func github.com/golang-jwt/jwt/v5.newError
31 uses
github.com/golang-jwt/jwt/v5 (current package)
ecdsa.go#L65: return newError("ECDSA verify expects *ecdsa.PublicKey", ErrInvalidKeyType)
ecdsa.go#L99: return nil, newError("ECDSA sign expects *ecdsa.PrivateKey", ErrInvalidKeyType)
ed25519.go#L41: return newError("Ed25519 verify expects ed25519.PublicKey", ErrInvalidKeyType)
ed25519.go#L63: return nil, newError("Ed25519 sign expects crypto.Signer", ErrInvalidKeyType)
errors_go1_20.go#L29: func newError(message string, err error, more ...error) error {
hmac.go#L62: return newError("HMAC verify expects []byte", ErrInvalidKeyType)
hmac.go#L103: return nil, newError("HMAC sign expects []byte", ErrInvalidKeyType)
map_claims.go#L64: return nil, newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
map_claims.go#L80: return nil, newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
map_claims.go#L105: return "", newError(fmt.Sprintf("%s is invalid", key), ErrInvalidType)
none.go#L16: NoneSignatureTypeDisallowedError = newError("'none' signature type is not allowed", ErrTokenUnverifiable)
none.go#L36: return newError("'none' signing method with non-empty signature", ErrTokenUnverifiable)
parser.go#L75: return token, newError(fmt.Sprintf("signing method %v is invalid", alg), ErrTokenSignatureInvalid)
parser.go#L82: return token, newError("could not base64 decode signature", ErrTokenMalformed, err)
parser.go#L89: return token, newError("no keyfunc was provided", ErrTokenUnverifiable)
parser.go#L94: return token, newError("error while executing keyfunc", ErrTokenUnverifiable, err)
parser.go#L100: return token, newError("keyfunc returned empty verification key set", ErrTokenUnverifiable)
parser.go#L113: return token, newError("", ErrTokenSignatureInvalid, err)
parser.go#L124: return token, newError("", ErrTokenInvalidClaims, err)
parser.go#L144: return nil, nil, newError("token contains an invalid number of segments", ErrTokenMalformed)
parser.go#L152: return token, parts, newError("could not base64 decode header", ErrTokenMalformed, err)
parser.go#L155: return token, parts, newError("could not JSON decode header", ErrTokenMalformed, err)
parser.go#L163: return token, parts, newError("could not base64 decode claim", ErrTokenMalformed, err)
parser.go#L187: return token, parts, newError("could not JSON decode claim", ErrTokenMalformed, err)
parser.go#L193: return token, parts, newError("signing method (alg) is unavailable", ErrTokenUnverifiable)
parser.go#L196: return token, parts, newError("signing method (alg) is unspecified", ErrTokenUnverifiable)
rsa.go#L54: return newError("RSA verify expects *rsa.PublicKey", ErrInvalidKeyType)
rsa.go#L76: return nil, newError("RSA sign expects *rsa.PrivateKey", ErrInvalidKeyType)
rsa_pss.go#L91: return newError("RSA-PSS verify expects *rsa.PublicKey", ErrInvalidKeyType)
rsa_pss.go#L118: return nil, newError("RSA-PSS sign expects *rsa.PrivateKey", ErrInvalidKeyType)
validator.go#L312: return newError(fmt.Sprintf("%s claim is required", claim), ErrTokenRequiredClaimMissing)
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |