func errors.New

1016 uses

	errors (current package)
		errors.go#L61: func New(text string) error {
		errors.go#L87: var ErrUnsupported = New("unsupported operation")

	bufio
		bufio.go#L23: 	ErrInvalidUnreadByte = errors.New("bufio: invalid use of UnreadByte")
		bufio.go#L24: 	ErrInvalidUnreadRune = errors.New("bufio: invalid use of UnreadRune")
		bufio.go#L25: 	ErrBufferFull        = errors.New("bufio: buffer full")
		bufio.go#L26: 	ErrNegativeCount     = errors.New("bufio: negative count")
		bufio.go#L93: var errNegativeRead = errors.New("bufio: reader returned negative count from Read")
		bufio.go#L556: var errNegativeWrite = errors.New("bufio: writer returned negative count from Write")
		scan.go#L71: 	ErrTooLong         = errors.New("bufio.Scanner: token too long")
		scan.go#L72: 	ErrNegativeAdvance = errors.New("bufio.Scanner: SplitFunc returns negative advance count")
		scan.go#L73: 	ErrAdvanceTooFar   = errors.New("bufio.Scanner: SplitFunc returns advance count beyond input")
		scan.go#L74: 	ErrBadReadCount    = errors.New("bufio.Scanner: Read returned impossible count")
		scan.go#L128: var ErrFinalToken = errors.New("final token")

	bytes
		buffer.go#L44: var ErrTooLarge = errors.New("bytes.Buffer: too large")
		buffer.go#L45: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
		buffer.go#L398: 		return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
		buffer.go#L407: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")
		reader.go#L53: 		return 0, errors.New("bytes.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("bytes.Reader.UnreadByte: at beginning of slice")
		reader.go#L105: 		return errors.New("bytes.Reader.UnreadRune: at beginning of slice")
		reader.go#L108: 		return errors.New("bytes.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("bytes.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("bytes.Reader.Seek: negative position")

	compress/flate
		deflate.go#L699: var errWriterClosed = errors.New("flate: closed writer")

	compress/gzip
		gunzip.go#L32: 	ErrChecksum = errors.New("gzip: invalid checksum")
		gunzip.go#L34: 	ErrHeader = errors.New("gzip: invalid header")
		gzip.go#L95: 		return errors.New("gzip.Write: Extra data is too large")
		gzip.go#L113: 			return errors.New("gzip.Write: non-Latin-1 header string")

	context
		context.go#L163: var Canceled = errors.New("context canceled")

	crypto/aes
		aes_gcm.go#L40: var errOpen = errors.New("cipher: message authentication failed")

	crypto/cipher
		gcm.go#L114: 		return nil, errors.New("cipher: incorrect tag size given to GCM")
		gcm.go#L118: 		return nil, errors.New("cipher: the nonce can't have zero length, or the security of the key will be immediately compromised")
		gcm.go#L126: 		return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
		gcm.go#L196: var errOpen = errors.New("cipher: message authentication failed")

	crypto/dsa
		dsa.go#L46: var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
		dsa.go#L86: 		return errors.New("crypto/dsa: invalid ParameterSizes")
		dsa.go#L161: 		return errors.New("crypto/dsa: parameters not set up before generating key")

	crypto/ecdh
		ecdh.go#L128: 		return nil, errors.New("crypto/ecdh: private key and public key curves do not match")
		nist.go#L36: var errInvalidPrivateKey = errors.New("crypto/ecdh: invalid private key")
		nist.go#L77: 		return nil, errors.New("crypto/ecdh: invalid private key size")
		nist.go#L170: 		return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L46: 		return nil, errors.New("crypto/ecdh: invalid private key size")
		x25519.go#L69: 		return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L81: 		return nil, errors.New("crypto/ecdh: bad X25519 remote ECDH input: low order point")

	crypto/ecdsa
		ecdsa.go#L64: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L67: 		return nil, errors.New("ecdsa: invalid public key")
		ecdsa.go#L102: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L106: 		return nil, errors.New("ecdsa: invalid private key")
		ecdsa.go#L250: var errNoAsm = errors.New("no assembly implementation available")
		ecdsa.go#L320: 		return nil, errors.New("ecdsa: internal error: r is zero")
		ecdsa.go#L336: 		return nil, errors.New("ecdsa: internal error: s is zero")
		ecdsa.go#L358: 		b.SetError(errors.New("invalid integer"))
		ecdsa.go#L562: 		return nil, nil, errors.New("invalid ASN.1")
		ecdsa.go#L589: 		return p, errors.New("negative coordinate")
		ecdsa.go#L592: 		return p, errors.New("overflowing coordinate")
		ecdsa.go#L608: 		return nil, nil, errors.New("ecdsa: public key point is the infinity")
		ecdsa_legacy.go#L51: var errZeroParam = errors.New("zero parameter")
		ecdsa_legacy.go#L72: 		return nil, nil, errors.New("invalid ASN.1 from SignASN1")

	crypto/ed25519
		ed25519.go#L100: 			return nil, errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L103: 			return nil, errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L110: 			return nil, errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L118: 		return nil, errors.New("ed25519: expected opts.HashFunc() zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")
		ed25519.go#L286: 			return errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L289: 			return errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L292: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L297: 			return errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L300: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L305: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L309: 		return errors.New("ed25519: expected opts.Hash zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")

	crypto/elliptic
		nistec.go#L147: 		return p, errors.New("negative coordinate")
		nistec.go#L150: 		return p, errors.New("overflowing coordinate")

	crypto/internal/bigmod
		nat.go#L147: 		return nil, errors.New("input overflows the modulus")
		nat.go#L163: 		return nil, errors.New("input overflows the modulus size")
		nat.go#L191: 		return errors.New("input overflows the modulus size")
		nat.go#L378: 		return nil, errors.New("modulus must be >= 0")
		nat.go#L380: 		return nil, errors.New("modulus must be odd")

	crypto/internal/edwards25519
		edwards25519.go#L155: 		return nil, errors.New("edwards25519: invalid point encoding length")
		edwards25519.go#L173: 		return nil, errors.New("edwards25519: invalid point encoding")
		scalar.go#L111: 		return nil, errors.New("edwards25519: invalid SetUniformBytes input length")
		scalar.go#L160: 		return nil, errors.New("invalid scalar length")
		scalar.go#L163: 		return nil, errors.New("invalid scalar encoding")
		scalar.go#L210: 		return nil, errors.New("edwards25519: invalid SetBytesWithClamping input length")

	crypto/internal/edwards25519/field
		fe.go#L200: 		return nil, errors.New("edwards25519: invalid field element input size")

	crypto/internal/hpke
		hpke.go#L74: 		return nil, errors.New("unsupported suite ID")
		hpke.go#L159: 		return nil, nil, errors.New("incorrect public key type")
		hpke.go#L168: 		return nil, nil, errors.New("unsupported KDF id")
		hpke.go#L174: 		return nil, nil, errors.New("unsupported AEAD id")
		hpke.go#L236: 		return nil, errors.New("unsupported KEM id")

	crypto/internal/mlkem768
		mlkem768.go#L117: 		return nil, errors.New("mlkem768: crypto/rand Read failed: " + err.Error())
		mlkem768.go#L121: 		return nil, errors.New("mlkem768: crypto/rand Read failed: " + err.Error())
		mlkem768.go#L136: 		return nil, errors.New("mlkem768: invalid seed length")
		mlkem768.go#L153: 		return nil, errors.New("mlkem768: invalid decapsulation key length")
		mlkem768.go#L258: 		return nil, nil, errors.New("mlkem768: invalid encapsulation key length")
		mlkem768.go#L262: 		return nil, nil, errors.New("mlkem768: crypto/rand Read failed: " + err.Error())
		mlkem768.go#L295: 		return errors.New("mlkem768: invalid encryption key length")
		mlkem768.go#L368: 		return nil, errors.New("mlkem768: invalid ciphertext length")
		mlkem768.go#L405: 		return errors.New("mlkem768: invalid decryption key length")
		mlkem768.go#L449: 		return 0, errors.New("unreduced field element")
		mlkem768.go#L599: 		return T{}, errors.New("mlkem768: invalid encoding length")
		mlkem768.go#L607: 			return T{}, errors.New("mlkem768: invalid polynomial encoding")
		mlkem768.go#L610: 			return T{}, errors.New("mlkem768: invalid polynomial encoding")

	crypto/internal/nistec
		p224.go#L90: 			return nil, errors.New("invalid P224 compressed point encoding")
		p224.go#L106: 		return nil, errors.New("invalid P224 point encoding")
		p224.go#L137: 		return errors.New("P224 point not on curve")
		p224.go#L178: 		return nil, errors.New("P224 point is the point at infinity")
		p224.go#L414: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L97: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L112: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L119: 			return nil, errors.New("invalid P256 compressed point encoding")
		p256_asm.go#L133: 		return nil, errors.New("invalid P256 point encoding")
		p256_asm.go#L164: 		return errors.New("P256 point not on curve")
		p256_asm.go#L407: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L422: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L509: 		return nil, errors.New("P256 point is the point at infinity")
		p256_ordinv.go#L23: 		return nil, errors.New("invalid scalar length")
		p384.go#L90: 			return nil, errors.New("invalid P384 compressed point encoding")
		p384.go#L106: 		return nil, errors.New("invalid P384 point encoding")
		p384.go#L137: 		return errors.New("P384 point not on curve")
		p384.go#L178: 		return nil, errors.New("P384 point is the point at infinity")
		p384.go#L414: 		return nil, errors.New("invalid scalar length")
		p521.go#L90: 			return nil, errors.New("invalid P521 compressed point encoding")
		p521.go#L106: 		return nil, errors.New("invalid P521 point encoding")
		p521.go#L137: 		return errors.New("P521 point not on curve")
		p521.go#L178: 		return nil, errors.New("P521 point is the point at infinity")
		p521.go#L414: 		return nil, errors.New("invalid scalar length")

