func errors.New
1455 uses
errors (current package)
errors.go#L64: func New(text string) error {
errors.go#L90: var ErrUnsupported = New("unsupported operation")
bufio
bufio.go#L23: ErrInvalidUnreadByte = errors.New("bufio: invalid use of UnreadByte")
bufio.go#L24: ErrInvalidUnreadRune = errors.New("bufio: invalid use of UnreadRune")
bufio.go#L25: ErrBufferFull = errors.New("bufio: buffer full")
bufio.go#L26: ErrNegativeCount = errors.New("bufio: negative count")
bufio.go#L96: var errNegativeRead = errors.New("bufio: reader returned negative count from Read")
bufio.go#L560: var errNegativeWrite = errors.New("bufio: writer returned negative count from Write")
scan.go#L71: ErrTooLong = errors.New("bufio.Scanner: token too long")
scan.go#L72: ErrNegativeAdvance = errors.New("bufio.Scanner: SplitFunc returns negative advance count")
scan.go#L73: ErrAdvanceTooFar = errors.New("bufio.Scanner: SplitFunc returns advance count beyond input")
scan.go#L74: ErrBadReadCount = errors.New("bufio.Scanner: Read returned impossible count")
scan.go#L128: var ErrFinalToken = errors.New("final token")
bytes
buffer.go#L44: var ErrTooLarge = errors.New("bytes.Buffer: too large")
buffer.go#L45: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
buffer.go#L398: return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
buffer.go#L407: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")
reader.go#L53: return 0, errors.New("bytes.Reader.ReadAt: negative offset")
reader.go#L79: return errors.New("bytes.Reader.UnreadByte: at beginning of slice")
reader.go#L105: return errors.New("bytes.Reader.UnreadRune: at beginning of slice")
reader.go#L108: return errors.New("bytes.Reader.UnreadRune: previous operation was not ReadRune")
reader.go#L127: return 0, errors.New("bytes.Reader.Seek: invalid whence")
reader.go#L130: return 0, errors.New("bytes.Reader.Seek: negative position")
compress/flate
deflate.go#L695: var errWriterClosed = errors.New("flate: closed writer")
compress/gzip
gunzip.go#L32: ErrChecksum = errors.New("gzip: invalid checksum")
gunzip.go#L34: ErrHeader = errors.New("gzip: invalid header")
gzip.go#L95: return errors.New("gzip.Write: Extra data is too large")
gzip.go#L113: return errors.New("gzip.Write: non-Latin-1 header string")
context
context.go#L167: var Canceled = errors.New("context canceled")
crypto/cipher
gcm.go#L32: return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
gcm.go#L46: return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
gcm.go#L61: return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
gcm.go#L70: return nil, errors.New("crypto/cipher: use of GCM with non-AES ciphers is not allowed in FIPS 140-only mode")
gcm.go#L96: return nil, errors.New("cipher: NewGCMWithRandomNonce requires aes.Block")
gcm.go#L209: return nil, errors.New("cipher: incorrect tag size given to GCM")
gcm.go#L212: return nil, errors.New("cipher: the nonce can't have zero length")
gcm.go#L218: return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
gcm.go#L273: var errOpen = errors.New("cipher: message authentication failed")
crypto/des
cipher.go#L33: return nil, errors.New("crypto/des: use of DES is not allowed in FIPS 140-only mode")
cipher.go#L81: return nil, errors.New("crypto/des: use of TripleDES is not allowed in FIPS 140-only mode")
crypto/dsa
dsa.go#L47: var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
dsa.go#L68: return errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")
dsa.go#L91: return errors.New("crypto/dsa: invalid ParameterSizes")
dsa.go#L166: return errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")
dsa.go#L170: return errors.New("crypto/dsa: parameters not set up before generating key")
dsa.go#L216: return nil, nil, errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")
crypto/ecdh
ecdh.go#L121: return nil, errors.New("crypto/ecdh: private key and public key curves do not match")
nist.go#L48: return nil, errors.New("crypto/ecdh: only crypto/rand.Reader is allowed in FIPS 140-only mode")
nist.go#L85: return nil, errors.New("crypto/ecdh: invalid private key")
nist.go#L89: return nil, errors.New("crypto/ecdh: invalid private key")
nist.go#L121: return nil, errors.New("crypto/ecdh: invalid public key")
nist.go#L130: return nil, errors.New("crypto/ecdh: invalid public key")
x25519.go#L39: return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
x25519.go#L51: return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
