func errors.New

956 uses

	errors (current package)
		errors.go#L61: func New(text string) error {
		errors.go#L87: var ErrUnsupported = New("unsupported operation")

	bufio
		bufio.go#L23: 	ErrInvalidUnreadByte = errors.New("bufio: invalid use of UnreadByte")
		bufio.go#L24: 	ErrInvalidUnreadRune = errors.New("bufio: invalid use of UnreadRune")
		bufio.go#L25: 	ErrBufferFull        = errors.New("bufio: buffer full")
		bufio.go#L26: 	ErrNegativeCount     = errors.New("bufio: negative count")
		bufio.go#L96: var errNegativeRead = errors.New("bufio: reader returned negative count from Read")
		bufio.go#L559: var errNegativeWrite = errors.New("bufio: writer returned negative count from Write")
		scan.go#L69: 	ErrTooLong         = errors.New("bufio.Scanner: token too long")
		scan.go#L70: 	ErrNegativeAdvance = errors.New("bufio.Scanner: SplitFunc returns negative advance count")
		scan.go#L71: 	ErrAdvanceTooFar   = errors.New("bufio.Scanner: SplitFunc returns advance count beyond input")
		scan.go#L72: 	ErrBadReadCount    = errors.New("bufio.Scanner: Read returned impossible count")
		scan.go#L124: var ErrFinalToken = errors.New("final token")

	bytes
		buffer.go#L44: var ErrTooLarge = errors.New("bytes.Buffer: too large")
		buffer.go#L45: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
		buffer.go#L398: 		return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
		buffer.go#L407: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")
		reader.go#L53: 		return 0, errors.New("bytes.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("bytes.Reader.UnreadByte: at beginning of slice")
		reader.go#L105: 		return errors.New("bytes.Reader.UnreadRune: at beginning of slice")
		reader.go#L108: 		return errors.New("bytes.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("bytes.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("bytes.Reader.Seek: negative position")

	compress/flate
		deflate.go#L698: var errWriterClosed = errors.New("flate: closed writer")

	compress/gzip
		gunzip.go#L32: 	ErrChecksum = errors.New("gzip: invalid checksum")
		gunzip.go#L34: 	ErrHeader = errors.New("gzip: invalid header")
		gzip.go#L95: 		return errors.New("gzip.Write: Extra data is too large")
		gzip.go#L113: 			return errors.New("gzip.Write: non-Latin-1 header string")

	context
		context.go#L163: var Canceled = errors.New("context canceled")

	crypto/aes
		aes_gcm.go#L40: var errOpen = errors.New("cipher: message authentication failed")

	crypto/cipher
		gcm.go#L114: 		return nil, errors.New("cipher: incorrect tag size given to GCM")
		gcm.go#L118: 		return nil, errors.New("cipher: the nonce can't have zero length, or the security of the key will be immediately compromised")
		gcm.go#L126: 		return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
		gcm.go#L196: var errOpen = errors.New("cipher: message authentication failed")

	crypto/dsa
		dsa.go#L46: var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
		dsa.go#L86: 		return errors.New("crypto/dsa: invalid ParameterSizes")
		dsa.go#L161: 		return errors.New("crypto/dsa: parameters not set up before generating key")

	crypto/ecdh
		ecdh.go#L128: 		return nil, errors.New("crypto/ecdh: private key and public key curves do not match")
		nist.go#L36: var errInvalidPrivateKey = errors.New("crypto/ecdh: invalid private key")
		nist.go#L77: 		return nil, errors.New("crypto/ecdh: invalid private key size")
		nist.go#L170: 		return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L46: 		return nil, errors.New("crypto/ecdh: invalid private key size")
		x25519.go#L69: 		return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L81: 		return nil, errors.New("crypto/ecdh: bad X25519 remote ECDH input: low order point")

	crypto/ecdsa
		ecdsa.go#L60: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L63: 		return nil, errors.New("ecdsa: invalid public key")
		ecdsa.go#L98: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L102: 		return nil, errors.New("ecdsa: invalid private key")
		ecdsa.go#L246: var errNoAsm = errors.New("no assembly implementation available")
		ecdsa.go#L316: 		return nil, errors.New("ecdsa: internal error: r is zero")
		ecdsa.go#L332: 		return nil, errors.New("ecdsa: internal error: s is zero")
		ecdsa.go#L354: 		b.SetError(errors.New("invalid integer"))
		ecdsa.go#L557: 		return nil, nil, errors.New("invalid ASN.1")
		ecdsa.go#L584: 		return p, errors.New("negative coordinate")
		ecdsa.go#L587: 		return p, errors.New("overflowing coordinate")
		ecdsa.go#L603: 		return nil, nil, errors.New("ecdsa: public key point is the infinity")
		ecdsa_legacy.go#L51: var errZeroParam = errors.New("zero parameter")
		ecdsa_legacy.go#L72: 		return nil, nil, errors.New("invalid ASN.1 from SignASN1")

	crypto/ed25519
		ed25519.go#L97: 			return nil, errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L100: 			return nil, errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L107: 			return nil, errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L115: 		return nil, errors.New("ed25519: expected opts.HashFunc() zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")
		ed25519.go#L277: 			return errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L280: 			return errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L283: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L288: 			return errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L291: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L296: 			return errors.New("ed25519: invalid signature")
		ed25519.go#L300: 		return errors.New("ed25519: expected opts.Hash zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")

	crypto/elliptic
		nistec.go#L147: 		return p, errors.New("negative coordinate")
		nistec.go#L150: 		return p, errors.New("overflowing coordinate")

	crypto/internal/bigmod
		nat.go#L159: 		return nil, errors.New("input overflows the modulus")
		nat.go#L175: 		return nil, errors.New("input overflows the modulus size")
		nat.go#L203: 		return errors.New("input overflows the modulus size")
		nat.go#L356: 		return nil, errors.New("modulus must be >= 0")
		nat.go#L358: 		return nil, errors.New("modulus must be odd")

	crypto/internal/edwards25519
		edwards25519.go#L155: 		return nil, errors.New("edwards25519: invalid point encoding length")
		edwards25519.go#L173: 		return nil, errors.New("edwards25519: invalid point encoding")
		scalar.go#L111: 		return nil, errors.New("edwards25519: invalid SetUniformBytes input length")
		scalar.go#L160: 		return nil, errors.New("invalid scalar length")
		scalar.go#L163: 		return nil, errors.New("invalid scalar encoding")
		scalar.go#L210: 		return nil, errors.New("edwards25519: invalid SetBytesWithClamping input length")

	crypto/internal/edwards25519/field
		fe.go#L200: 		return nil, errors.New("edwards25519: invalid field element input size")

	crypto/internal/nistec
		p224.go#L90: 			return nil, errors.New("invalid P224 compressed point encoding")
		p224.go#L106: 		return nil, errors.New("invalid P224 point encoding")
		p224.go#L137: 		return errors.New("P224 point not on curve")
		p224.go#L178: 		return nil, errors.New("P224 point is the point at infinity")
		p224.go#L414: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L97: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L112: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L119: 			return nil, errors.New("invalid P256 compressed point encoding")
		p256_asm.go#L133: 		return nil, errors.New("invalid P256 point encoding")
		p256_asm.go#L164: 		return errors.New("P256 point not on curve")
		p256_asm.go#L407: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L422: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L509: 		return nil, errors.New("P256 point is the point at infinity")
		p256_ordinv.go#L23: 		return nil, errors.New("invalid scalar length")
		p384.go#L90: 			return nil, errors.New("invalid P384 compressed point encoding")
		p384.go#L106: 		return nil, errors.New("invalid P384 point encoding")
		p384.go#L137: 		return errors.New("P384 point not on curve")
		p384.go#L178: 		return nil, errors.New("P384 point is the point at infinity")
		p384.go#L414: 		return nil, errors.New("invalid scalar length")
		p521.go#L90: 			return nil, errors.New("invalid P521 compressed point encoding")
		p521.go#L106: 		return nil, errors.New("invalid P521 point encoding")
		p521.go#L137: 		return errors.New("P521 point not on curve")
		p521.go#L178: 		return nil, errors.New("P521 point is the point at infinity")
		p521.go#L414: 		return nil, errors.New("invalid scalar length")

	crypto/internal/nistec/fiat
		p224.go#L74: 		return nil, errors.New("invalid P224Element encoding")
		p224.go#L86: 			return nil, errors.New("invalid P224Element encoding")
		p256.go#L74: 		return nil, errors.New("invalid P256Element encoding")
		p256.go#L86: 			return nil, errors.New("invalid P256Element encoding")
		p384.go#L74: 		return nil, errors.New("invalid P384Element encoding")
		p384.go#L86: 			return nil, errors.New("invalid P384Element encoding")
		p521.go#L74: 		return nil, errors.New("invalid P521Element encoding")
		p521.go#L86: 			return nil, errors.New("invalid P521Element encoding")

	crypto/md5
		md5.go#L74: 		return errors.New("crypto/md5: invalid hash state identifier")
		md5.go#L77: 		return errors.New("crypto/md5: invalid hash state size")

	crypto/rand
		util.go#L18: 		return nil, errors.New("crypto/rand: prime size must be at least 2-bit")