	crypto/internal/nistec/fiat
		p224.go#L74: 		return nil, errors.New("invalid P224Element encoding")
		p224.go#L86: 			return nil, errors.New("invalid P224Element encoding")
		p256.go#L74: 		return nil, errors.New("invalid P256Element encoding")
		p256.go#L86: 			return nil, errors.New("invalid P256Element encoding")
		p384.go#L74: 		return nil, errors.New("invalid P384Element encoding")
		p384.go#L86: 			return nil, errors.New("invalid P384Element encoding")
		p521.go#L74: 		return nil, errors.New("invalid P521Element encoding")
		p521.go#L86: 			return nil, errors.New("invalid P521Element encoding")

	crypto/md5
		md5.go#L74: 		return errors.New("crypto/md5: invalid hash state identifier")
		md5.go#L77: 		return errors.New("crypto/md5: invalid hash state size")

	crypto/rand
		util.go#L18: 		return nil, errors.New("crypto/rand: prime size must be at least 2-bit")

	crypto/rsa
		pkcs1v15.go#L313: 			return nil, errors.New("crypto/rsa: input must be hashed message")
		pkcs1v15.go#L318: 			return nil, errors.New("crypto/rsa: unsupported hash function")
		pss.go#L45: 		return nil, errors.New("crypto/rsa: input must be hashed with given hash")
		pss.go#L115: 		return errors.New("rsa: internal error: inconsistent length")
		pss.go#L281: var invalidSaltLenErr = errors.New("crypto/rsa: PSSOptions.SaltLength cannot be negative")
		rsa.go#L88: 	errPublicModulus       = errors.New("crypto/rsa: missing public modulus")
		rsa.go#L89: 	errPublicExponentSmall = errors.New("crypto/rsa: public exponent too small")
		rsa.go#L90: 	errPublicExponentLarge = errors.New("crypto/rsa: public exponent too large")
		rsa.go#L202: 		return nil, errors.New("crypto/rsa: invalid options for Decrypt")
		rsa.go#L243: 			return errors.New("crypto/rsa: invalid prime value")
		rsa.go#L248: 		return errors.New("crypto/rsa: invalid modulus")
		rsa.go#L263: 			return errors.New("crypto/rsa: invalid exponents")
		rsa.go#L316: 			return nil, errors.New("crypto/rsa: generated key exponent too large")
		rsa.go#L356: 		return nil, errors.New("crypto/rsa: GenerateMultiPrimeKey: nprimes must be >= 2")
		rsa.go#L370: 			return nil, errors.New("crypto/rsa: too few primes of given length to generate an RSA key")
		rsa.go#L479: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
		rsa.go#L574: var ErrDecryption = errors.New("crypto/rsa: decryption error")
		rsa.go#L578: var ErrVerification = errors.New("crypto/rsa: verification error")

	crypto/sha1
		sha1.go#L67: 		return errors.New("crypto/sha1: invalid hash state identifier")
		sha1.go#L70: 		return errors.New("crypto/sha1: invalid hash state size")

	crypto/sha256
		sha256.go#L89: 		return errors.New("crypto/sha256: invalid hash state identifier")
		sha256.go#L92: 		return errors.New("crypto/sha256: invalid hash state size")

	crypto/sha512
		sha512.go#L154: 		return nil, errors.New("crypto/sha512: invalid hash function")
		sha512.go#L172: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L180: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L183: 		return errors.New("crypto/sha512: invalid hash state size")

