func github.com/golang-jwt/jwt/v5.newError

31 uses

	github.com/golang-jwt/jwt/v5 (current package)
		ecdsa.go#L65: 		return newError("ECDSA verify expects *ecdsa.PublicKey", ErrInvalidKeyType)
		ecdsa.go#L99: 		return nil, newError("ECDSA sign expects *ecdsa.PrivateKey", ErrInvalidKeyType)
		ed25519.go#L41: 		return newError("Ed25519 verify expects ed25519.PublicKey", ErrInvalidKeyType)
		ed25519.go#L63: 		return nil, newError("Ed25519 sign expects crypto.Signer", ErrInvalidKeyType)
		errors_go1_20.go#L29: func newError(message string, err error, more ...error) error {
		hmac.go#L62: 		return newError("HMAC verify expects []byte", ErrInvalidKeyType)
		hmac.go#L103: 	return nil, newError("HMAC sign expects []byte", ErrInvalidKeyType)
		map_claims.go#L64: 	return nil, newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
		map_claims.go#L80: 				return nil, newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
		map_claims.go#L105: 		return "", newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
		none.go#L16: 	NoneSignatureTypeDisallowedError = newError("'none' signature type is not allowed", ErrTokenUnverifiable)
		none.go#L36: 		return newError("'none' signing method with non-empty signature", ErrTokenUnverifiable)
		parser.go#L75: 			return token, newError(fmt.Sprintf("signing method %v is invalid", alg), ErrTokenSignatureInvalid)
		parser.go#L82: 		return token, newError("could not base64 decode signature", ErrTokenMalformed, err)
		parser.go#L89: 		return token, newError("no keyfunc was provided", ErrTokenUnverifiable)
		parser.go#L94: 		return token, newError("error while executing keyfunc", ErrTokenUnverifiable, err)
		parser.go#L100: 			return token, newError("keyfunc returned empty verification key set", ErrTokenUnverifiable)
		parser.go#L113: 		return token, newError("", ErrTokenSignatureInvalid, err)
		parser.go#L124: 			return token, newError("", ErrTokenInvalidClaims, err)
		parser.go#L144: 		return nil, nil, newError("token contains an invalid number of segments", ErrTokenMalformed)
		parser.go#L152: 		return token, parts, newError("could not base64 decode header", ErrTokenMalformed, err)
		parser.go#L155: 		return token, parts, newError("could not JSON decode header", ErrTokenMalformed, err)
		parser.go#L163: 		return token, parts, newError("could not base64 decode claim", ErrTokenMalformed, err)
		parser.go#L187: 		return token, parts, newError("could not JSON decode claim", ErrTokenMalformed, err)
		parser.go#L193: 			return token, parts, newError("signing method (alg) is unavailable", ErrTokenUnverifiable)
		parser.go#L196: 		return token, parts, newError("signing method (alg) is unspecified", ErrTokenUnverifiable)
		rsa.go#L54: 		return newError("RSA verify expects *rsa.PublicKey", ErrInvalidKeyType)
		rsa.go#L76: 		return nil, newError("RSA sign expects *rsa.PrivateKey", ErrInvalidKeyType)
		rsa_pss.go#L91: 		return newError("RSA-PSS verify expects *rsa.PublicKey", ErrInvalidKeyType)
		rsa_pss.go#L118: 		return nil, newError("RSA-PSS sign expects *rsa.PrivateKey", ErrInvalidKeyType)
		validator.go#L312: 		return newError(fmt.Sprintf("%s claim is required", claim), ErrTokenRequiredClaimMissing)