	crypto/rsa
		pkcs1v15.go#L386: 		return 0, nil, errors.New("crypto/rsa: input must be hashed message")
		pkcs1v15.go#L390: 		return 0, nil, errors.New("crypto/rsa: unsupported hash function")
		pss.go#L45: 		return nil, errors.New("crypto/rsa: input must be hashed with given hash")
		pss.go#L115: 		return errors.New("rsa: internal error: inconsistent length")
		pss.go#L281: var invalidSaltLenErr = errors.New("crypto/rsa: PSSOptions.SaltLength cannot be negative")
		rsa.go#L85: 	errPublicModulus       = errors.New("crypto/rsa: missing public modulus")
		rsa.go#L86: 	errPublicExponentSmall = errors.New("crypto/rsa: public exponent too small")
		rsa.go#L87: 	errPublicExponentLarge = errors.New("crypto/rsa: public exponent too large")
		rsa.go#L199: 		return nil, errors.New("crypto/rsa: invalid options for Decrypt")
		rsa.go#L240: 			return errors.New("crypto/rsa: invalid prime value")
		rsa.go#L245: 		return errors.New("crypto/rsa: invalid modulus")
		rsa.go#L260: 			return errors.New("crypto/rsa: invalid exponents")
		rsa.go#L313: 			return nil, errors.New("crypto/rsa: generated key exponent too large")
		rsa.go#L353: 		return nil, errors.New("crypto/rsa: GenerateMultiPrimeKey: nprimes must be >= 2")
		rsa.go#L367: 			return nil, errors.New("crypto/rsa: too few primes of given length to generate an RSA key")
		rsa.go#L476: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
		rsa.go#L575: var ErrDecryption = errors.New("crypto/rsa: decryption error")
		rsa.go#L579: var ErrVerification = errors.New("crypto/rsa: verification error")

	crypto/sha1
		sha1.go#L66: 		return errors.New("crypto/sha1: invalid hash state identifier")
		sha1.go#L69: 		return errors.New("crypto/sha1: invalid hash state size")

	crypto/sha256
		sha256.go#L89: 		return errors.New("crypto/sha256: invalid hash state identifier")
		sha256.go#L92: 		return errors.New("crypto/sha256: invalid hash state size")

	crypto/sha512
		sha512.go#L154: 		return nil, errors.New("crypto/sha512: invalid hash function")
		sha512.go#L172: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L180: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L183: 		return errors.New("crypto/sha512: invalid hash state size")

	crypto/tls
		auth.go#L30: 			return errors.New("ECDSA verification failure")
		auth.go#L38: 			return errors.New("Ed25519 verification failure")
		auth.go#L58: 		return errors.New("internal error: unknown signature type")
		auth.go#L252: 	return 0, errors.New("tls: peer doesn't support any of the certificate's signature algorithms")
		common.go#L1109: var errNoCertificates = errors.New("tls: no certificates configured")
		common.go#L1179: 		return errors.New("no mutually supported protocol versions")
		common.go#L1247: 		return supportsRSAFallback(errors.New("client doesn't support ECDHE, can only use legacy RSA key exchange"))
		common.go#L1273: 				return errors.New("client doesn't support certificate curve")
		common.go#L1278: 				return errors.New("connection doesn't support Ed25519")
		common.go#L1311: 		return supportsRSAFallback(errors.New("client doesn't support any cipher suites compatible with the certificate"))
		common.go#L1346: 	return errors.New("chain is not signed by an acceptable CA")
		conn.go#L616: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
		conn.go#L621: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
		conn.go#L788: 		return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
		conn.go#L973: 			return 0, errors.New("tls: internal error: sending non-handshake message to QUIC transport")
		conn.go#L1171: 	errShutdown = errors.New("tls: protocol is shutdown")
		conn.go#L1239: 		return errors.New("tls: internal error: unexpected renegotiation")
		conn.go#L1268: 		return errors.New("tls: unknown Renegotiation value")
		conn.go#L1295: 		return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
		conn.go#L1315: 		return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
		conn.go#L1434: var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake complete")
		conn.go#L1562: 		c.handshakeErr = errors.New("tls: internal error: handshake should have had a result")
		conn.go#L1646: 		return errors.New("tls: VerifyHostname called on TLS server connection")
		conn.go#L1649: 		return errors.New("tls: handshake has not yet been performed")
		conn.go#L1652: 		return errors.New("tls: handshake did not verify certificate chain")
		handshake_client.go#L45: 		return nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
		handshake_client.go#L51: 			return nil, nil, errors.New("tls: invalid NextProtos value")
		handshake_client.go#L57: 		return nil, nil, errors.New("tls: NextProtos values too large")
		handshake_client.go#L62: 		return nil, nil, errors.New("tls: no supported versions satisfy MinVersion and MaxVersion")
		handshake_client.go#L114: 		return nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L125: 			return nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L150: 			return nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client.go#L247: 		return errors.New("tls: downgrade attempt detected, possibly due to a MitM attack or a broken middlebox")
		handshake_client.go#L526: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client.go#L562: 			return errors.New("tls: received unexpected CertificateStatus message")
		handshake_client.go#L588: 			return errors.New("tls: server's identity changed during renegotiation")
		handshake_client.go#L664: 		return errors.New("tls: failed to write to key log: " + err.Error())
		handshake_client.go#L757: 		return false, errors.New("tls: server selected unsupported compression format")
		handshake_client.go#L764: 			return false, errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_client.go#L774: 			return false, errors.New("tls: incorrect renegotiation extension contents")
		handshake_client.go#L792: 		return false, errors.New("tls: server resumed a session with a different version")
		handshake_client.go#L797: 		return false, errors.New("tls: server resumed a session with a different cipher suite")
		handshake_client.go#L803: 		return false, errors.New("tls: server resumed a session with a different EMS extension")
		handshake_client.go#L828: 			return errors.New("tls: server did not select an ALPN protocol")
		handshake_client.go#L833: 		return errors.New("tls: server advertised unrequested ALPN extension")
		handshake_client.go#L840: 	return errors.New("tls: server selected unadvertised ALPN protocol")
		handshake_client.go#L867: 		return errors.New("tls: server's Finished message was incorrect")
		handshake_client.go#L886: 		return errors.New("tls: server sent unrequested session ticket")
		handshake_client.go#L968: 			return errors.New("tls: failed to parse certificate from server: " + err.Error())
		handshake_client_tls13.go#L45: 		return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode")
		handshake_client_tls13.go#L52: 		return errors.New("tls: server selected TLS 1.3 in a renegotiation")
		handshake_client_tls13.go#L124: 		return errors.New("tls: server selected TLS 1.3 using the legacy version field")
		handshake_client_tls13.go#L129: 		return errors.New("tls: server selected an invalid version after a HelloRetryRequest")
		handshake_client_tls13.go#L134: 		return errors.New("tls: server sent an incorrect legacy version")
		handshake_client_tls13.go#L145: 		return errors.New("tls: server sent a ServerHello extension forbidden in TLS 1.3")
		handshake_client_tls13.go#L150: 		return errors.New("tls: server did not echo the legacy session ID")
		handshake_client_tls13.go#L155: 		return errors.New("tls: server selected unsupported compression format")
		handshake_client_tls13.go#L161: 		return errors.New("tls: server changed cipher suite after a HelloRetryRequest")
		handshake_client_tls13.go#L165: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client_tls13.go#L208: 		return errors.New("tls: server sent an unnecessary HelloRetryRequest message")
		handshake_client_tls13.go#L217: 		return errors.New("tls: received malformed key_share extension")
		handshake_client_tls13.go#L233: 			return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L237: 			return errors.New("tls: server sent an unnecessary HelloRetryRequest key_share")
		handshake_client_tls13.go#L241: 			return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client_tls13.go#L319: 		return errors.New("tls: server sent two HelloRetryRequest messages")
		handshake_client_tls13.go#L324: 		return errors.New("tls: server sent a cookie in a normal ServerHello")
		handshake_client_tls13.go#L329: 		return errors.New("tls: malformed key_share extension")
		handshake_client_tls13.go#L334: 		return errors.New("tls: server did not send a key share")
		handshake_client_tls13.go#L338: 		return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L347: 		return errors.New("tls: server selected an invalid PSK")
		handshake_client_tls13.go#L359: 		return errors.New("tls: server selected an invalid PSK and cipher suite pair")