	crypto/tls
		auth.go#L30: 			return errors.New("ECDSA verification failure")
		auth.go#L38: 			return errors.New("Ed25519 verification failure")
		auth.go#L58: 		return errors.New("internal error: unknown signature type")
		auth.go#L252: 	return 0, errors.New("tls: peer doesn't support any of the certificate's signature algorithms")
		common.go#L1189: var errNoCertificates = errors.New("tls: no certificates configured")
		common.go#L1259: 		return errors.New("no mutually supported protocol versions")
		common.go#L1327: 		return supportsRSAFallback(errors.New("client doesn't support ECDHE, can only use legacy RSA key exchange"))
		common.go#L1353: 				return errors.New("client doesn't support certificate curve")
		common.go#L1358: 				return errors.New("connection doesn't support Ed25519")
		common.go#L1391: 		return supportsRSAFallback(errors.New("client doesn't support any cipher suites compatible with the certificate"))
		common.go#L1426: 	return errors.New("chain is not signed by an acceptable CA")
		conn.go#L620: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
		conn.go#L625: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
		conn.go#L792: 		return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
		conn.go#L977: 			return 0, errors.New("tls: internal error: sending non-handshake message to QUIC transport")
		conn.go#L1187: 	errShutdown = errors.New("tls: protocol is shutdown")
		conn.go#L1255: 		return errors.New("tls: internal error: unexpected renegotiation")
		conn.go#L1284: 		return errors.New("tls: unknown Renegotiation value")
		conn.go#L1311: 		return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
		conn.go#L1331: 		return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
		conn.go#L1450: var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake complete")
		conn.go#L1578: 		c.handshakeErr = errors.New("tls: internal error: handshake should have had a result")
		conn.go#L1676: 		return errors.New("tls: VerifyHostname called on TLS server connection")
		conn.go#L1679: 		return errors.New("tls: handshake has not yet been performed")
		conn.go#L1682: 		return errors.New("tls: handshake did not verify certificate chain")
		ech.go#L41: var errMalformedECHConfig = errors.New("tls: malformed ECHConfigList")
		ech.go#L177: 	return echCipher{}, errors.New("tls: no supported symmetric ciphersuites for ECH")
		handshake_client.go#L47: 		return nil, nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
		handshake_client.go#L53: 			return nil, nil, nil, errors.New("tls: invalid NextProtos value")
		handshake_client.go#L59: 		return nil, nil, nil, errors.New("tls: NextProtos values too large")
		handshake_client.go#L64: 		return nil, nil, nil, errors.New("tls: no supported versions satisfy MinVersion and MaxVersion")
		handshake_client.go#L116: 		return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L127: 			return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L176: 				return nil, nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client.go#L200: 			return nil, nil, nil, errors.New("tls: MinVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
		handshake_client.go#L203: 			return nil, nil, nil, errors.New("tls: MaxVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
		handshake_client.go#L211: 			return nil, nil, nil, errors.New("tls: EncryptedClientHelloConfigList contains no valid configs")
		handshake_client.go#L298: 			return errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L351: 		return errors.New("tls: downgrade attempt detected, possibly due to a MitM attack or a broken middlebox")
		handshake_client.go#L626: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client.go#L671: 			return errors.New("tls: received unexpected CertificateStatus message")
		handshake_client.go#L697: 			return errors.New("tls: server's identity changed during renegotiation")
		handshake_client.go#L776: 		return errors.New("tls: failed to write to key log: " + err.Error())
		handshake_client.go#L869: 		return false, errors.New("tls: server selected unsupported compression format")
		handshake_client.go#L876: 			return false, errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_client.go#L886: 			return false, errors.New("tls: incorrect renegotiation extension contents")
		handshake_client.go#L904: 		return false, errors.New("tls: server resumed a session with a different version")
		handshake_client.go#L909: 		return false, errors.New("tls: server resumed a session with a different cipher suite")
		handshake_client.go#L915: 		return false, errors.New("tls: server resumed a session with a different EMS extension")
		handshake_client.go#L940: 			return errors.New("tls: server did not select an ALPN protocol")
		handshake_client.go#L945: 		return errors.New("tls: server advertised unrequested ALPN extension")
		handshake_client.go#L952: 	return errors.New("tls: server selected unadvertised ALPN protocol")
		handshake_client.go#L979: 		return errors.New("tls: server's Finished message was incorrect")
		handshake_client.go#L998: 		return errors.New("tls: server sent unrequested session ticket")
		handshake_client.go#L1078: 			return errors.New("tls: failed to parse certificate from server: " + err.Error())
		handshake_client_tls13.go#L49: 		return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode")
		handshake_client_tls13.go#L56: 		return errors.New("tls: server selected TLS 1.3 in a renegotiation")
		handshake_client_tls13.go#L110: 				return errors.New("tls: unexpected encrypted_client_hello extension in server hello despite ECH being accepted")
		handshake_client_tls13.go#L115: 				return errors.New("tls: unexpected server_name extension in server hello")
		handshake_client_tls13.go#L175: 		return errors.New("tls: server selected TLS 1.3 using the legacy version field")
		handshake_client_tls13.go#L180: 		return errors.New("tls: server selected an invalid version after a HelloRetryRequest")
		handshake_client_tls13.go#L185: 		return errors.New("tls: server sent an incorrect legacy version")
		handshake_client_tls13.go#L196: 		return errors.New("tls: server sent a ServerHello extension forbidden in TLS 1.3")
		handshake_client_tls13.go#L201: 		return errors.New("tls: server did not echo the legacy session ID")
		handshake_client_tls13.go#L206: 		return errors.New("tls: server selected unsupported compression format")
		handshake_client_tls13.go#L212: 		return errors.New("tls: server changed cipher suite after a HelloRetryRequest")
		handshake_client_tls13.go#L216: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client_tls13.go#L265: 				return errors.New("tls: malformed encrypted client hello extension")
		handshake_client_tls13.go#L293: 		return errors.New("tls: unexpected ECH extension in serverHello")
		handshake_client_tls13.go#L301: 		return errors.New("tls: server sent an unnecessary HelloRetryRequest message")
		handshake_client_tls13.go#L310: 		return errors.New("tls: received malformed key_share extension")
		handshake_client_tls13.go#L319: 			return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L325: 			return errors.New("tls: server sent an unnecessary HelloRetryRequest key_share")
		handshake_client_tls13.go#L335: 			return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client_tls13.go#L426: 		return errors.New("tls: server sent two HelloRetryRequest messages")
		handshake_client_tls13.go#L431: 		return errors.New("tls: server sent a cookie in a normal ServerHello")
		handshake_client_tls13.go#L436: 		return errors.New("tls: malformed key_share extension")
		handshake_client_tls13.go#L441: 		return errors.New("tls: server did not send a key share")
		handshake_client_tls13.go#L447: 		return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L456: 		return errors.New("tls: server selected an invalid PSK")
		handshake_client_tls13.go#L468: 		return errors.New("tls: server selected an invalid PSK and cipher suite pair")
		handshake_client_tls13.go#L488: 			return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L495: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L500: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L510: 			return errors.New("tls: invalid Kyber server key share")
		handshake_client_tls13.go#L584: 			return errors.New("tls: server did not send a quic_transport_parameters extension")
		handshake_client_tls13.go#L590: 			return errors.New("tls: server sent an unexpected quic_transport_parameters extension")
		handshake_client_tls13.go#L596: 		return errors.New("tls: server sent an unexpected early_data extension")
		handshake_client_tls13.go#L604: 			return errors.New("tls: server accepted 0-RTT with the wrong cipher suite")
		handshake_client_tls13.go#L608: 			return errors.New("tls: server accepted 0-RTT with the wrong ALPN")
		handshake_client_tls13.go#L613: 		return errors.New("tls: server sent ECH retry configs after accepting ECH")
		handshake_client_tls13.go#L659: 		return errors.New("tls: received empty certificates message")
		handshake_client_tls13.go#L686: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L694: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L700: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		handshake_client_tls13.go#L730: 		return errors.New("tls: invalid server finished hash")
		handshake_client_tls13.go#L824: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_client_tls13.go#L866: 		return errors.New("tls: received new session ticket from a client")
		handshake_client_tls13.go#L880: 		return errors.New("tls: received a session ticket with invalid lifetime")
		handshake_client_tls13.go#L886: 		return errors.New("tls: invalid early data for QUIC connection")
		handshake_messages.go#L404: 		return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_messages.go#L408: 			return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_server.go#L197: 		return errors.New("tls: client does not support uncompressed connections")
		handshake_server.go#L220: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server.go#L371: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server.go#L389: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server.go#L504: 		return errors.New("tls: session supported extended_master_secret but client does not")
		handshake_server.go#L725: 				return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server.go#L742: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server.go#L804: 		return errors.New("tls: client's Finished message is incorrect")
		handshake_server.go#L881: 			return errors.New("tls: failed to parse client certificate: " + err.Error())
		handshake_server.go#L898: 		return errors.New("tls: client didn't provide a certificate")
		handshake_server_tls13.go#L51: 		return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode")
		handshake_server_tls13.go#L104: 		return errors.New("tls: client used the legacy version field to negotiate TLS 1.3")
		handshake_server_tls13.go#L122: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server_tls13.go#L131: 		return errors.New("tls: TLS 1.3 client supports illegal compression methods")
		handshake_server_tls13.go#L142: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server_tls13.go#L148: 			return errors.New("tls: early_data without pre_shared_key")
		handshake_server_tls13.go#L158: 		return errors.New("tls: client sent unexpected early data")
		handshake_server_tls13.go#L176: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server_tls13.go#L196: 				return errors.New("tls: client sent key share for group it does not support")
		handshake_server_tls13.go#L211: 		return errors.New("tls: no ECDHE curve supported by both client and server")
		handshake_server_tls13.go#L228: 			return errors.New("tls: invalid Kyber client key share")
		handshake_server_tls13.go#L234: 		return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_server_tls13.go#L245: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L250: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L256: 			return errors.New("tls: invalid Kyber client key share")
		handshake_server_tls13.go#L274: 				return errors.New("tls: client offered TLS version older than TLS 1.3")
		handshake_server_tls13.go#L280: 			return errors.New("tls: client did not send a quic_transport_parameters extension")
		handshake_server_tls13.go#L286: 			return errors.New("tls: client sent an unexpected quic_transport_parameters extension")
		handshake_server_tls13.go#L314: 		return errors.New("tls: invalid or missing PSK binders")
		handshake_server_tls13.go#L392: 			return errors.New("tls: internal error: failed to clone hash")
		handshake_server_tls13.go#L403: 			return errors.New("tls: invalid PSK binder")
		handshake_server_tls13.go#L555: 		return nil, errors.New("tls: client didn't send one key share in second ClientHello")
		handshake_server_tls13.go#L561: 		return nil, errors.New("tls: client sent unexpected key share in second ClientHello")
		handshake_server_tls13.go#L566: 		return nil, errors.New("tls: client indicated early data in second ClientHello")
		handshake_server_tls13.go#L571: 		return nil, errors.New("tls: client illegally modified second ClientHello")
		handshake_server_tls13.go#L763: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_server_tls13.go#L871: 		return errors.New("tls: internal error: unknown cipher suite")
		handshake_server_tls13.go#L982: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L990: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L996: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server_tls13.go#L1030: 		return errors.New("tls: invalid client finished hash")
		key_agreement.go#L38: var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
		key_agreement.go#L39: var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
		key_agreement.go#L61: 		return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
		key_agreement.go#L78: 	return errors.New("tls: unexpected ServerKeyExchange")
		key_agreement.go#L92: 		return nil, nil, errors.New("tls: server certificate contains incorrect key type for selected ciphersuite")
		key_agreement.go#L179: 		return nil, errors.New("tls: no supported elliptic curves offered")
		key_agreement.go#L182: 		return nil, errors.New("tls: CurvePreferences includes unsupported curve")
		key_agreement.go#L224: 		return nil, errors.New("tls: certificate cannot be used with the selected cipher suite")
		key_agreement.go#L235: 		return nil, errors.New("tls: failed to sign ECDHE parameters: " + err.Error())
		key_agreement.go#L280: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L297: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L331: 			return errors.New("tls: certificate used with invalid signature algorithm")
		key_agreement.go#L355: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		key_agreement.go#L362: 		return nil, nil, errors.New("tls: missing ServerKeyExchange message")
		key_schedule.go#L166: 		return nil, errors.New("tls: internal error: unsupported curve")
		prf.go#L259: 	return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
		prf.go#L266: 	return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when neither TLS 1.3 nor Extended Master Secret are negotiated; override with GODEBUG=tlsunsafeekm=1")
		quic.go#L205: 		return quicError(errors.New("tls: Start called more than once"))
		quic.go#L209: 		return quicError(errors.New("tls: Config MinVersion must be at least TLS 1.13"))
		quic.go#L260: 		return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
		quic.go#L306: 		return quicError(errors.New("tls: SendSessionTicket called before handshake completed"))
		quic.go#L309: 		return quicError(errors.New("tls: SendSessionTicket called on the client"))
		quic.go#L312: 		return quicError(errors.New("tls: SendSessionTicket called multiple times"))
		quic.go#L325: 		return quicError(errors.New("tls: StoreSessionTicket called on the server"))
		ticket.go#L148: 					b.SetError(errors.New("tls: internal error: empty verified chain"))
		ticket.go#L199: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L204: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L214: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L222: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L236: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L241: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L245: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L251: 				return nil, errors.New("tls: invalid session encoding")
		ticket.go#L265: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L271: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L277: 		return nil, errors.New("tls: no server certificates in client session")
		ticket.go#L281: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L286: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L322: 		return nil, errors.New("tls: internal error: session ticket keys unavailable")
		ticket.go#L337: 		return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
		tls.go#L93: 		return nil, errors.New("tls: neither Certificates, GetCertificate, nor GetConfigForClient set in Config")
		tls.go#L275: 			return fail(errors.New("tls: failed to find any PEM data in certificate input"))
		tls.go#L278: 			return fail(errors.New("tls: failed to find certificate PEM data in certificate input, but did find a private key; PEM inputs may have been switched"))
		tls.go#L289: 				return fail(errors.New("tls: failed to find any PEM data in key input"))
		tls.go#L292: 				return fail(errors.New("tls: found a certificate rather than a key in the PEM for the private key"))
		tls.go#L324: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L327: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L332: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L335: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L340: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L343: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L346: 		return fail(errors.New("tls: unknown public key algorithm"))
		tls.go#L364: 			return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
		tls.go#L371: 	return nil, errors.New("tls: failed to parse private key")

