		signature.go#L103: 		err = errors.UnsupportedError("public key algorithm " + strconv.Itoa(int(sig.PubKeyAlgo)))
		signature.go#L110: 		return errors.UnsupportedError("hash function " + strconv.Itoa(int(buf[2])))
		signature.go#L387: 			err = errors.UnsupportedError("unknown critical signature subpacket type " + strconv.Itoa(int(packetType)))
		signature.go#L555: 		err = errors.UnsupportedError("public key algorithm: " + strconv.Itoa(int(sig.PubKeyAlgo)))
		signature_v3.go#L42: 		err = errors.UnsupportedError("signature packet version " + strconv.Itoa(int(buf[0])))
		signature_v3.go#L49: 		err = errors.UnsupportedError(
		signature_v3.go#L76: 		err = errors.UnsupportedError("public key algorithm " + strconv.Itoa(int(sig.PubKeyAlgo)))
		signature_v3.go#L81: 		return errors.UnsupportedError("hash function " + strconv.Itoa(int(buf[2])))
		signature_v3.go#L125: 		return errors.UnsupportedError(fmt.Sprintf("hash function %v", sig.Hash))
		symmetric_key_encrypted.go#L38: 		return errors.UnsupportedError("SymmetricKeyEncrypted version")
		symmetric_key_encrypted.go#L43: 		return errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(buf[1])))
		symmetric_key_encrypted.go#L62: 			return errors.UnsupportedError("oversized encrypted session key")
		symmetric_key_encrypted.go#L88: 		return nil, ske.CipherFunc, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(cipherFunc)))
		symmetric_key_encrypted.go#L107: 		return nil, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(cipherFunc)))
		symmetrically_encrypted.go#L37: 			return errors.UnsupportedError("unknown SymmetricallyEncrypted version")
		symmetrically_encrypted.go#L50: 		return nil, errors.UnsupportedError("unknown cipher: " + strconv.Itoa(int(c)))

	golang.org/x/crypto/openpgp/s2k
		s2k.go#L166: 		return nil, errors.UnsupportedError("hash for S2K function: " + strconv.Itoa(int(buf[1])))
		s2k.go#L169: 		return nil, errors.UnsupportedError("hash not available: " + strconv.Itoa(int(hash)))
		s2k.go#L200: 	return nil, errors.UnsupportedError("S2K function")