		handshake_client_tls13.go#L378: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L383: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L454: 			return errors.New("tls: server did not send a quic_transport_parameters extension")
		handshake_client_tls13.go#L460: 			return errors.New("tls: server sent an unexpected quic_transport_parameters extension")
		handshake_client_tls13.go#L466: 		return errors.New("tls: server sent an unexpected early_data extension")
		handshake_client_tls13.go#L474: 			return errors.New("tls: server accepted 0-RTT with the wrong cipher suite")
		handshake_client_tls13.go#L478: 			return errors.New("tls: server accepted 0-RTT with the wrong ALPN")
		handshake_client_tls13.go#L525: 		return errors.New("tls: received empty certificates message")
		handshake_client_tls13.go#L552: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L560: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L566: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		handshake_client_tls13.go#L596: 		return errors.New("tls: invalid server finished hash")
		handshake_client_tls13.go#L683: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_client_tls13.go#L725: 		return errors.New("tls: received new session ticket from a client")
		handshake_client_tls13.go#L739: 		return errors.New("tls: received a session ticket with invalid lifetime")
		handshake_client_tls13.go#L745: 		return errors.New("tls: invalid early data for QUIC connection")
		handshake_messages.go#L339: 		return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_messages.go#L343: 			return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_messages.go#L362: 			return errors.New("tls: internal error: failed to update binders")
		handshake_server.go#L191: 		return errors.New("tls: client does not support uncompressed connections")
		handshake_server.go#L214: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server.go#L365: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server.go#L374: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server.go#L489: 		return errors.New("tls: session supported extended_master_secret but client does not")
		handshake_server.go#L707: 				return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server.go#L724: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server.go#L786: 		return errors.New("tls: client's Finished message is incorrect")
		handshake_server.go#L865: 			return errors.New("tls: failed to parse client certificate: " + err.Error())
		handshake_server.go#L882: 		return errors.New("tls: client didn't provide a certificate")
		handshake_server_tls13.go#L49: 		return errors.New("tls: internal error: TLS 1.3 reached in FIPS mode")
		handshake_server_tls13.go#L102: 		return errors.New("tls: client used the legacy version field to negotiate TLS 1.3")
		handshake_server_tls13.go#L120: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server_tls13.go#L129: 		return errors.New("tls: TLS 1.3 client supports illegal compression methods")
		handshake_server_tls13.go#L140: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server_tls13.go#L146: 			return errors.New("tls: early_data without pre_shared_key")
		handshake_server_tls13.go#L156: 		return errors.New("tls: client sent unexpected early data")
		handshake_server_tls13.go#L174: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server_tls13.go#L205: 		return errors.New("tls: no ECDHE curve supported by both client and server")
		handshake_server_tls13.go#L216: 		return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_server_tls13.go#L227: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L232: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L246: 			return errors.New("tls: client did not send a quic_transport_parameters extension")
		handshake_server_tls13.go#L252: 			return errors.New("tls: client sent an unexpected quic_transport_parameters extension")
		handshake_server_tls13.go#L280: 		return errors.New("tls: invalid or missing PSK binders")
		handshake_server_tls13.go#L352: 			return errors.New("tls: internal error: failed to clone hash")
		handshake_server_tls13.go#L363: 			return errors.New("tls: invalid PSK binder")
		handshake_server_tls13.go#L515: 		return errors.New("tls: client sent invalid key share in second ClientHello")
		handshake_server_tls13.go#L520: 		return errors.New("tls: client indicated early data in second ClientHello")
		handshake_server_tls13.go#L525: 		return errors.New("tls: client illegally modified second ClientHello")
		handshake_server_tls13.go#L716: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_server_tls13.go#L824: 		return errors.New("tls: internal error: unknown cipher suite")
		handshake_server_tls13.go#L937: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L945: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L951: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server_tls13.go#L985: 		return errors.New("tls: invalid client finished hash")
		key_agreement.go#L38: var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
		key_agreement.go#L39: var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
		key_agreement.go#L61: 		return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
		key_agreement.go#L78: 	return errors.New("tls: unexpected ServerKeyExchange")
		key_agreement.go#L92: 		return nil, nil, errors.New("tls: server certificate contains incorrect key type for selected ciphersuite")
		key_agreement.go#L179: 		return nil, errors.New("tls: no supported elliptic curves offered")
		key_agreement.go#L182: 		return nil, errors.New("tls: CurvePreferences includes unsupported curve")
		key_agreement.go#L224: 		return nil, errors.New("tls: certificate cannot be used with the selected cipher suite")
		key_agreement.go#L235: 		return nil, errors.New("tls: failed to sign ECDHE parameters: " + err.Error())
		key_agreement.go#L280: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L297: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L331: 			return errors.New("tls: certificate used with invalid signature algorithm")
		key_agreement.go#L355: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		key_agreement.go#L362: 		return nil, nil, errors.New("tls: missing ServerKeyExchange message")
		key_schedule.go#L125: 		return nil, errors.New("tls: internal error: unsupported curve")
		prf.go#L259: 	return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
		quic.go#L171: 		return quicError(errors.New("tls: Start called more than once"))
		quic.go#L175: 		return quicError(errors.New("tls: Config MinVersion must be at least TLS 1.13"))
		quic.go#L221: 		return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
		quic.go#L266: 		return quicError(errors.New("tls: SendSessionTicket called before handshake completed"))
		quic.go#L269: 		return quicError(errors.New("tls: SendSessionTicket called on the client"))
		quic.go#L272: 		return quicError(errors.New("tls: SendSessionTicket called multiple times"))
		ticket.go#L147: 					b.SetError(errors.New("tls: internal error: empty verified chain"))
		ticket.go#L198: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L203: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L213: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L221: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L235: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L240: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L244: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L250: 				return nil, errors.New("tls: invalid session encoding")
		ticket.go#L264: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L270: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L276: 		return nil, errors.New("tls: no server certificates in client session")
		ticket.go#L280: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L285: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L321: 		return nil, errors.New("tls: internal error: session ticket keys unavailable")
		ticket.go#L336: 		return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
		tls.go#L91: 		return nil, errors.New("tls: neither Certificates, GetCertificate, nor GetConfigForClient set in Config")
		tls.go#L265: 			return fail(errors.New("tls: failed to find any PEM data in certificate input"))
		tls.go#L268: 			return fail(errors.New("tls: failed to find certificate PEM data in certificate input, but did find a private key; PEM inputs may have been switched"))
		tls.go#L279: 				return fail(errors.New("tls: failed to find any PEM data in key input"))
		tls.go#L282: 				return fail(errors.New("tls: found a certificate rather than a key in the PEM for the private key"))
		tls.go#L308: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L311: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L316: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L319: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L324: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L327: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L330: 		return fail(errors.New("tls: unknown public key algorithm"))
		tls.go#L348: 			return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
		tls.go#L355: 	return nil, errors.New("tls: failed to parse private key")