	crypto/x509
		oid.go#L19: 	errInvalidOID = errors.New("invalid oid")
		parser.go#L67: 				return "", errors.New("invalid PrintableString")
		parser.go#L73: 			return "", errors.New("invalid UTF-8 string")
		parser.go#L78: 			return "", errors.New("invalid BMPString")
		parser.go#L96: 			return "", errors.New("invalid IA5String")
		parser.go#L102: 				return "", errors.New("invalid NumericString")
		parser.go#L114: 		return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L122: 			return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L127: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute")
		parser.go#L131: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute type")
		parser.go#L136: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute value")
		parser.go#L155: 		return ai, errors.New("x509: malformed OID")
		parser.go#L163: 		return ai, errors.New("x509: malformed parameters")
		parser.go#L175: 			return t, errors.New("x509: malformed UTCTime")
		parser.go#L179: 			return t, errors.New("x509: malformed GeneralizedTime")
		parser.go#L182: 		return t, errors.New("x509: unsupported time format")
		parser.go#L203: 		return ext, errors.New("x509: malformed extension OID field")
		parser.go#L207: 			return ext, errors.New("x509: malformed extension critical field")
		parser.go#L212: 		return ext, errors.New("x509: malformed extension value field")
		parser.go#L227: 			return nil, errors.New("x509: RSA key missing NULL parameters")
		parser.go#L232: 			return nil, errors.New("x509: invalid RSA public key")
		parser.go#L235: 			return nil, errors.New("x509: invalid RSA modulus")
		parser.go#L238: 			return nil, errors.New("x509: invalid RSA public exponent")
		parser.go#L242: 			return nil, errors.New("x509: RSA modulus is not a positive number")
		parser.go#L245: 			return nil, errors.New("x509: RSA public exponent is not a positive number")
		parser.go#L257: 			return nil, errors.New("x509: invalid ECDSA parameters")
		parser.go#L261: 			return nil, errors.New("x509: unsupported elliptic curve")
		parser.go#L265: 			return nil, errors.New("x509: failed to unmarshal elliptic curve point")
		parser.go#L277: 			return nil, errors.New("x509: Ed25519 key encoded with illegal parameters")
		parser.go#L280: 			return nil, errors.New("x509: wrong Ed25519 public key size")
		parser.go#L287: 			return nil, errors.New("x509: X25519 key encoded with illegal parameters")
		parser.go#L293: 			return nil, errors.New("x509: invalid DSA public key")
		parser.go#L308: 			return nil, errors.New("x509: invalid DSA parameters")
		parser.go#L312: 			return nil, errors.New("x509: zero or negative DSA parameter")
		parser.go#L316: 		return nil, errors.New("x509: unknown public key algorithm")
		parser.go#L323: 		return 0, errors.New("x509: invalid key usage")
		parser.go#L338: 		return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L342: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L348: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L358: 		return errors.New("x509: invalid subject alternative names")
		parser.go#L364: 			return errors.New("x509: invalid subject alternative name")
		parser.go#L380: 				return errors.New("x509: SAN rfc822Name is malformed")
		parser.go#L386: 				return errors.New("x509: SAN dNSName is malformed")
		parser.go#L392: 				return errors.New("x509: SAN uniformResourceIdentifier is malformed")
		parser.go#L409: 				return errors.New("x509: cannot parse IP address of length " + strconv.Itoa(len(data)))
		parser.go#L423: 		return nil, errors.New("x509: authority key identifier incorrectly marked critical")
		parser.go#L428: 		return nil, errors.New("x509: invalid authority key identifier")
		parser.go#L432: 			return nil, errors.New("x509: invalid authority key identifier")
		parser.go#L443: 		return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L448: 			return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L462: 		return nil, errors.New("x509: invalid certificate policies")
		parser.go#L468: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L472: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L528: 		return false, errors.New("x509: invalid NameConstraints extension")
		parser.go#L536: 		return false, errors.New("x509: empty name constraints extension")
		parser.go#L559: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L601: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L625: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L715: 					return errors.New("x509: invalid CRL distribution points")
		parser.go#L720: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L725: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L731: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L739: 							return errors.New("x509: invalid CRL distribution point")
		parser.go#L759: 					return errors.New("x509: subject key identifier incorrectly marked critical")
		parser.go#L764: 					return errors.New("x509: invalid subject key identifier")
		parser.go#L786: 				return errors.New("x509: authority info access incorrectly marked critical")
		parser.go#L790: 				return errors.New("x509: invalid authority info access")
		parser.go#L795: 					return errors.New("x509: invalid authority info access")
		parser.go#L799: 					return errors.New("x509: invalid authority info access")
		parser.go#L805: 					return errors.New("x509: invalid authority info access")
		parser.go#L837: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L841: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L848: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L852: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L856: 		return nil, errors.New("x509: malformed version")
		parser.go#L859: 		return nil, errors.New("x509: malformed version")
		parser.go#L865: 		return nil, errors.New("x509: invalid version")
		parser.go#L870: 		return nil, errors.New("x509: malformed serial number")
		parser.go#L874: 			return nil, errors.New("x509: negative serial number")
		parser.go#L883: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L890: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L893: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L903: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L914: 		return nil, errors.New("x509: malformed validity")
		parser.go#L923: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L934: 		return nil, errors.New("x509: malformed spki")
		parser.go#L938: 		return nil, errors.New("x509: malformed spki")
		parser.go#L942: 		return nil, errors.New("x509: malformed public key algorithm identifier")
		parser.go#L951: 		return nil, errors.New("x509: malformed subjectPublicKey")
		parser.go#L965: 			return nil, errors.New("x509: malformed issuerUniqueID")
		parser.go#L968: 			return nil, errors.New("x509: malformed subjectUniqueID")
		parser.go#L974: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L979: 					return nil, errors.New("x509: malformed extensions")
		parser.go#L984: 						return nil, errors.New("x509: malformed extension")
		parser.go#L1007: 		return nil, errors.New("x509: malformed signature")
		parser.go#L1025: 		return nil, errors.New("x509: trailing data")
		parser.go#L1059: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1063: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1070: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1074: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1079: 		return nil, errors.New("x509: unsupported crl version")
		parser.go#L1082: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1090: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L1097: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L1100: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L1110: 		return nil, errors.New("x509: malformed signature")
		parser.go#L1116: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L1139: 			return nil, errors.New("x509: malformed crl")
		parser.go#L1146: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1150: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1155: 				return nil, errors.New("x509: malformed serial number")
		parser.go#L1164: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L1170: 						return nil, errors.New("x509: malformed extension")
		parser.go#L1199: 		return nil, errors.New("x509: malformed extensions")
		parser.go#L1203: 			return nil, errors.New("x509: malformed extensions")
		parser.go#L1208: 				return nil, errors.New("x509: malformed extension")
		parser.go#L1223: 					return nil, errors.New("x509: malformed crl number")
		pem_decrypt.go#L110: var IncorrectPasswordError = errors.New("x509: decryption password incorrect")
		pem_decrypt.go#L127: 		return nil, errors.New("x509: no DEK-Info header in block")
		pem_decrypt.go#L132: 		return nil, errors.New("x509: malformed DEK-Info header")
		pem_decrypt.go#L137: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L144: 		return nil, errors.New("x509: incorrect IV size")
		pem_decrypt.go#L156: 		return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size")
		pem_decrypt.go#L171: 		return nil, errors.New("x509: invalid padding")
		pem_decrypt.go#L198: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L202: 		return nil, errors.New("x509: cannot generate IV: " + err.Error())
		pkcs1.go#L55: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs1.go#L58: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		pkcs1.go#L64: 		return nil, errors.New("x509: unsupported private key version")
		pkcs1.go#L68: 		return nil, errors.New("x509: private key contains zero or negative value")
		pkcs1.go#L83: 			return nil, errors.New("x509: private key contains zero or negative prime")
		pkcs1.go#L143: 			return nil, errors.New("x509: failed to parse public key (use ParsePKIXPublicKey instead for this key format)")
		pkcs1.go#L152: 		return nil, errors.New("x509: public key contains zero or negative value")
		pkcs1.go#L155: 		return nil, errors.New("x509: public key contains large public exponent")
		pkcs8.go#L39: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs8.go#L42: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		pkcs8.go#L50: 			return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L62: 			return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L68: 			return nil, errors.New("x509: invalid Ed25519 private key parameters")
		pkcs8.go#L81: 			return nil, errors.New("x509: invalid X25519 private key parameters")
		pkcs8.go#L115: 			return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L119: 			return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L128: 			return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		pkcs8.go#L153: 				return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L157: 				return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L166: 				return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		sec1.go#L49: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L59: 		return nil, errors.New("invalid elliptic key public key")
		sec1.go#L88: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		sec1.go#L91: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		sec1.go#L93: 		return nil, errors.New("x509: failed to parse EC private key: " + err.Error())
		sec1.go#L106: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L112: 		return nil, errors.New("x509: invalid elliptic curve private key value")
		sec1.go#L124: 			return nil, errors.New("x509: invalid private key length")
		verify.go#L174: var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate")
		verify.go#L604: 			return errors.New("x509: internal error: empty chain when appending CA cert")
		verify.go#L919: 			err = errors.New("x509: signature check attempts limit reached while verifying certificate chain")
		x509.go#L75: 			return nil, errors.New("x509: failed to parse public key (use ParsePKCS1PublicKey instead for this key format)")
		x509.go#L79: 		return nil, errors.New("x509: trailing data after ASN.1 of public-key")
		x509.go#L101: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L104: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: invalid elliptic curve public key")
		x509.go#L124: 				return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L798: var ErrUnsupportedAlgorithm = errors.New("x509: cannot verify signature: algorithm unimplemented")
		x509.go#L946: 			return errors.New("x509: ECDSA verification failure")
		x509.go#L954: 			return errors.New("x509: Ed25519 verification failure")
		x509.go#L1365: 			return ext, errors.New("x509: unknown extended key usage")
		x509.go#L1400: 							child.SetError(errors.New("invalid policy object identifier"))
		x509.go#L1471: 			return 0, ai, errors.New("x509: unsupported elliptic curve")
		x509.go#L1479: 		return 0, ai, errors.New("x509: only RSA, ECDSA and Ed25519 keys supported")
		x509.go#L1489: 				return 0, ai, errors.New("x509: requested SignatureAlgorithm does not match private key type")
		x509.go#L1492: 				return 0, ai, errors.New("x509: signing with MD5 is not supported")
		x509.go#L1502: 	return 0, ai, errors.New("x509: unknown SignatureAlgorithm")
		x509.go#L1602: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1606: 		return nil, errors.New("x509: no SerialNumber given")
		x509.go#L1615: 		return nil, errors.New("x509: serial number must be positive")
		x509.go#L1619: 		return nil, errors.New("x509: only CAs are allowed to specify MaxPathLen")
		x509.go#L1665: 		return nil, errors.New("x509: internal error: supported public key does not implement Equal")
		x509.go#L1667: 		return nil, errors.New("x509: provided PrivateKey doesn't match parent's PublicKey")
		x509.go#L1736: 		return nil, errors.New("x509: trailing data after CRL")
		x509.go#L1749: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1881: 		return nil, errors.New("x509: failed to unmarshal raw CSR Attributes")
		x509.go#L1930: 				return nil, errors.New("x509: certificate request contains duplicate requested extensions")
		x509.go#L1962: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L2053: 			return nil, errors.New("x509: failed to serialise extensions attribute: " + err.Error())
		x509.go#L2146: 		return nil, errors.New("x509: trailing data after X.509 Subject")
		x509.go#L2309: 		return nil, errors.New("x509: template can not be nil")
		x509.go#L2312: 		return nil, errors.New("x509: issuer can not be nil")
		x509.go#L2315: 		return nil, errors.New("x509: issuer must have the crlSign key usage bit set")
		x509.go#L2318: 		return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
		x509.go#L2321: 		return nil, errors.New("x509: template.ThisUpdate is after template.NextUpdate")
		x509.go#L2324: 		return nil, errors.New("x509: template contains nil Number field")
		x509.go#L2348: 				return nil, errors.New("x509: template contains entry with nil SerialNumber field")
		x509.go#L2351: 				return nil, errors.New("x509: template contains entry with zero RevocationTime field")
		x509.go#L2364: 					return nil, errors.New("x509: template contains entry with ReasonCode ExtraExtension; use ReasonCode field instead")
		x509.go#L2396: 		return nil, errors.New("x509: CRL number exceeds 20 octets")

	database/sql/driver
		driver.go#L149: var ErrSkip = errors.New("driver: skip fast-path; continue as if unimplemented")
		driver.go#L163: var ErrBadConn = errors.New("driver: bad connection")
		driver.go#L386: var ErrRemoveArgument = errors.New("driver: remove argument from query")
		driver.go#L531: 	return 0, errors.New("LastInsertId is not supported by this driver")
		driver.go#L548: 	return 0, errors.New("no LastInsertId available after DDL statement")
		driver.go#L552: 	return 0, errors.New("no RowsAffected available after DDL statement")

	embed
		embed.go#L311: 		return nil, &fs.PathError{Op: "read", Path: name, Err: errors.New("not a directory")}
		embed.go#L328: 		return nil, &fs.PathError{Op: "read", Path: name, Err: errors.New("is a directory")}
		embed.go#L397: 	return 0, &fs.PathError{Op: "read", Path: d.f.name, Err: errors.New("is a directory")}

	encoding/asn1
		asn1.go#L483: 		return "", errors.New("asn1: invalid UTF-8 string")
		asn1.go#L494: 		return "", errors.New("pkcs12: odd-length BMP string")
		asn1.go#L535: 		err = errors.New("asn1: internal error in parseTagAndLength")
		marshal.go#L643: 						return nil, errors.New("asn1: string not valid UTF-8")

	encoding/binary
		binary.go#L33: var errBufferTooSmall = errors.New("buffer too small")
		binary.go#L264: 		return errors.New("binary.Read: invalid type " + reflect.TypeOf(data).String())
		binary.go#L301: 		return 0, errors.New("binary.Decode: invalid type " + reflect.TypeOf(data).String())
		binary.go#L408: 		return errors.New("binary.Write: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		binary.go#L437: 		return 0, errors.New("binary.Encode: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		binary.go#L464: 		return nil, errors.New("binary.Append: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		varint.go#L124: var errOverflow = errors.New("binary: varint overflows a 64-bit integer")

	encoding/hex
		hex.go#L67: var ErrLength = errors.New("encoding/hex: odd length hex string")
		hex.go#L264: 		return 0, errors.New("encoding/hex: dumper closed")

	encoding/json
		stream.go#L272: 		return errors.New("json.RawMessage: UnmarshalJSON on nil pointer")

	encoding/pem
		pem.go#L244: 			return errors.New("pem: cannot encode a header key that contains a colon")

	fmt
		errors.go#L30: 		err = errors.New(s)
		scan.go#L180: 	return 0, errors.New("ScanState's Read should not be called. Use ReadRune")
		scan.go#L244: 	panic(scanError{errors.New(err)})
		scan.go#L371: 		return errors.New("fmt: scanning called UnreadRune with no rune available")
		scan.go#L465: var errComplex = errors.New("syntax error scanning complex number")
		scan.go#L466: var errBool = errors.New("syntax error scanning boolean")

	github.com/coinbase/cdp-sdk/go/auth
		jwt.go#L23: 		return "", errors.New("key name is required")
		jwt.go#L26: 		return "", errors.New("private key is required")
		jwt.go#L29: 		return "", errors.New("request details (method, host, path) are required")
		jwt.go#L53: 	return "", errors.New("invalid key format - must be either PEM EC key or base64 Ed25519 key")
		jwt.go#L59: 		return "", errors.New("wallet Secret is not defined")
		jwt.go#L145: 		return "", errors.New("failed to parse PEM block")
		jwt.go#L187: 		return "", errors.New("invalid Ed25519 key length")

	github.com/golang-jwt/jwt/v5
		ecdsa.go#L13: 	ErrECDSAVerification = errors.New("crypto/ecdsa: verification error")
		ecdsa_utils.go#L11: 	ErrNotECPublicKey  = errors.New("key is not a valid ECDSA public key")
		ecdsa_utils.go#L12: 	ErrNotECPrivateKey = errors.New("key is not a valid ECDSA private key")
		ed25519.go#L11: 	ErrEd25519Verification = errors.New("ed25519: verification error")
		ed25519_utils.go#L12: 	ErrNotEdPrivateKey = errors.New("key is not a valid Ed25519 private key")
		ed25519_utils.go#L13: 	ErrNotEdPublicKey  = errors.New("key is not a valid Ed25519 public key")
		errors.go#L9: 	ErrInvalidKey                = errors.New("key is invalid")
		errors.go#L10: 	ErrInvalidKeyType            = errors.New("key is of invalid type")
		errors.go#L11: 	ErrHashUnavailable           = errors.New("the requested hash function is unavailable")
		errors.go#L12: 	ErrTokenMalformed            = errors.New("token is malformed")
		errors.go#L13: 	ErrTokenUnverifiable         = errors.New("token is unverifiable")
		errors.go#L14: 	ErrTokenSignatureInvalid     = errors.New("token signature is invalid")
		errors.go#L15: 	ErrTokenRequiredClaimMissing = errors.New("token is missing required claim")
		errors.go#L16: 	ErrTokenInvalidAudience      = errors.New("token has invalid audience")
		errors.go#L17: 	ErrTokenExpired              = errors.New("token is expired")
		errors.go#L18: 	ErrTokenUsedBeforeIssued     = errors.New("token used before issued")
		errors.go#L19: 	ErrTokenInvalidIssuer        = errors.New("token has invalid issuer")
		errors.go#L20: 	ErrTokenInvalidSubject       = errors.New("token has invalid subject")
		errors.go#L21: 	ErrTokenNotValidYet          = errors.New("token is not valid yet")
		errors.go#L22: 	ErrTokenInvalidId            = errors.New("token has invalid id")
		errors.go#L23: 	ErrTokenInvalidClaims        = errors.New("token has invalid claims")
		errors.go#L24: 	ErrInvalidType               = errors.New("invalid type for claim")
		hmac.go#L21: 	ErrSignatureInvalid = errors.New("signature is invalid")
		rsa_utils.go#L11: 	ErrKeyMustBePEMEncoded = errors.New("invalid key: Key must be a PEM encoded PKCS1 or PKCS8 key")
		rsa_utils.go#L12: 	ErrNotRSAPrivateKey    = errors.New("key is not a valid RSA private key")
		rsa_utils.go#L13: 	ErrNotRSAPublicKey     = errors.New("key is not a valid RSA public key")

	github.com/google/uuid
		uuid.go#L91: 				return uuid, errors.New("invalid UUID format")
		uuid.go#L101: 		return uuid, errors.New("invalid UUID format")
		uuid.go#L112: 			return uuid, errors.New("invalid UUID format")
		uuid.go#L136: 				return uuid, errors.New("invalid UUID format")
		uuid.go#L146: 		return uuid, errors.New("invalid UUID format")
		uuid.go#L157: 			return uuid, errors.New("invalid UUID format")
		uuid.go#L219: 				return errors.New("invalid UUID format")
		uuid.go#L230: 			return errors.New("invalid UUID format")
		uuid.go#L234: 				return errors.New("invalid UUID format")

	github.com/oapi-codegen/runtime
		bindform.go#L38: 		return errors.New("form data body should be a struct")
		bindform.go#L62: 				return errors.New("unsupported encoding, only application/json is supported")
		bindform.go#L94: 		return nil, errors.New("form data body should be a struct")
		bindform.go#L117: 			return nil, errors.New("unsupported encoding, only application/json is supported")
		bindparam.go#L465: 			return errors.New("deepObjects must be exploded")
		bindstring.go#L58: 		return errors.New("destination is not settable")
		deepobject.go#L182: 		return nil, errors.New("expected a struct as input")
		deepobject.go#L333: 		return errors.New("unhandled type: " + it.String())
		deepobject.go#L346: 			return errors.New("array deepObjects must have consecutive indices")
		styleparam.go#L109: 			return "", errors.New("deepObjects must be exploded")
		styleparam.go#L223: 			return "", errors.New("deepObjects must be exploded")
		styleparam.go#L287: 			return "", errors.New("deepObjects must be exploded")
		styleparam.go#L294: 		return "", errors.New("map not of type map[string]interface{}")

	github.com/oapi-codegen/runtime/types
		email.go#L9: var ErrValidationEmail = errors.New("email: failed to pass regex validation")

	hash/crc32
		crc32.go#L183: 		return errors.New("hash/crc32: invalid hash state identifier")
		crc32.go#L186: 		return errors.New("hash/crc32: invalid hash state size")
		crc32.go#L189: 		return errors.New("hash/crc32: tables do not match")

	internal/filepathlite
		path.go#L18: var errInvalidPath = errors.New("invalid path")

	internal/oserror
		errors.go#L13: 	ErrInvalid    = errors.New("invalid argument")
		errors.go#L14: 	ErrPermission = errors.New("permission denied")
		errors.go#L15: 	ErrExist      = errors.New("file already exists")
		errors.go#L16: 	ErrNotExist   = errors.New("file does not exist")
		errors.go#L17: 	ErrClosed     = errors.New("file already closed")

	internal/poll
		fd.go#L35: var ErrFileClosing = errors.New("use of closed file")
		fd.go#L39: var ErrNoDeadline = errors.New("file type does not support deadline")
		fd.go#L66: var ErrNotPollable = errors.New("not pollable")
		fd_poll_runtime.go#L82: 		return errors.New("waiting for unsupported file type")

