func golang.org/x/crypto/openpgp/packet.serializeHeader

14 uses

	golang.org/x/crypto/openpgp/packet (current package)
		encrypted_key.go#L120: 	serializeHeader(w, packetTypeEncryptedKey, 1 /* version */ +8 /* key id */ +1 /* algo */ +mpiLen)
		encrypted_key.go#L174: 	err = serializeHeader(w, packetTypeEncryptedKey, packetLen)
		encrypted_key.go#L195: 	err = serializeHeader(w, packetTypeEncryptedKey, packetLen)
		one_pass_signature.go#L68: 	if err := serializeHeader(w, packetTypeOnePassSignature, len(buf)); err != nil {
		opaque.go#L36: 	err = serializeHeader(w, packetType(op.Tag), len(op.Contents))
		opaque.go#L48: 	err = serializeHeader(hdr, packetType(op.Tag), len(op.Contents))
		packet.go#L248: func serializeHeader(w io.Writer, ptype packetType, length int) (err error) {
		private_key.go#L189: 	err = serializeHeader(w, ptype, len(contents)+len(privateKeyBytes)+2)
		public_key.go#L455: 	err = serializeHeader(w, packetType, length)
		public_key_v3.go#L148: 	if err = serializeHeader(w, packetType, length); err != nil {
		signature.go#L625: 	err = serializeHeader(w, packetTypeSignature, length)
		symmetric_key_encrypted.go#L121: 	err = serializeHeader(w, packetTypeSymmetricKeyEncrypted, packetLength)
		userattribute.go#L74: 	if err = serializeHeader(w, packetTypeUserAttribute, buf.Len()); err != nil {
		userid.go#L81: 	err := serializeHeader(w, packetTypeUserId, len(uid.Id))