	crypto/x509
		parser.go#L66: 				return "", errors.New("invalid PrintableString")
		parser.go#L72: 			return "", errors.New("invalid UTF-8 string")
		parser.go#L77: 			return "", errors.New("invalid BMPString")
		parser.go#L95: 			return "", errors.New("invalid IA5String")
		parser.go#L101: 				return "", errors.New("invalid NumericString")
		parser.go#L113: 		return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L121: 			return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L126: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute")
		parser.go#L130: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute type")
		parser.go#L135: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute value")
		parser.go#L154: 		return ai, errors.New("x509: malformed OID")
		parser.go#L162: 		return ai, errors.New("x509: malformed parameters")
		parser.go#L174: 			return t, errors.New("x509: malformed UTCTime")
		parser.go#L178: 			return t, errors.New("x509: malformed GeneralizedTime")
		parser.go#L181: 		return t, errors.New("x509: unsupported time format")
		parser.go#L202: 		return ext, errors.New("x509: malformed extension OID field")
		parser.go#L206: 			return ext, errors.New("x509: malformed extension critical field")
		parser.go#L211: 		return ext, errors.New("x509: malformed extension value field")
		parser.go#L226: 			return nil, errors.New("x509: RSA key missing NULL parameters")
		parser.go#L231: 			return nil, errors.New("x509: invalid RSA public key")
		parser.go#L234: 			return nil, errors.New("x509: invalid RSA modulus")
		parser.go#L237: 			return nil, errors.New("x509: invalid RSA public exponent")
		parser.go#L241: 			return nil, errors.New("x509: RSA modulus is not a positive number")
		parser.go#L244: 			return nil, errors.New("x509: RSA public exponent is not a positive number")
		parser.go#L256: 			return nil, errors.New("x509: invalid ECDSA parameters")
		parser.go#L260: 			return nil, errors.New("x509: unsupported elliptic curve")
		parser.go#L264: 			return nil, errors.New("x509: failed to unmarshal elliptic curve point")
		parser.go#L276: 			return nil, errors.New("x509: Ed25519 key encoded with illegal parameters")
		parser.go#L279: 			return nil, errors.New("x509: wrong Ed25519 public key size")
		parser.go#L286: 			return nil, errors.New("x509: X25519 key encoded with illegal parameters")
		parser.go#L292: 			return nil, errors.New("x509: invalid DSA public key")
		parser.go#L307: 			return nil, errors.New("x509: invalid DSA parameters")
		parser.go#L311: 			return nil, errors.New("x509: zero or negative DSA parameter")
		parser.go#L315: 		return nil, errors.New("x509: unknown public key algorithm")
		parser.go#L322: 		return 0, errors.New("x509: invalid key usage")
		parser.go#L337: 		return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L341: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L347: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L357: 		return errors.New("x509: invalid subject alternative names")
		parser.go#L363: 			return errors.New("x509: invalid subject alternative name")
		parser.go#L379: 				return errors.New("x509: SAN rfc822Name is malformed")
		parser.go#L385: 				return errors.New("x509: SAN dNSName is malformed")
		parser.go#L391: 				return errors.New("x509: SAN uniformResourceIdentifier is malformed")
		parser.go#L408: 				return errors.New("x509: cannot parse IP address of length " + strconv.Itoa(len(data)))
		parser.go#L422: 		return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L427: 			return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L441: 		return nil, errors.New("x509: invalid certificate policies")
		parser.go#L446: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L450: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L507: 		return false, errors.New("x509: invalid NameConstraints extension")
		parser.go#L515: 		return false, errors.New("x509: empty name constraints extension")
		parser.go#L538: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L580: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L604: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L694: 					return errors.New("x509: invalid CRL distribution points")
		parser.go#L699: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L704: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L710: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L718: 							return errors.New("x509: invalid CRL distribution point")
		parser.go#L729: 					return errors.New("x509: invalid authority key identifier")
		parser.go#L733: 						return errors.New("x509: invalid authority key identifier")
		parser.go#L747: 					return errors.New("x509: invalid subject key identifier")
		parser.go#L763: 				return errors.New("x509: invalid authority info access")
		parser.go#L768: 					return errors.New("x509: invalid authority info access")
		parser.go#L772: 					return errors.New("x509: invalid authority info access")
		parser.go#L778: 					return errors.New("x509: invalid authority info access")
		parser.go#L808: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L812: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L819: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L823: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L827: 		return nil, errors.New("x509: malformed version")
		parser.go#L830: 		return nil, errors.New("x509: malformed version")
		parser.go#L836: 		return nil, errors.New("x509: invalid version")
		parser.go#L841: 		return nil, errors.New("x509: malformed serial number")
		parser.go#L852: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L859: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L862: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L872: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L883: 		return nil, errors.New("x509: malformed validity")
		parser.go#L892: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L903: 		return nil, errors.New("x509: malformed spki")
		parser.go#L907: 		return nil, errors.New("x509: malformed spki")
		parser.go#L911: 		return nil, errors.New("x509: malformed public key algorithm identifier")
		parser.go#L920: 		return nil, errors.New("x509: malformed subjectPublicKey")
		parser.go#L934: 			return nil, errors.New("x509: malformed issuerUniqueID")
		parser.go#L937: 			return nil, errors.New("x509: malformed subjectUniqueID")
		parser.go#L943: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L948: 					return nil, errors.New("x509: malformed extensions")
		parser.go#L953: 						return nil, errors.New("x509: malformed extension")
		parser.go#L961: 						return nil, errors.New("x509: certificate contains duplicate extensions")
		parser.go#L976: 		return nil, errors.New("x509: malformed signature")
		parser.go#L990: 		return nil, errors.New("x509: trailing data")
		parser.go#L1024: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1028: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1035: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1039: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1044: 		return nil, errors.New("x509: unsupported crl version")
		parser.go#L1047: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1055: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L1062: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L1065: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L1075: 		return nil, errors.New("x509: malformed signature")
		parser.go#L1081: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L1104: 			return nil, errors.New("x509: malformed crl")
		parser.go#L1111: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1115: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1120: 				return nil, errors.New("x509: malformed serial number")
		parser.go#L1129: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L1135: 						return nil, errors.New("x509: malformed extension")
		parser.go#L1164: 		return nil, errors.New("x509: malformed extensions")
		parser.go#L1168: 			return nil, errors.New("x509: malformed extensions")
		parser.go#L1173: 				return nil, errors.New("x509: malformed extension")
		parser.go#L1185: 					return nil, errors.New("x509: malformed crl number")
		pem_decrypt.go#L110: var IncorrectPasswordError = errors.New("x509: decryption password incorrect")
		pem_decrypt.go#L127: 		return nil, errors.New("x509: no DEK-Info header in block")
		pem_decrypt.go#L132: 		return nil, errors.New("x509: malformed DEK-Info header")
		pem_decrypt.go#L137: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L144: 		return nil, errors.New("x509: incorrect IV size")
		pem_decrypt.go#L156: 		return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size")
		pem_decrypt.go#L171: 		return nil, errors.New("x509: invalid padding")
		pem_decrypt.go#L198: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L202: 		return nil, errors.New("x509: cannot generate IV: " + err.Error())
		pkcs1.go#L55: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs1.go#L58: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		pkcs1.go#L64: 		return nil, errors.New("x509: unsupported private key version")
		pkcs1.go#L68: 		return nil, errors.New("x509: private key contains zero or negative value")
		pkcs1.go#L83: 			return nil, errors.New("x509: private key contains zero or negative prime")
		pkcs1.go#L143: 			return nil, errors.New("x509: failed to parse public key (use ParsePKIXPublicKey instead for this key format)")
		pkcs1.go#L152: 		return nil, errors.New("x509: public key contains zero or negative value")
		pkcs1.go#L155: 		return nil, errors.New("x509: public key contains large public exponent")
		pkcs8.go#L39: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs8.go#L42: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		pkcs8.go#L50: 			return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L62: 			return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L68: 			return nil, errors.New("x509: invalid Ed25519 private key parameters")
		pkcs8.go#L81: 			return nil, errors.New("x509: invalid X25519 private key parameters")
		pkcs8.go#L115: 			return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L119: 			return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L128: 			return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		pkcs8.go#L153: 				return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L157: 				return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L166: 				return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		sec1.go#L49: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L59: 		return nil, errors.New("invalid elliptic key public key")
		sec1.go#L88: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		sec1.go#L91: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		sec1.go#L93: 		return nil, errors.New("x509: failed to parse EC private key: " + err.Error())
		sec1.go#L106: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L112: 		return nil, errors.New("x509: invalid elliptic curve private key value")
		sec1.go#L124: 			return nil, errors.New("x509: invalid private key length")
		verify.go#L173: var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate")
		verify.go#L596: 			return errors.New("x509: internal error: empty chain when appending CA cert")
		verify.go#L911: 			err = errors.New("x509: signature check attempts limit reached while verifying certificate chain")
		x509.go#L75: 			return nil, errors.New("x509: failed to parse public key (use ParsePKCS1PublicKey instead for this key format)")
		x509.go#L79: 		return nil, errors.New("x509: trailing data after ASN.1 of public-key")
		x509.go#L101: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L104: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: invalid elliptic curve public key")
		x509.go#L124: 				return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L780: var ErrUnsupportedAlgorithm = errors.New("x509: cannot verify signature: algorithm unimplemented")
		x509.go#L927: 			return errors.New("x509: ECDSA verification failure")
		x509.go#L935: 			return errors.New("x509: Ed25519 verification failure")
		x509.go#L1343: 			return ext, errors.New("x509: unknown extended key usage")
		x509.go#L1432: 			err = errors.New("x509: unknown elliptic curve")
		x509.go#L1440: 		err = errors.New("x509: only RSA, ECDSA and Ed25519 keys supported")
		x509.go#L1455: 				err = errors.New("x509: requested SignatureAlgorithm does not match private key type")
		x509.go#L1460: 				err = errors.New("x509: cannot sign with hash function requested")
		x509.go#L1464: 				err = errors.New("x509: signing with MD5 is not supported")
		x509.go#L1476: 		err = errors.New("x509: unknown SignatureAlgorithm")
		x509.go#L1541: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1545: 		return nil, errors.New("x509: no SerialNumber given")
		x509.go#L1554: 		return nil, errors.New("x509: serial number must be positive")
		x509.go#L1558: 		return nil, errors.New("x509: only CAs are allowed to specify MaxPathLen")
		x509.go#L1604: 		return nil, errors.New("x509: internal error: supported public key does not implement Equal")
		x509.go#L1606: 		return nil, errors.New("x509: provided PrivateKey doesn't match parent's PublicKey")
		x509.go#L1701: 		return nil, errors.New("x509: trailing data after CRL")
		x509.go#L1714: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1853: 		return nil, errors.New("x509: failed to unmarshal raw CSR Attributes")
		x509.go#L1902: 				return nil, errors.New("x509: certificate request contains duplicate requested extensions")
		x509.go#L1934: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L2027: 			return nil, errors.New("x509: failed to serialise extensions attribute: " + err.Error())
		x509.go#L2131: 		return nil, errors.New("x509: trailing data after X.509 Subject")
		x509.go#L2294: 		return nil, errors.New("x509: template can not be nil")
		x509.go#L2297: 		return nil, errors.New("x509: issuer can not be nil")
		x509.go#L2300: 		return nil, errors.New("x509: issuer must have the crlSign key usage bit set")
		x509.go#L2303: 		return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
		x509.go#L2306: 		return nil, errors.New("x509: template.ThisUpdate is after template.NextUpdate")
		x509.go#L2309: 		return nil, errors.New("x509: template contains nil Number field")
		x509.go#L2333: 				return nil, errors.New("x509: template contains entry with nil SerialNumber field")
		x509.go#L2336: 				return nil, errors.New("x509: template contains entry with zero RevocationTime field")
		x509.go#L2349: 					return nil, errors.New("x509: template contains entry with ReasonCode ExtraExtension; use ReasonCode field instead")
		x509.go#L2381: 		return nil, errors.New("x509: CRL number exceeds 20 octets")

	embed
		embed.go#L324: 		return nil, &fs.PathError{Op: "read", Path: name, Err: errors.New("not a directory")}
		embed.go#L341: 		return nil, &fs.PathError{Op: "read", Path: name, Err: errors.New("is a directory")}
		embed.go#L410: 	return 0, &fs.PathError{Op: "read", Path: d.f.name, Err: errors.New("is a directory")}

	encoding/asn1
		asn1.go#L483: 		return "", errors.New("asn1: invalid UTF-8 string")
		asn1.go#L494: 		return "", errors.New("pkcs12: odd-length BMP string")
		asn1.go#L535: 		err = errors.New("asn1: internal error in parseTagAndLength")
		marshal.go#L646: 						return nil, errors.New("asn1: string not valid UTF-8")

	encoding/binary
		binary.go#L324: 		return errors.New("binary.Read: invalid type " + reflect.TypeOf(data).String())
		binary.go#L454: 		return errors.New("binary.Write: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		varint.go#L126: var errOverflow = errors.New("binary: varint overflows a 64-bit integer")

	encoding/hex
		hex.go#L57: var ErrLength = errors.New("encoding/hex: odd length hex string")
		hex.go#L246: 		return 0, errors.New("encoding/hex: dumper closed")

	encoding/json
		stream.go#L271: 		return errors.New("json.RawMessage: UnmarshalJSON on nil pointer")

	encoding/pem
		pem.go#L244: 			return errors.New("pem: cannot encode a header key that contains a colon")

	flag
		flag.go#L101: var ErrHelp = errors.New("flag: help requested")
		flag.go#L105: var errParse = errors.New("parse error")
		flag.go#L109: var errRange = errors.New("value out of range")
		flag.go#L1061: 	return errors.New(msg)

	fmt
		errors.go#L30: 		err = errors.New(s)
		scan.go#L180: 	return 0, errors.New("ScanState's Read should not be called. Use ReadRune")
		scan.go#L244: 	panic(scanError{errors.New(err)})
		scan.go#L371: 		return errors.New("fmt: scanning called UnreadRune with no rune available")
		scan.go#L465: var errComplex = errors.New("syntax error scanning complex number")
		scan.go#L466: var errBool = errors.New("syntax error scanning boolean")

	github.com/go-faster/errors
		errors.go#L24: 		return errors.New(text)

	github.com/go-faster/jx
		w_stream.go#L23: var errStreaming = errors.New("unexpected call in streaming mode")

	github.com/gotd/ige
		ige.go#L15: var ErrInvalidIV = errors.New("iv length must be: (block size * 2)")

	github.com/gotd/neo
		net.go#L53: var ErrDeadline = errors.New("deadline")
		net.go#L181: 		return nil, errors.New("bad IP")
		net.go#L192: 		return nil, errors.New("bad net")

	github.com/gotd/td/tg
		tl_updates_classifier_gen.go#L112: 			return 0, errors.New("MessageEmpty have no peerID field")
		tl_updates_classifier_gen.go#L118: 		return 0, errors.New("unexpected peer type")
		tl_updates_classifier_gen.go#L126: 		return 0, errors.New("unexpected peer type")
		tl_updates_classifier_gen.go#L134: 		return 0, errors.New("unexpected peer type")
		tl_updates_classifier_gen.go#L136: 		return 0, errors.New("unexpected MessageClass type")

	github.com/klauspost/compress/flate
		deflate.go#L949: 		return nil, errors.New("flate: requested window size less than MinWindowSize")
		deflate.go#L952: 		return nil, errors.New("flate: requested window size bigger than MaxCustomWindowSize")

	github.com/klauspost/compress/gzip
		gzip.go#L87: 		return nil, errors.New("gzip: requested window size less than MinWindowSize")
		gzip.go#L90: 		return nil, errors.New("gzip: requested window size bigger than MaxCustomWindowSize")
		gzip.go#L127: 		return errors.New("gzip.Write: Extra data is too large")
		gzip.go#L145: 			return errors.New("gzip.Write: non-Latin-1 header string")

	go.uber.org/zap
		config.go#L251: 		return nil, errors.New("missing Level")
		encoder.go#L32: 	errNoEncoderNameSpecified = errors.New("no encoder name specified")
		encoder.go#L66: 		return nil, errors.New("missing EncodeTime in EncoderConfig")
		http_handler.go#L120: 		return 0, errors.New("must specify logging level")
		http_handler.go#L137: 		return 0, errors.New("must specify logging level")
		sink.go#L80: 		return errors.New("can't register a sink factory for empty string")
		sink.go#L165: 		return "", errors.New("must start with a letter")

	go.uber.org/zap/zapcore
		level.go#L29: var errUnmarshalNilLevel = errors.New("can't unmarshal a nil *Level")

	golang.org/x/net/internal/socks
		client.go#L57: 			return nil, errors.New("too many authentication methods")
		client.go#L72: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		client.go#L76: 		return nil, errors.New("no acceptable authentication methods")
		client.go#L94: 			return nil, errors.New("unknown address type")
		client.go#L98: 			return nil, errors.New("FQDN too long")
		client.go#L113: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		client.go#L116: 		return nil, errors.New("unknown error " + cmdErr.String())
		client.go#L119: 		return nil, errors.New("non-zero reserved field")
		client.go#L136: 		return nil, errors.New("unknown address type " + strconv.Itoa(int(b[3])))
		client.go#L165: 		return "", 0, errors.New("port number out of range " + port)
		socks.go#L158: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks.go#L194: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks.go#L237: 		return errors.New("network not implemented")
		socks.go#L242: 		return errors.New("command not implemented")
		socks.go#L293: 			return errors.New("invalid username/password")
		socks.go#L309: 			return errors.New("invalid username/password version")
		socks.go#L312: 			return errors.New("username/password authentication failed")
		socks.go#L316: 	return errors.New("unsupported authentication method " + strconv.Itoa(int(auth)))

	golang.org/x/net/proxy
		proxy.go#L109: 	return nil, errors.New("proxy: unknown scheme: " + u.Scheme)

	hash/crc32
		crc32.go#L182: 		return errors.New("hash/crc32: invalid hash state identifier")
		crc32.go#L185: 		return errors.New("hash/crc32: invalid hash state size")
		crc32.go#L188: 		return errors.New("hash/crc32: tables do not match")

	image
		format.go#L16: var ErrFormat = errors.New("image: unknown format")

	internal/oserror
		errors.go#L13: 	ErrInvalid    = errors.New("invalid argument")
		errors.go#L14: 	ErrPermission = errors.New("permission denied")
		errors.go#L15: 	ErrExist      = errors.New("file already exists")
		errors.go#L16: 	ErrNotExist   = errors.New("file does not exist")
		errors.go#L17: 	ErrClosed     = errors.New("file already closed")

	internal/poll
		fd.go#L35: var ErrFileClosing = errors.New("use of closed file")
		fd.go#L39: var ErrNoDeadline = errors.New("file type does not support deadline")
		fd.go#L66: var ErrNotPollable = errors.New("not pollable")
		fd_poll_runtime.go#L82: 		return errors.New("waiting for unsupported file type")

	internal/safefilepath
		path.go#L12: var errInvalidPath = errors.New("invalid path")

	io
		io.go#L29: var ErrShortWrite = errors.New("short write")
		io.go#L32: var errInvalidWrite = errors.New("invalid write result")
		io.go#L35: var ErrShortBuffer = errors.New("short buffer")
		io.go#L44: var EOF = errors.New("EOF")
		io.go#L48: var ErrUnexpectedEOF = errors.New("unexpected EOF")
		io.go#L53: var ErrNoProgress = errors.New("multiple Read calls return no data or error")
		io.go#L521: var errWhence = errors.New("Seek: invalid whence")
		io.go#L522: var errOffset = errors.New("Seek: invalid offset")
		pipe.go#L36: var ErrClosedPipe = errors.New("io: read/write on closed pipe")

	io/fs
		readdir.go#L41: 		return nil, &PathError{Op: "readdir", Path: name, Err: errors.New("not implemented")}
		sub.go#L36: 		return nil, &PathError{Op: "sub", Path: dir, Err: errors.New("invalid name")}
		sub.go#L55: 		return "", &PathError{Op: op, Path: name, Err: errors.New("invalid name")}
		sub.go#L122: 			return nil, errors.New("invalid result from inner fsys Glob: " + name + " not in " + f.dir) // can't use fmt in this package
		walk.go#L15: var SkipDir = errors.New("skip this directory")
		walk.go#L20: var SkipAll = errors.New("skip everything and stop the walk")

	math/big
		floatmarsh.go#L72: 		return errors.New("Float.GobDecode: buffer too small")
		floatmarsh.go#L91: 			return errors.New("Float.GobDecode: buffer too small for finite form float")
		floatmarsh.go#L103: 		return errors.New("Float.GobDecode: " + msg)
		intconv.go#L251: 		return errors.New("Int.Scan: invalid verb")
		natconv.go#L60: 	errNoDigits = errors.New("number has no digits")
		natconv.go#L61: 	errInvalSep = errors.New("'_' must separate successive digits")
		ratconv.go#L32: 		return errors.New("Rat.Scan: invalid verb")
		ratconv.go#L35: 		return errors.New("Rat.Scan: invalid syntax")
		ratmarsh.go#L30: 		return nil, errors.New("Rat.GobEncode: numerator too large")
		ratmarsh.go#L50: 		return errors.New("Rat.GobDecode: buffer too small")
		ratmarsh.go#L59: 		return errors.New("Rat.GobDecode: invalid length")
		ratmarsh.go#L63: 		return errors.New("Rat.GobDecode: buffer too small")

	mime
		encodedword.go#L29: 	errInvalidWord = errors.New("mime: invalid RFC 2047 encoded-word")
		mediatype.go#L106: 		return errors.New("mime: no media type")
		mediatype.go#L112: 		return errors.New("mime: expected slash after first token")
		mediatype.go#L116: 		return errors.New("mime: expected token after slash")
		mediatype.go#L119: 		return errors.New("mime: unexpected content after media subtype")
		mediatype.go#L127: var ErrInvalidMediaParameter = errors.New("mime: invalid media parameter")
		mediatype.go#L185: 			return "", nil, errors.New("mime: duplicate parameter name")

	mime/multipart
		formdata.go#L20: var ErrMessageTooLarge = errors.New("multipart: message too large")
		writer.go#L47: 		return errors.New("mime: SetBoundary called after write")
		writer.go#L51: 		return errors.New("mime: invalid boundary length")
		writer.go#L66: 		return errors.New("mime: invalid boundary character")
		writer.go#L194: 		return 0, errors.New("multipart: can't write to finished part")

	net
		cgo_unix.go#L323: 		return nil, errors.New("res_ninit failure: " + err.Error())
		cgo_unix.go#L348: 			return nil, errors.New("res_nsearch failure")
		dnsclient_unix.go#L42: 	errLameReferral              = errors.New("lame referral")
		dnsclient_unix.go#L43: 	errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message")
		dnsclient_unix.go#L44: 	errCannotMarshalDNSMessage   = errors.New("cannot marshal DNS message")
		dnsclient_unix.go#L45: 	errServerMisbehaving         = errors.New("server misbehaving")
		dnsclient_unix.go#L46: 	errInvalidDNSResponse        = errors.New("invalid DNS response")
		dnsclient_unix.go#L47: 	errNoAnswerFromDNSServer     = errors.New("no answer from DNS server")
		dnsclient_unix.go#L52: 	errServerTemporarilyMisbehaving = errors.New("server misbehaving")
		interface.go#L21: 	errInvalidInterface         = errors.New("invalid network interface")
		interface.go#L22: 	errInvalidInterfaceIndex    = errors.New("invalid network interface index")
		interface.go#L23: 	errInvalidInterfaceName     = errors.New("invalid network interface name")
		interface.go#L24: 	errNoSuchInterface          = errors.New("no such network interface")
		interface.go#L25: 	errNoSuchMulticastInterface = errors.New("no such multicast network interface")
		lookup.go#L901: 		return "", errors.New("no CNAME record received")
		lookup.go#L905: 		return "", errors.New("could not parse CNAME record")
		net.go#L406: 	errNoSuitableAddress = errors.New("no suitable address found")
		net.go#L409: 	errMissingAddress = errors.New("missing address")
		net.go#L413: 	ErrWriteToConnected = errors.New("use of WriteTo with pre-connected connection")
		net.go#L617: 	errNoSuchHost = errors.New("no such host")
		nss.go#L174: 			conf.err = errors.New("no colon on line")
		nss.go#L198: 					conf.err = errors.New("unclosed criterion bracket")
		nss.go#L204: 					conf.err = errors.New("invalid criteria: " + srcs[1:bclose])
		nss.go#L230: 			return errors.New("criterion too short")
		nss.go#L234: 			return errors.New("criterion lacks equal sign")
		unixsock_posix.go#L42: 		return nil, errors.New("unknown mode: " + mode)

	net/http
		client.go#L208: var ErrSchemeMismatch = errors.New("http: server gave HTTP response to HTTPS client")
		client.go#L217: 		return nil, alwaysFalse, errors.New("http: no Client.Transport or DefaultTransport")
		client.go#L222: 		return nil, alwaysFalse, errors.New("http: nil Request.URL")
		client.go#L227: 		return nil, alwaysFalse, errors.New("http: Request.RequestURI can't be set in client requests")
		client.go#L497: var ErrUseLastResponse = errors.New("net/http: use last response")
		client.go#L603: 			Err: errors.New("http: nil Request.URL"),
		client.go#L812: 		return errors.New("stopped after 10 redirects")
		cookie.go#L245: 		return errors.New("http: nil Cookie")
		cookie.go#L248: 		return errors.New("http: invalid Cookie.Name")
		cookie.go#L251: 		return errors.New("http: invalid Cookie.Expires")
		cookie.go#L267: 			return errors.New("http: invalid Cookie.Domain")
		fs.go#L75: 		return nil, errors.New("http: invalid or unsafe file path")
		fs.go#L213: var errSeeker = errors.New("seeker can't seek")
		fs.go#L217: var errNoOverlap = errors.New("invalid range: failed to overlap")
		fs.go#L789: var errMissingSeek = errors.New("io.File missing Seek method")
		fs.go#L790: var errMissingReadDir = errors.New("io.File directory missing ReadDir method")
		fs.go#L893: 		return nil, errors.New("invalid range")
		fs.go#L904: 			return nil, errors.New("invalid range")
		fs.go#L915: 				return nil, errors.New("invalid range")
		fs.go#L919: 				return nil, errors.New("invalid range")
		fs.go#L929: 				return nil, errors.New("invalid range")
		fs.go#L944: 					return nil, errors.New("invalid range")
		h2_bundle.go#L1094: var http2errReadEmpty = errors.New("read from empty dataBuffer")
		h2_bundle.go#L1239: var http2errFromPeer = errors.New("received from peer")
		h2_bundle.go#L1302: 	http2errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
		h2_bundle.go#L1303: 	http2errPseudoAfterRegular   = errors.New("pseudo header field after regular")
		h2_bundle.go#L1876: var http2ErrFrameTooLarge = errors.New("http2: frame too large")
		h2_bundle.go#L1934: 	fr.errDetail = errors.New(reason)
		h2_bundle.go#L2033: 	http2errStreamID    = errors.New("invalid stream ID")
		h2_bundle.go#L2034: 	http2errDepStreamID = errors.New("invalid dependent stream ID")
		h2_bundle.go#L2035: 	http2errPadLength   = errors.New("pad length too large")
		h2_bundle.go#L2036: 	http2errPadBytes    = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
		h2_bundle.go#L2386: 		return errors.New("illegal window increment value")
		h2_bundle.go#L2928: 		return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
		h2_bundle.go#L3187: 		err = errors.New("invalid base " + strconv.Itoa(base))
		h2_bundle.go#L3769: var http2errClosedPipeWrite = errors.New("write on closed buffer")
		h2_bundle.go#L3875: 	http2errClientDisconnected = errors.New("client disconnected")
		h2_bundle.go#L3876: 	http2errClosedBody         = errors.New("body closed by handler")
		h2_bundle.go#L3877: 	http2errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
		h2_bundle.go#L3878: 	http2errStreamClosed       = errors.New("http2: stream closed")
		h2_bundle.go#L4867: var http2errPrefaceTimeout = errors.New("timeout waiting for client preface")
		h2_bundle.go#L5097: var http2errHandlerPanicked = errors.New("http2: handler panicked")
		h2_bundle.go#L6808: 		return 0, errors.New("http2: handler wrote more than declared Content-Length")
		h2_bundle.go#L6837: 	http2ErrRecursivePush    = errors.New("http2: recursive push not allowed")
		h2_bundle.go#L6838: 	http2ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
		h2_bundle.go#L6886: 			return errors.New("URL must have a host")
		h2_bundle.go#L7071: 		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
		h2_bundle.go#L7637: 		return nil, errors.New("http2: unsupported scheme")
		h2_bundle.go#L7690: 	http2errClientConnClosed    = errors.New("http2: client conn is closed")
		h2_bundle.go#L7691: 	http2errClientConnUnusable  = errors.New("http2: client conn not usable")
		h2_bundle.go#L7692: 	http2errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
		h2_bundle.go#L7787: 		return nil, errors.New("http2: could not negotiate protocol mutually")
		h2_bundle.go#L8215: 	err := errors.New("http2: client connection force closed via ClientConn.Close")
		h2_bundle.go#L8222: 	err := errors.New("http2: client connection lost")
		h2_bundle.go#L8231: var http2errRequestCanceled = errors.New("net/http: request canceled")
		h2_bundle.go#L8736: 	http2errStopReqBodyWrite = errors.New("http2: aborting request body write")
		h2_bundle.go#L8739: 	http2errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
		h2_bundle.go#L8741: 	http2errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
		h2_bundle.go#L8942: var http2errNilRequestURL = errors.New("http2: Request.URI is nil")
		h2_bundle.go#L8960: 		return nil, errors.New("http2: invalid Host header")
		h2_bundle.go#L9410: 			Cause:    errors.New("protocol error: headers after END_STREAM"),
		h2_bundle.go#L9469: 		return nil, errors.New("malformed response from server: missing status pseudo header")
		h2_bundle.go#L9473: 		return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
		h2_bundle.go#L9515: 			return nil, errors.New("1xx informational response with END_STREAM flag")
		h2_bundle.go#L9520: 			return nil, errors.New("http2: too many 1xx informational responses")
		h2_bundle.go#L9627: 				err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
		h2_bundle.go#L9667: var http2errClosedResponseBody = errors.New("http2: response body closed")
		h2_bundle.go#L10092: 	http2errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
		h2_bundle.go#L10093: 	http2errRequestHeaderListSize  = errors.New("http2: request header list larger than peer's advertised limit")
		request.go#L39: var ErrMissingFile = errors.New("http: no such file")
		request.go#L420: var ErrNoCookie = errors.New("http: named cookie not present")
		request.go#L477: 		return nil, errors.New("http: MultipartReader called twice")
		request.go#L480: 		return nil, errors.New("http: multipart handled by ParseMultipartForm")
		request.go#L492: 		return nil, errors.New("missing form body")
		request.go#L555: var errMissingHost = errors.New("http: Request.Write on Request with no Host or URL set")
		request.go#L615: 			return errors.New("http: invalid Host header")
		request.go#L635: 		return errors.New("net/http: can't write control character in Request.URL")
		request.go#L875: 		return nil, errors.New("net/http: nil Context")
		request.go#L1219: 		err = errors.New("missing form body")
		request.go#L1245: 			err = errors.New("http: POST too large")
		request.go#L1326: 		return errors.New("http: multipart handled by MultipartReader")
		request.go#L1398: 		return nil, nil, errors.New("http: multipart handled by MultipartReader")
		response.go#L131: var ErrNoLocation = errors.New("http: no Location header in response")
		server.go#L41: 	ErrBodyNotAllowed = errors.New("http: request method or response status code does not allow body")
		server.go#L48: 	ErrHijacked = errors.New("http: connection has been hijacked")
		server.go#L54: 	ErrContentLength = errors.New("http: wrote more than the declared Content-Length")
		server.go#L59: 	ErrWriteAfterFlush = errors.New("unused")
		server.go#L967: var errTooLarge = errors.New("http: request too large")
		server.go#L1838: var ErrAbortHandler = errors.New("net/http: abort Handler")
		server.go#L3014: var ErrServerClosed = errors.New("http: Server closed")
		server.go#L3357: var ErrHandlerTimeout = errors.New("http: Handler timeout")
		socks_bundle.go#L63: 			return nil, errors.New("too many authentication methods")
		socks_bundle.go#L78: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L82: 		return nil, errors.New("no acceptable authentication methods")
		socks_bundle.go#L100: 			return nil, errors.New("unknown address type")
		socks_bundle.go#L104: 			return nil, errors.New("FQDN too long")
		socks_bundle.go#L119: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L122: 		return nil, errors.New("unknown error " + cmdErr.String())
		socks_bundle.go#L125: 		return nil, errors.New("non-zero reserved field")
		socks_bundle.go#L142: 		return nil, errors.New("unknown address type " + strconv.Itoa(int(b[3])))
		socks_bundle.go#L171: 		return "", 0, errors.New("port number out of range " + port)
		socks_bundle.go#L314: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L350: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L393: 		return errors.New("network not implemented")
		socks_bundle.go#L398: 		return errors.New("command not implemented")
		socks_bundle.go#L449: 			return errors.New("invalid username/password")
		socks_bundle.go#L465: 			return errors.New("invalid username/password version")
		socks_bundle.go#L468: 			return errors.New("username/password authentication failed")
		socks_bundle.go#L472: 	return errors.New("unsupported authentication method " + strconv.Itoa(int(auth)))
		transfer.go#L823: var ErrBodyReadAfterClose = errors.New("http: invalid Read on closed Body")
		transfer.go#L903: var errTrailerEOF = errors.New("http: unexpected EOF reading trailer")
		transfer.go#L928: 		return errors.New("http: suspiciously long trailer after chunked body")
		transport.go#L520: 		return nil, errors.New("http: nil Request.URL")
		transport.go#L524: 		return nil, errors.New("http: nil Request.Header")
		transport.go#L568: 		return nil, errors.New("http: no Host in request URL")
		transport.go#L643: var errCannotRewind = errors.New("net/http: cannot rewind body after connection loss")
		transport.go#L748: var ErrSkipAltProtocol = errors.New("net/http: skip alternate protocol")
		transport.go#L873: 	errKeepAlivesDisabled = errors.New("http: putIdleConn: keep alives disabled")
		transport.go#L874: 	errConnBroken         = errors.New("http: putIdleConn: connection is in bad state")
		transport.go#L875: 	errCloseIdle          = errors.New("http: putIdleConn: CloseIdleConnections was called")
		transport.go#L876: 	errTooManyIdle        = errors.New("http: putIdleConn: too many idle connections")
		transport.go#L877: 	errTooManyIdleHost    = errors.New("http: putIdleConn: too many idle connections for host")
		transport.go#L878: 	errCloseIdleConns     = errors.New("http: CloseIdleConnections called")
		transport.go#L879: 	errReadLoopExiting    = errors.New("http: persistConn.readLoop exiting")
		transport.go#L880: 	errIdleConnTimeout    = errors.New("http: idle connection timeout")
		transport.go#L886: 	errServerClosedIdle = errors.New("http: server closed idle connection")
		transport.go#L1185: 			err = errors.New("net/http: Transport.DialContext hook returned (nil, nil)")
		transport.go#L1192: 			err = errors.New("net/http: Transport.Dial hook returned (nil, nil)")
		transport.go#L1340: 		err = errors.New("net/http: Transport.DialTLS or DialTLSContext returned (nil, nil)")
		transport.go#L1750: 				return nil, errors.New("unknown status code")
		transport.go#L1752: 			return nil, errors.New(text)
		transport.go#L2081: var errCallerOwnsConn = errors.New("read loop ending; caller owns writable underlying conn")
		transport.go#L2334: 				return nil, errors.New("net/http: too many 1xx informational responses")
		transport.go#L2550: var errRequestCanceledConn = errors.New("net/http: request canceled while waiting for connection") // TODO: unify?
		transport.go#L2797: var errReadOnClosedResBody = errors.New("http: read on closed response body")