	io
		io.go#L29: var ErrShortWrite = errors.New("short write")
		io.go#L32: var errInvalidWrite = errors.New("invalid write result")
		io.go#L35: var ErrShortBuffer = errors.New("short buffer")
		io.go#L44: var EOF = errors.New("EOF")
		io.go#L48: var ErrUnexpectedEOF = errors.New("unexpected EOF")
		io.go#L53: var ErrNoProgress = errors.New("multiple Read calls return no data or error")
		io.go#L521: var errWhence = errors.New("Seek: invalid whence")
		io.go#L522: var errOffset = errors.New("Seek: invalid offset")
		pipe.go#L36: var ErrClosedPipe = errors.New("io: read/write on closed pipe")

	io/fs
		readdir.go#L42: 		return nil, &PathError{Op: "readdir", Path: name, Err: errors.New("not implemented")}
		sub.go#L122: 			return nil, errors.New("invalid result from inner fsys Glob: " + name + " not in " + f.dir) // can't use fmt in this package
		walk.go#L15: var SkipDir = errors.New("skip this directory")
		walk.go#L20: var SkipAll = errors.New("skip everything and stop the walk")

	math/big
		floatmarsh.go#L72: 		return errors.New("Float.GobDecode: buffer too small")
		floatmarsh.go#L91: 			return errors.New("Float.GobDecode: buffer too small for finite form float")
		floatmarsh.go#L103: 		return errors.New("Float.GobDecode: " + msg)
		intconv.go#L251: 		return errors.New("Int.Scan: invalid verb")
		natconv.go#L60: 	errNoDigits = errors.New("number has no digits")
		natconv.go#L61: 	errInvalSep = errors.New("'_' must separate successive digits")
		ratconv.go#L32: 		return errors.New("Rat.Scan: invalid verb")
		ratconv.go#L35: 		return errors.New("Rat.Scan: invalid syntax")
		ratmarsh.go#L30: 		return nil, errors.New("Rat.GobEncode: numerator too large")
		ratmarsh.go#L50: 		return errors.New("Rat.GobDecode: buffer too small")
		ratmarsh.go#L59: 		return errors.New("Rat.GobDecode: invalid length")
		ratmarsh.go#L63: 		return errors.New("Rat.GobDecode: buffer too small")

	math/rand/v2
		chacha8.go#L80: 			return errors.New("invalid ChaCha8 Read buffer encoding")
		pcg.go#L43: var errUnmarshalPCG = errors.New("invalid PCG encoding")

	mime
		encodedword.go#L29: 	errInvalidWord = errors.New("mime: invalid RFC 2047 encoded-word")
		mediatype.go#L106: 		return errors.New("mime: no media type")
		mediatype.go#L112: 		return errors.New("mime: expected slash after first token")
		mediatype.go#L116: 		return errors.New("mime: expected token after slash")
		mediatype.go#L119: 		return errors.New("mime: unexpected content after media subtype")
		mediatype.go#L127: var ErrInvalidMediaParameter = errors.New("mime: invalid media parameter")
		mediatype.go#L185: 			return "", nil, errors.New("mime: duplicate parameter name")

	mime/multipart
		formdata.go#L20: var ErrMessageTooLarge = errors.New("multipart: message too large")
		writer.go#L47: 		return errors.New("mime: SetBoundary called after write")
		writer.go#L51: 		return errors.New("mime: invalid boundary length")
		writer.go#L66: 		return errors.New("mime: invalid boundary character")
		writer.go#L194: 		return 0, errors.New("multipart: can't write to finished part")

	net
		cgo_unix.go#L328: 		return nil, errors.New("res_ninit failure: " + err.Error())
		cgo_unix.go#L353: 			return nil, errors.New("res_nsearch failure")
		dnsclient_unix.go#L42: 	errLameReferral              = errors.New("lame referral")
		dnsclient_unix.go#L43: 	errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message")
		dnsclient_unix.go#L44: 	errCannotMarshalDNSMessage   = errors.New("cannot marshal DNS message")
		dnsclient_unix.go#L45: 	errServerMisbehaving         = errors.New("server misbehaving")
		dnsclient_unix.go#L46: 	errInvalidDNSResponse        = errors.New("invalid DNS response")
		dnsclient_unix.go#L47: 	errNoAnswerFromDNSServer     = errors.New("no answer from DNS server")
		interface.go#L32: 	errInvalidInterface         = errors.New("invalid network interface")
		interface.go#L33: 	errInvalidInterfaceIndex    = errors.New("invalid network interface index")
		interface.go#L34: 	errInvalidInterfaceName     = errors.New("invalid network interface name")
		interface.go#L35: 	errNoSuchInterface          = errors.New("no such network interface")
		interface.go#L36: 	errNoSuchMulticastInterface = errors.New("no such multicast network interface")
		lookup.go#L898: 		return "", errors.New("no CNAME record received")
		lookup.go#L902: 		return "", errors.New("could not parse CNAME record")
		net.go#L428: 	errNoSuitableAddress = errors.New("no suitable address found")
		net.go#L431: 	errMissingAddress = errors.New("missing address")
		net.go#L435: 	ErrWriteToConnected = errors.New("use of WriteTo with pre-connected connection")
		nss.go#L174: 			conf.err = errors.New("no colon on line")
		nss.go#L198: 					conf.err = errors.New("unclosed criterion bracket")
		nss.go#L204: 					conf.err = errors.New("invalid criteria: " + srcs[1:bclose])
		nss.go#L230: 			return errors.New("criterion too short")
		nss.go#L234: 			return errors.New("criterion lacks equal sign")
		unixsock_posix.go#L42: 		return nil, errors.New("unknown mode: " + mode)

	net/http
		client.go#L207: var ErrSchemeMismatch = errors.New("http: server gave HTTP response to HTTPS client")
		client.go#L216: 		return nil, alwaysFalse, errors.New("http: no Client.Transport or DefaultTransport")
		client.go#L221: 		return nil, alwaysFalse, errors.New("http: nil Request.URL")
		client.go#L226: 		return nil, alwaysFalse, errors.New("http: Request.RequestURI can't be set in client requests")
		client.go#L496: var ErrUseLastResponse = errors.New("net/http: use last response")
		client.go#L603: 			Err: errors.New("http: nil Request.URL"),
		client.go#L818: 		return errors.New("stopped after 10 redirects")
		cookie.go#L61: 	errBlankCookie           = errors.New("http: blank cookie")
		cookie.go#L62: 	errEqualNotFoundInCookie = errors.New("http: '=' not found in cookie")
		cookie.go#L63: 	errInvalidCookieName     = errors.New("http: invalid cookie name")
		cookie.go#L64: 	errInvalidCookieValue    = errors.New("http: invalid cookie value")
		cookie.go#L296: 		return errors.New("http: nil Cookie")
		cookie.go#L299: 		return errors.New("http: invalid Cookie.Name")
		cookie.go#L302: 		return errors.New("http: invalid Cookie.Expires")
		cookie.go#L318: 			return errors.New("http: invalid Cookie.Domain")
		cookie.go#L323: 			return errors.New("http: partitioned cookies must be set with Secure")
		fs.go#L79: 		return nil, errors.New("http: invalid or unsafe file path")
		fs.go#L259: var errSeeker = errors.New("seeker can't seek")
		fs.go#L263: var errNoOverlap = errors.New("invalid range: failed to overlap")
		fs.go#L898: var errMissingSeek = errors.New("io.File missing Seek method")
		fs.go#L899: var errMissingReadDir = errors.New("io.File directory missing ReadDir method")
		fs.go#L1013: 		return nil, errors.New("invalid range")
		fs.go#L1024: 			return nil, errors.New("invalid range")
		fs.go#L1035: 				return nil, errors.New("invalid range")
		fs.go#L1039: 				return nil, errors.New("invalid range")
		fs.go#L1049: 				return nil, errors.New("invalid range")
		fs.go#L1064: 					return nil, errors.New("invalid range")
		h2_bundle.go#L1101: var http2errReadEmpty = errors.New("read from empty dataBuffer")
		h2_bundle.go#L1246: var http2errFromPeer = errors.New("received from peer")
		h2_bundle.go#L1309: 	http2errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
		h2_bundle.go#L1310: 	http2errPseudoAfterRegular   = errors.New("pseudo header field after regular")
		h2_bundle.go#L1883: var http2ErrFrameTooLarge = errors.New("http2: frame too large")
		h2_bundle.go#L1944: 	fr.errDetail = errors.New(reason)
		h2_bundle.go#L2043: 	http2errStreamID    = errors.New("invalid stream ID")
		h2_bundle.go#L2044: 	http2errDepStreamID = errors.New("invalid dependent stream ID")
		h2_bundle.go#L2045: 	http2errPadLength   = errors.New("pad length too large")
		h2_bundle.go#L2046: 	http2errPadBytes    = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
		h2_bundle.go#L2396: 		return errors.New("illegal window increment value")
		h2_bundle.go#L2937: 		return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
		h2_bundle.go#L3192: 		err = errors.New("invalid base " + strconv.Itoa(base))
		h2_bundle.go#L3779: 	http2errClosedPipeWrite        = errors.New("write on closed buffer")
		h2_bundle.go#L3780: 	http2errUninitializedPipeWrite = errors.New("write on uninitialized buffer")
		h2_bundle.go#L3893: 	http2errClientDisconnected = errors.New("client disconnected")
		h2_bundle.go#L3894: 	http2errClosedBody         = errors.New("body closed by handler")
		h2_bundle.go#L3895: 	http2errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
		h2_bundle.go#L3896: 	http2errStreamClosed       = errors.New("http2: stream closed")
		h2_bundle.go#L4916: var http2errPrefaceTimeout = errors.New("timeout waiting for client preface")
		h2_bundle.go#L5146: var http2errHandlerPanicked = errors.New("http2: handler panicked")
		h2_bundle.go#L6856: 		return 0, errors.New("http2: handler wrote more than declared Content-Length")
		h2_bundle.go#L6876: 	http2ErrRecursivePush    = errors.New("http2: recursive push not allowed")
		h2_bundle.go#L6877: 	http2ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
		h2_bundle.go#L6925: 			return errors.New("URL must have a host")
		h2_bundle.go#L7110: 		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
		h2_bundle.go#L7727: 		return nil, errors.New("http2: unsupported scheme")
		h2_bundle.go#L7780: 	http2errClientConnClosed    = errors.New("http2: client conn is closed")
		h2_bundle.go#L7781: 	http2errClientConnUnusable  = errors.New("http2: client conn not usable")
		h2_bundle.go#L7782: 	http2errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
		h2_bundle.go#L7880: 		return nil, errors.New("http2: could not negotiate protocol mutually")
		h2_bundle.go#L8329: 	err := errors.New("http2: client connection force closed via ClientConn.Close")
		h2_bundle.go#L8336: 	err := errors.New("http2: client connection lost")
		h2_bundle.go#L8345: var http2errRequestCanceled = errors.New("net/http: request canceled")
		h2_bundle.go#L8860: 	http2errStopReqBodyWrite = errors.New("http2: aborting request body write")
		h2_bundle.go#L8863: 	http2errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
		h2_bundle.go#L8865: 	http2errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
		h2_bundle.go#L9104: var http2errNilRequestURL = errors.New("http2: Request.URI is nil")
		h2_bundle.go#L9122: 		return nil, errors.New("http2: invalid Host header")
		h2_bundle.go#L9567: 			Cause:    errors.New("protocol error: headers after END_STREAM"),
		h2_bundle.go#L9626: 		return nil, errors.New("malformed response from server: missing status pseudo header")
		h2_bundle.go#L9630: 		return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
		h2_bundle.go#L9672: 			return nil, errors.New("1xx informational response with END_STREAM flag")
		h2_bundle.go#L9677: 			return nil, errors.New("http2: too many 1xx informational responses")
		h2_bundle.go#L9784: 				err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
		h2_bundle.go#L9824: var http2errClosedResponseBody = errors.New("http2: response body closed")
		h2_bundle.go#L10260: 	http2errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
		h2_bundle.go#L10261: 	http2errRequestHeaderListSize  = errors.New("http2: request header list larger than peer's advertised limit")
		pattern.go#L86: 		return nil, errors.New("empty pattern")
		pattern.go#L113: 		return nil, errors.New("host/path missing /")
		pattern.go#L119: 		return nil, errors.New("host contains '{' (missing initial '/'?)")
		pattern.go#L127: 		return nil, errors.New("non-CONNECT pattern with unclean path can never match")
		pattern.go#L153: 				return nil, errors.New("bad wildcard segment (must start with '{')")
		pattern.go#L156: 				return nil, errors.New("bad wildcard segment (must end with '}')")
		pattern.go#L161: 					return nil, errors.New("{$} not at end")
		pattern.go#L168: 				return nil, errors.New("{...} wildcard not at end")
		pattern.go#L171: 				return nil, errors.New("empty wildcard")
		request.go#L40: var ErrMissingFile = errors.New("http: no such file")
		request.go#L451: var ErrNoCookie = errors.New("http: named cookie not present")
		request.go#L508: 		return nil, errors.New("http: MultipartReader called twice")
		request.go#L511: 		return nil, errors.New("http: multipart handled by ParseMultipartForm")
		request.go#L523: 		return nil, errors.New("missing form body")
		request.go#L586: var errMissingHost = errors.New("http: Request.Write on Request with no Host or URL set")
		request.go#L646: 			return errors.New("http: invalid Host header")
		request.go#L666: 		return errors.New("net/http: can't write control character in Request.URL")
		request.go#L909: 		return nil, errors.New("net/http: nil Context")
		request.go#L1274: 		err = errors.New("missing form body")
		request.go#L1300: 			err = errors.New("http: POST too large")
		request.go#L1381: 		return errors.New("http: multipart handled by MultipartReader")
		request.go#L1457: 		return nil, nil, errors.New("http: multipart handled by MultipartReader")
		response.go#L131: var ErrNoLocation = errors.New("http: no Location header in response")
		server.go#L43: 	ErrBodyNotAllowed = errors.New("http: request method or response status code does not allow body")
		server.go#L50: 	ErrHijacked = errors.New("http: connection has been hijacked")
		server.go#L56: 	ErrContentLength = errors.New("http: wrote more than the declared Content-Length")
		server.go#L61: 	ErrWriteAfterFlush = errors.New("unused")
		server.go#L1016: var errTooLarge = errors.New("http: request too large")
		server.go#L1917: var ErrAbortHandler = errors.New("net/http: abort Handler")
		server.go#L2803: 		return errors.New("http: invalid pattern")
		server.go#L2806: 		return errors.New("http: nil handler")
		server.go#L2809: 		return errors.New("http: nil handler")
		server.go#L3288: var ErrServerClosed = errors.New("http: Server closed")
		server.go#L3630: var ErrHandlerTimeout = errors.New("http: Handler timeout")
		socks_bundle.go#L63: 			return nil, errors.New("too many authentication methods")
		socks_bundle.go#L78: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L82: 		return nil, errors.New("no acceptable authentication methods")
		socks_bundle.go#L100: 			return nil, errors.New("unknown address type")
		socks_bundle.go#L104: 			return nil, errors.New("FQDN too long")
		socks_bundle.go#L119: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L122: 		return nil, errors.New("unknown error " + cmdErr.String())
		socks_bundle.go#L125: 		return nil, errors.New("non-zero reserved field")
		socks_bundle.go#L142: 		return nil, errors.New("unknown address type " + strconv.Itoa(int(b[3])))
		socks_bundle.go#L171: 		return "", 0, errors.New("port number out of range " + port)
		socks_bundle.go#L314: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L350: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L393: 		return errors.New("network not implemented")
		socks_bundle.go#L398: 		return errors.New("command not implemented")
		socks_bundle.go#L449: 			return errors.New("invalid username/password")
		socks_bundle.go#L465: 			return errors.New("invalid username/password version")
		socks_bundle.go#L468: 			return errors.New("username/password authentication failed")
		socks_bundle.go#L472: 	return errors.New("unsupported authentication method " + strconv.Itoa(int(auth)))
		transfer.go#L828: var ErrBodyReadAfterClose = errors.New("http: invalid Read on closed Body")
		transfer.go#L908: var errTrailerEOF = errors.New("http: unexpected EOF reading trailer")
		transfer.go#L933: 		return errors.New("http: suspiciously long trailer after chunked body")
		transport.go#L537: 		return nil, errors.New("http: nil Request.URL")
		transport.go#L541: 		return nil, errors.New("http: nil Request.Header")
		transport.go#L582: 		return nil, errors.New("http: no Host in request URL")
		transport.go#L699: var errCannotRewind = errors.New("net/http: cannot rewind body after connection loss")
		transport.go#L804: var ErrSkipAltProtocol = errors.New("net/http: skip alternate protocol")
		transport.go#L948: 	errKeepAlivesDisabled = errors.New("http: putIdleConn: keep alives disabled")
		transport.go#L949: 	errConnBroken         = errors.New("http: putIdleConn: connection is in bad state")
		transport.go#L950: 	errCloseIdle          = errors.New("http: putIdleConn: CloseIdleConnections was called")
		transport.go#L951: 	errTooManyIdle        = errors.New("http: putIdleConn: too many idle connections")
		transport.go#L952: 	errTooManyIdleHost    = errors.New("http: putIdleConn: too many idle connections for host")
		transport.go#L953: 	errCloseIdleConns     = errors.New("http: CloseIdleConnections called")
		transport.go#L954: 	errReadLoopExiting    = errors.New("http: persistConn.readLoop exiting")
		transport.go#L955: 	errIdleConnTimeout    = errors.New("http: idle connection timeout")
		transport.go#L961: 	errServerClosedIdle = errors.New("http: server closed idle connection")
		transport.go#L1228: 			err = errors.New("net/http: Transport.DialContext hook returned (nil, nil)")
		transport.go#L1235: 			err = errors.New("net/http: Transport.Dial hook returned (nil, nil)")
		transport.go#L1423: 		err = errors.New("net/http: Transport.DialTLS or DialTLSContext returned (nil, nil)")
		transport.go#L1848: 				return nil, errors.New("unknown status code")
		transport.go#L1850: 			return nil, errors.New(text)
		transport.go#L2167: var errCallerOwnsConn = errors.New("read loop ending; caller owns writable underlying conn")
		transport.go#L2413: 				return nil, errors.New("net/http: too many 1xx informational responses")
		transport.go#L2649: var errRequestCanceledConn = errors.New("net/http: request canceled while waiting for connection") // TODO: unify?
		transport.go#L2653: var errRequestDone = errors.New("net/http: request completed")
		transport.go#L2900: var errReadOnClosedResBody = errors.New("http: read on closed response body")

	net/http/internal
		chunked.go#L21: var ErrLineTooLong = errors.New("header line too long")
		chunked.go#L81: 		cr.err = errors.New("chunked encoding contains too much non-data")
		chunked.go#L108: 					cr.err = errors.New("malformed chunked encoding")
		chunked.go#L174: 		return nil, errors.New("chunked line ends with bare LF")
		chunked.go#L176: 		return nil, errors.New("invalid CR in chunked line")
		chunked.go#L280: 		return 0, errors.New("empty hex number for chunk length")
		chunked.go#L291: 			return 0, errors.New("invalid byte in chunk length")
		chunked.go#L294: 			return 0, errors.New("http chunk length too large")

	net/netip
		netip.go#L677: 		return Prefix{}, errors.New("negative Prefix bits")
		netip.go#L685: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv4")
		netip.go#L690: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv6")
		netip.go#L1051: 	return errors.New("unexpected slice size")
		netip.go#L1078: 		return "", "", false, errors.New("not an ip:port")
		netip.go#L1083: 		return "", "", false, errors.New("no IP")
		netip.go#L1086: 		return "", "", false, errors.New("no port")
		netip.go#L1090: 			return "", "", false, errors.New("missing ]")
		netip.go#L1111: 		return ipp, errors.New("invalid port " + strconv.Quote(port) + " parsing " + strconv.Quote(s))
		netip.go#L1119: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", square brackets can only be used with IPv6 addresses")
		netip.go#L1121: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", IPv6 addresses must be surrounded by square brackets")
		netip.go#L1244: 		return errors.New("unexpected slice size")
		netip.go#L1533: 		return errors.New("unexpected slice size")