	net/http/internal
		chunked.go#L21: var ErrLineTooLong = errors.New("header line too long")
		chunked.go#L81: 		cr.err = errors.New("chunked encoding contains too much non-data")
		chunked.go#L108: 					cr.err = errors.New("malformed chunked encoding")
		chunked.go#L275: 			return 0, errors.New("invalid byte in chunk length")
		chunked.go#L278: 			return 0, errors.New("http chunk length too large")

	net/netip
		netip.go#L644: 		return Prefix{}, errors.New("negative Prefix bits")
		netip.go#L652: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv4")
		netip.go#L657: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv6")
		netip.go#L1021: 	return errors.New("unexpected slice size")
		netip.go#L1048: 		return "", "", false, errors.New("not an ip:port")
		netip.go#L1053: 		return "", "", false, errors.New("no IP")
		netip.go#L1056: 		return "", "", false, errors.New("no port")
		netip.go#L1060: 			return "", "", false, errors.New("missing ]")
		netip.go#L1081: 		return ipp, errors.New("invalid port " + strconv.Quote(port) + " parsing " + strconv.Quote(s))
		netip.go#L1089: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", square brackets can only be used with IPv6 addresses")
		netip.go#L1091: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", IPv6 addresses must be surrounded by square brackets")
		netip.go#L1209: 		return errors.New("unexpected slice size")
		netip.go#L1279: 		return Prefix{}, errors.New("netip.ParsePrefix(" + strconv.Quote(s) + "): no '/'")
		netip.go#L1283: 		return Prefix{}, errors.New("netip.ParsePrefix(" + strconv.Quote(s) + "): " + err.Error())
		netip.go#L1287: 		return Prefix{}, errors.New("netip.ParsePrefix(" + strconv.Quote(s) + "): IPv6 zones cannot be present in a prefix")
		netip.go#L1293: 		return Prefix{}, errors.New("netip.ParsePrefix(" + strconv.Quote(s) + "): bad bits after slash: " + strconv.Quote(bitsStr))
		netip.go#L1300: 		return Prefix{}, errors.New("netip.ParsePrefix(" + strconv.Quote(s) + "): prefix length out of range")
		netip.go#L1465: 		return errors.New("unexpected slice size")

	net/textproto
		reader.go#L547: 			return nil, errors.New("message too large")
		reader.go#L562: 			return m, errors.New("message too large")

	net/url
		url.go#L448: 				return "", "", errors.New("missing protocol scheme")
		url.go#L504: 		return nil, errors.New("net/url: invalid control character in URL")
		url.go#L508: 		return nil, errors.New("empty url")
		url.go#L538: 			return nil, errors.New("invalid URI for request")
		url.go#L549: 			return nil, errors.New("first path segment in URL cannot contain colon")
		url.go#L594: 		return nil, "", errors.New("net/url: invalid userinfo")
		url.go#L622: 			return "", errors.New("missing ']' in host")

	nhooyr.io/websocket
		accept.go#L101: 				err = errors.New(http.StatusText(http.StatusForbidden))
		accept.go#L110: 		err = errors.New("http.ResponseWriter does not implement http.Hijacker")
		accept.go#L190: 		return http.StatusBadRequest, errors.New("WebSocket protocol violation: missing Sec-WebSocket-Key")
		accept.go#L194: 		return http.StatusBadRequest, errors.New("WebSocket protocol violation: multiple Sec-WebSocket-Key headers")
		conn.go#L131: 		c.close(errors.New("connection garbage collected"))
		conn.go#L194: 				c.writeError(StatusPolicyViolation, errors.New("read timed out"))
		read.go#L187: 			return header{}, errors.New("received unmasked frame from client")
		read.go#L277: 		err := errors.New("received fragmented control frame")
		read.go#L339: 		err = errors.New("previous message not read to completion")
		read.go#L350: 		err := errors.New("received continuation frame without text or binary frame")
		read.go#L435: 				err := errors.New("received new data message without finishing the previous message")
		write.go#L156: 		return 0, errors.New("cannot use closed writer")
		write.go#L201: 		return errors.New("writer already closed")