	net/textproto
		reader.go#L22: var errMessageTooLarge = errors.New("message too large")

	net/url
		url.go#L456: 				return "", "", errors.New("missing protocol scheme")
		url.go#L512: 		return nil, errors.New("net/url: invalid control character in URL")
		url.go#L516: 		return nil, errors.New("empty url")
		url.go#L546: 			return nil, errors.New("invalid URI for request")
		url.go#L557: 			return nil, errors.New("first path segment in URL cannot contain colon")
		url.go#L602: 		return nil, "", errors.New("net/url: invalid userinfo")
		url.go#L630: 			return "", errors.New("missing ']' in host")

	os
		exec.go#L18: var ErrProcessDone = errors.New("os: process already finished")
		exec_unix.go#L89: 		return errors.New("os: unsupported signal type")
		exec_unix.go#L107: 		return errors.New("os: process already released")
		exec_unix.go#L110: 		return errors.New("os: process not initialized")
		exec_unix.go#L120: 		return errors.New("os: process already released")
		executable_procfs.go#L19: 		return "", errors.New("Executable not implemented for " + runtime.GOOS)
		file.go#L138: 		return 0, &PathError{Op: "readat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L212: var errWriteAtInAppendMode = errors.New("os: invalid use of WriteAt on file opened with O_APPEND")
		file.go#L228: 		return 0, &PathError{Op: "writeat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L484: 			return "", errors.New("%LocalAppData% is not defined")
		file.go#L490: 			return "", errors.New("$HOME is not defined")
		file.go#L497: 			return "", errors.New("$home is not defined")
		file.go#L506: 				return "", errors.New("neither $XDG_CACHE_HOME nor $HOME are defined")
		file.go#L535: 			return "", errors.New("%AppData% is not defined")
		file.go#L541: 			return "", errors.New("$HOME is not defined")
		file.go#L548: 			return "", errors.New("$home is not defined")
		file.go#L557: 				return "", errors.New("neither $XDG_CONFIG_HOME nor $HOME are defined")
		file.go#L592: 	return "", errors.New(enverr + " is not defined")
		file.go#L767: 		return "", errors.New("os: DirFS with empty root")
		pidfd_linux.go#L134: 		return errors.New("os: process already released")
		tempfile.go#L60: var errPatternHasSeparator = errors.New("pattern contains path separator")

	path
		match.go#L14: var ErrBadPattern = errors.New("syntax error in pattern")

	path/filepath
		match.go#L18: var ErrBadPattern = errors.New("syntax error in pattern")
		path.go#L205: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		path.go#L231: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		symlink.go#L101: 			return "", errors.New("EvalSymlinks: too many links")

	reflect
		value.go#L1335: 					return Value{}, errors.New("reflect: indirection through nil pointer to embedded struct field " + nameFor(v.typ().Elem()))

	strconv
		atoi.go#L21: var ErrRange = errors.New("value out of range")
		atoi.go#L24: var ErrSyntax = errors.New("invalid syntax")
		atoi.go#L56: 	return &NumError{fn, stringslite.Clone(str), errors.New("invalid base " + Itoa(base))}
		atoi.go#L60: 	return &NumError{fn, stringslite.Clone(str), errors.New("invalid bit size " + Itoa(bitSize))}

	strings
		reader.go#L53: 		return 0, errors.New("strings.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("strings.Reader.UnreadByte: at beginning of string")
		reader.go#L105: 		return errors.New("strings.Reader.UnreadRune: at beginning of string")
		reader.go#L108: 		return errors.New("strings.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("strings.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("strings.Reader.Seek: negative position")

	syscall
		exec_linux.go#L781: 		return errpkg.New("clone(CLONE_PIDFD) failed to return pidfd")
		exec_unix.go#L193: 		return 0, errorspkg.New("both Setctty and Foreground set in SysProcAttr")
		exec_unix.go#L196: 		return 0, errorspkg.New("Setctty set but Ctty not valid in child")

	time
		format.go#L467: var errAtoi = errors.New("time: invalid number")
		format.go#L834: var errBad = errors.New("bad value for field") // placeholder not passed to user
		format.go#L1547: var errLeadingInt = errors.New("time: bad [0-9]*") // never printed
		format.go#L1636: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1648: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1654: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1668: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1680: 			return 0, errors.New("time: missing unit in duration " + quote(orig))
		format.go#L1686: 			return 0, errors.New("time: unknown unit " + quote(u) + " in duration " + quote(orig))
		format.go#L1690: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1699: 				return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1704: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1711: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format_rfc3339.go#L72: 		return b, errors.New("year outside of range [0,9999]")
		format_rfc3339.go#L76: 			return b, errors.New("timezone hour outside of range [0,23]")
		sys_unix.go#L55: 				return errors.New("short read")
		time.go#L1295: 			return nil, errors.New("Time.MarshalBinary: unexpected zone offset")
		time.go#L1330: 		return errors.New("Time.UnmarshalBinary: no data")
		time.go#L1335: 		return errors.New("Time.UnmarshalBinary: unsupported version")
		time.go#L1343: 		return errors.New("Time.UnmarshalBinary: invalid length")
		time.go#L1398: 		return nil, errors.New("Time.MarshalJSON: " + err.Error())
		time.go#L1411: 		return errors.New("Time.UnmarshalJSON: input is not a JSON string")
		time.go#L1427: 		return nil, errors.New("Time.MarshalText: " + err.Error())
		zoneinfo.go#L646: var errLocation = errors.New("time: invalid location name")
		zoneinfo_read.go#L112: var errBadData = errors.New("malformed time zone information")
		zoneinfo_read.go#L421: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L429: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L471: 			return nil, errors.New("unsupported compression for " + name + " in " + zipfile)
		zoneinfo_read.go#L496: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L502: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L568: 	return nil, errors.New("unknown time zone " + name)

	vendor/golang.org/x/crypto/chacha20
		chacha_generic.go#L82: 		return nil, errors.New("chacha20: wrong key size")
		chacha_generic.go#L93: 		return nil, errors.New("chacha20: wrong nonce size")
		chacha_generic.go#L354: 		return nil, errors.New("chacha20: wrong HChaCha20 key size")
		chacha_generic.go#L357: 		return nil, errors.New("chacha20: wrong HChaCha20 nonce size")

	vendor/golang.org/x/crypto/chacha20poly1305
		chacha20poly1305.go#L42: 		return nil, errors.New("chacha20poly1305: bad key length")
		chacha20poly1305.go#L69: var errOpen = errors.New("chacha20poly1305: message authentication failed")
		xchacha20poly1305.go#L26: 		return nil, errors.New("chacha20poly1305: bad key length")

	vendor/golang.org/x/crypto/cryptobyte
		builder.go#L244: 			b.err = errors.New("pending ASN.1 child too long")
		builder.go#L302: 		b.err = errors.New("cryptobyte: length overflow")
		builder.go#L305: 		b.err = errors.New("cryptobyte: Builder is exceeding its fixed-size buffer")

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L51: 		return 0, errors.New("hkdf: entropy limit reached")

	vendor/golang.org/x/net/dns/dnsmessage
		message.go#L252: 	ErrNotStarted = errors.New("parsing/packing of this type isn't available yet")
		message.go#L256: 	ErrSectionDone = errors.New("parsing/packing of this section has completed")
		message.go#L258: 	errBaseLen            = errors.New("insufficient data for base length type")
		message.go#L259: 	errCalcLen            = errors.New("insufficient data for calculated length type")
		message.go#L260: 	errReserved           = errors.New("segment prefix is reserved")
		message.go#L261: 	errTooManyPtr         = errors.New("too many pointers (>10)")
		message.go#L262: 	errInvalidPtr         = errors.New("invalid pointer")
		message.go#L263: 	errInvalidName        = errors.New("invalid dns name")
		message.go#L264: 	errNilResouceBody     = errors.New("nil resource body")
		message.go#L265: 	errResourceLen        = errors.New("insufficient data for resource body length")
		message.go#L266: 	errSegTooLong         = errors.New("segment length too long")
		message.go#L267: 	errNameTooLong        = errors.New("name too long")
		message.go#L268: 	errZeroSegLen         = errors.New("zero length segment")
		message.go#L269: 	errResTooLong         = errors.New("resource length too long")
		message.go#L270: 	errTooManyQuestions   = errors.New("too many Questions to pack (>65535)")
		message.go#L271: 	errTooManyAnswers     = errors.New("too many Answers to pack (>65535)")
		message.go#L272: 	errTooManyAuthorities = errors.New("too many Authorities to pack (>65535)")
		message.go#L273: 	errTooManyAdditionals = errors.New("too many Additionals to pack (>65535)")
		message.go#L274: 	errNonCanonicalName   = errors.New("name is not in canonical format (it must end with a .)")
		message.go#L275: 	errStringTooLong      = errors.New("character string exceeds maximum length (255)")

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L134: 			return nil, errors.New("refusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxy")

	vendor/golang.org/x/net/http2/hpack
		hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
		hpack.go#L238: 		return DecodingError{errors.New("truncated headers")}
		hpack.go#L287: var errNeedMore = errors.New("need more data")
		hpack.go#L334: 	return DecodingError{errors.New("invalid encoding")}
		hpack.go#L416: 		return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
		hpack.go#L425: 		return DecodingError{errors.New("dynamic table size update too large")}
		hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
		huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")

	vendor/golang.org/x/text/secure/bidirule
		bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")

	vendor/golang.org/x/text/transform
		transform.go#L21: 	ErrShortDst = errors.New("transform: short destination buffer")
		transform.go#L25: 	ErrShortSrc = errors.New("transform: short source buffer")
		transform.go#L29: 	ErrEndOfSpan = errors.New("transform: input and output are not identical")
		transform.go#L33: 	errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
		transform.go#L37: 	errShortInternal = errors.New("transform: short internal buffer")