	os
		exec.go#L18: var ErrProcessDone = errors.New("os: process already finished")
		exec_unix.go#L64: 		return errors.New("os: process already released")
		exec_unix.go#L67: 		return errors.New("os: process not initialized")
		exec_unix.go#L76: 		return errors.New("os: unsupported signal type")
		executable_procfs.go#L18: 		return "", errors.New("Executable not implemented for " + runtime.GOOS)
		file.go#L132: 		return 0, &PathError{Op: "readat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L200: var errWriteAtInAppendMode = errors.New("os: invalid use of WriteAt on file opened with O_APPEND")
		file.go#L216: 		return 0, &PathError{Op: "writeat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L416: 			return "", errors.New("%LocalAppData% is not defined")
		file.go#L422: 			return "", errors.New("$HOME is not defined")
		file.go#L429: 			return "", errors.New("$home is not defined")
		file.go#L438: 				return "", errors.New("neither $XDG_CACHE_HOME nor $HOME are defined")
		file.go#L467: 			return "", errors.New("%AppData% is not defined")
		file.go#L473: 			return "", errors.New("$HOME is not defined")
		file.go#L480: 			return "", errors.New("$home is not defined")
		file.go#L489: 				return "", errors.New("neither $XDG_CONFIG_HOME nor $HOME are defined")
		file.go#L524: 	return "", errors.New(enverr + " is not defined")
		file.go#L695: 		return "", errors.New("os: DirFS with empty root")
		tempfile.go#L55: var errPatternHasSeparator = errors.New("pattern contains path separator")

	path
		match.go#L14: var ErrBadPattern = errors.New("syntax error in pattern")

	path/filepath
		match.go#L17: var ErrBadPattern = errors.New("syntax error in pattern")
		path.go#L337: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		path.go#L363: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		symlink.go#L100: 			return "", errors.New("EvalSymlinks: too many links")

	reflect
		value.go#L1341: 					return Value{}, errors.New("reflect: indirection through nil pointer to embedded struct field " + nameFor(v.typ().Elem()))

	rsc.io/qr
		qr.go#L49: 			return nil, errors.New("text too long to encode as QR")

	strconv
		atoi.go#L18: var ErrRange = errors.New("value out of range")
		atoi.go#L21: var ErrSyntax = errors.New("invalid syntax")
		atoi.go#L61: 	return &NumError{fn, cloneString(str), errors.New("invalid base " + Itoa(base))}
		atoi.go#L65: 	return &NumError{fn, cloneString(str), errors.New("invalid bit size " + Itoa(bitSize))}

	strings
		reader.go#L53: 		return 0, errors.New("strings.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("strings.Reader.UnreadByte: at beginning of string")
		reader.go#L105: 		return errors.New("strings.Reader.UnreadRune: at beginning of string")
		reader.go#L108: 		return errors.New("strings.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("strings.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("strings.Reader.Seek: negative position")

	syscall
		exec_unix.go#L190: 		return 0, errorspkg.New("both Setctty and Foreground set in SysProcAttr")
		exec_unix.go#L193: 		return 0, errorspkg.New("Setctty set but Ctty not valid in child")

	time
		format.go#L449: var errAtoi = errors.New("time: invalid number")
		format.go#L816: var errBad = errors.New("bad value for field") // placeholder not passed to user
		format.go#L1519: var errLeadingInt = errors.New("time: bad [0-9]*") // never printed
		format.go#L1608: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1620: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1626: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1640: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1652: 			return 0, errors.New("time: missing unit in duration " + quote(orig))
		format.go#L1658: 			return 0, errors.New("time: unknown unit " + quote(u) + " in duration " + quote(orig))
		format.go#L1662: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1671: 				return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1676: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1683: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format_rfc3339.go#L72: 		return b, errors.New("year outside of range [0,9999]")
		format_rfc3339.go#L76: 			return b, errors.New("timezone hour outside of range [0,23]")
		sys_unix.go#L55: 				return errors.New("short read")
		time.go#L1246: 			return nil, errors.New("Time.MarshalBinary: unexpected zone offset")
		time.go#L1281: 		return errors.New("Time.UnmarshalBinary: no data")
		time.go#L1286: 		return errors.New("Time.UnmarshalBinary: unsupported version")
		time.go#L1294: 		return errors.New("Time.UnmarshalBinary: invalid length")
		time.go#L1349: 		return nil, errors.New("Time.MarshalJSON: " + err.Error())
		time.go#L1362: 		return errors.New("Time.UnmarshalJSON: input is not a JSON string")
		time.go#L1378: 		return nil, errors.New("Time.MarshalText: " + err.Error())
		zoneinfo.go#L642: var errLocation = errors.New("time: invalid location name")
		zoneinfo_read.go#L110: var errBadData = errors.New("malformed time zone information")
		zoneinfo_read.go#L419: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L427: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L469: 			return nil, errors.New("unsupported compression for " + name + " in " + zipfile)
		zoneinfo_read.go#L494: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L500: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L566: 	return nil, errors.New("unknown time zone " + name)

	vendor/golang.org/x/crypto/chacha20
		chacha_generic.go#L82: 		return nil, errors.New("chacha20: wrong key size")
		chacha_generic.go#L93: 		return nil, errors.New("chacha20: wrong nonce size")
		chacha_generic.go#L354: 		return nil, errors.New("chacha20: wrong HChaCha20 key size")
		chacha_generic.go#L357: 		return nil, errors.New("chacha20: wrong HChaCha20 nonce size")

	vendor/golang.org/x/crypto/chacha20poly1305
		chacha20poly1305.go#L42: 		return nil, errors.New("chacha20poly1305: bad key length")
		chacha20poly1305.go#L69: var errOpen = errors.New("chacha20poly1305: message authentication failed")
		xchacha20poly1305.go#L26: 		return nil, errors.New("chacha20poly1305: bad key length")

	vendor/golang.org/x/crypto/cryptobyte
		builder.go#L239: 			b.err = errors.New("pending ASN.1 child too long")
		builder.go#L297: 		b.err = errors.New("cryptobyte: length overflow")
		builder.go#L300: 		b.err = errors.New("cryptobyte: Builder is exceeding its fixed-size buffer")

	vendor/golang.org/x/crypto/hkdf
		hkdf.go#L51: 		return 0, errors.New("hkdf: entropy limit reached")

	vendor/golang.org/x/net/dns/dnsmessage
		message.go#L252: 	ErrNotStarted = errors.New("parsing/packing of this type isn't available yet")
		message.go#L256: 	ErrSectionDone = errors.New("parsing/packing of this section has completed")
		message.go#L258: 	errBaseLen            = errors.New("insufficient data for base length type")
		message.go#L259: 	errCalcLen            = errors.New("insufficient data for calculated length type")
		message.go#L260: 	errReserved           = errors.New("segment prefix is reserved")
		message.go#L261: 	errTooManyPtr         = errors.New("too many pointers (>10)")
		message.go#L262: 	errInvalidPtr         = errors.New("invalid pointer")
		message.go#L263: 	errInvalidName        = errors.New("invalid dns name")
		message.go#L264: 	errNilResouceBody     = errors.New("nil resource body")
		message.go#L265: 	errResourceLen        = errors.New("insufficient data for resource body length")
		message.go#L266: 	errSegTooLong         = errors.New("segment length too long")
		message.go#L267: 	errNameTooLong        = errors.New("name too long")
		message.go#L268: 	errZeroSegLen         = errors.New("zero length segment")
		message.go#L269: 	errResTooLong         = errors.New("resource length too long")
		message.go#L270: 	errTooManyQuestions   = errors.New("too many Questions to pack (>65535)")
		message.go#L271: 	errTooManyAnswers     = errors.New("too many Answers to pack (>65535)")
		message.go#L272: 	errTooManyAuthorities = errors.New("too many Authorities to pack (>65535)")
		message.go#L273: 	errTooManyAdditionals = errors.New("too many Additionals to pack (>65535)")
		message.go#L274: 	errNonCanonicalName   = errors.New("name is not in canonical format (it must end with a .)")
		message.go#L275: 	errStringTooLong      = errors.New("character string exceeds maximum length (255)")
		message.go#L276: 	errCompressedSRV      = errors.New("compressed name in SRV resource data")

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L133: 			return nil, errors.New("refusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxy")

	vendor/golang.org/x/net/http2/hpack
		hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
		hpack.go#L238: 		return DecodingError{errors.New("truncated headers")}
		hpack.go#L287: var errNeedMore = errors.New("need more data")
		hpack.go#L334: 	return DecodingError{errors.New("invalid encoding")}
		hpack.go#L416: 		return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
		hpack.go#L425: 		return DecodingError{errors.New("dynamic table size update too large")}
		hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
		huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")

	vendor/golang.org/x/text/secure/bidirule
		bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")

	vendor/golang.org/x/text/transform
		transform.go#L21: 	ErrShortDst = errors.New("transform: short destination buffer")
		transform.go#L25: 	ErrShortSrc = errors.New("transform: short source buffer")
		transform.go#L29: 	ErrEndOfSpan = errors.New("transform: input and output are not identical")
		transform.go#L33: 	errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
		transform.go#L37: 	errShortInternal = errors.New("transform: short internal buffer")