x25519.go#L54: return nil, errors.New("crypto/ecdh: invalid private key size")
x25519.go#L71: return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
x25519.go#L74: return nil, errors.New("crypto/ecdh: invalid public key")
x25519.go#L86: return nil, errors.New("crypto/ecdh: bad X25519 remote ECDH input: low order point")
crypto/ecdsa
ecdsa.go#L54: return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
ecdsa.go#L57: return nil, errors.New("ecdsa: invalid public key")
ecdsa.go#L92: return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
ecdsa.go#L96: return nil, errors.New("ecdsa: invalid private key")
ecdsa.go#L190: return nil, errors.New("crypto/ecdsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
ecdsa.go#L201: var errNoAsm = errors.New("no assembly implementation available")
ecdsa.go#L239: return nil, errors.New("crypto/ecdsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
ecdsa.go#L260: return nil, errors.New("ecdsa: Sign called with nil opts")
ecdsa.go#L264: return nil, errors.New("ecdsa: hash length does not match hash function")
ecdsa.go#L276: return nil, errors.New("ecdsa: curve not supported by deterministic signatures")
ecdsa.go#L287: return nil, errors.New("crypto/ecdsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
ecdsa.go#L312: b.SetError(errors.New("invalid integer"))
ecdsa.go#L375: return nil, nil, errors.New("invalid ASN.1")
ecdsa.go#L417: return nil, errors.New("negative coordinate")
ecdsa.go#L420: return nil, errors.New("overflowing coordinate")
ecdsa.go#L435: return nil, nil, errors.New("ecdsa: public key point is the infinity")
ecdsa_legacy.go#L24: return nil, errors.New("crypto/ecdsa: use of custom curves is not allowed in FIPS 140-only mode")
ecdsa_legacy.go#L57: var errZeroParam = errors.New("zero parameter")
ecdsa_legacy.go#L78: return nil, nil, errors.New("invalid ASN.1 from SignASN1")
ecdsa_legacy.go#L85: return nil, errors.New("crypto/ecdsa: use of custom curves is not allowed in FIPS 140-only mode")
crypto/ed25519
ed25519.go#L108: return nil, errors.New("crypto/ed25519: use of Ed25519ctx is not allowed in FIPS 140-only mode")
ed25519.go#L114: return nil, errors.New("ed25519: expected opts.HashFunc() zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")
ed25519.go#L227: return errors.New("crypto/ed25519: use of Ed25519ctx is not allowed in FIPS 140-only mode")
ed25519.go#L233: return errors.New("ed25519: expected opts.Hash zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")
crypto/elliptic
nistec.go#L147: return p, errors.New("negative coordinate")
nistec.go#L150: return p, errors.New("overflowing coordinate")
crypto/internal/fips140
cast.go#L47: err = errors.New("simulated CAST failure")
cast.go#L79: err = errors.New("simulated PCT failure")
fips140.go#L41: return errors.New("FIPS 140-3 mode is incompatible with ASAN")
fips140.go#L51: return errors.New("FIPS 140-3 mode is not supported on " + runtime.GOOS + "-" + runtime.GOARCH)
fips140.go#L55: return errors.New("FIPS 140-3 mode is incompatible with GOEXPERIMENT=boringcrypto")
crypto/internal/fips140/aes
cast.go#L39: return errors.New("unexpected result")
cast.go#L43: return errors.New("unexpected result")
crypto/internal/fips140/aes/gcm
cast.go#L39: return errors.New("unexpected result")
gcm.go#L33: return nil, errors.New("cipher: incorrect tag size given to GCM")
gcm.go#L36: return nil, errors.New("cipher: the nonce can't have zero length")
gcm.go#L39: return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
gcm.go#L91: var errOpen = errors.New("cipher: message authentication failed")
crypto/internal/fips140/bigmod
nat.go#L179: return nil, errors.New("input overflows the modulus")
nat.go#L198: return nil, errors.New("input overflows the modulus size")
nat.go#L225: return errors.New("input overflows the modulus size")
nat.go#L572: return nil, errors.New("modulus must be > 1")
nat.go#L1121: return nil, nil, errors.New("extendedGCD: a or m is zero")
nat.go#L1124: return nil, nil, errors.New("extendedGCD: both a and m are even")
crypto/internal/fips140/drbg
cast.go#L54: return errors.New("unexpected result")
crypto/internal/fips140/ecdh
cast.go#L48: return errors.New("unexpected result")
ecdh.go#L173: return nil, errors.New("crypto/ecdh: invalid private key")
ecdh.go#L206: return errors.New("crypto/ecdh: public key does not match private key")
ecdh.go#L220: return nil, errors.New("crypto/ecdh: invalid public key")
ecdh.go#L242: return nil, errors.New("crypto/ecdh: mismatched curves")
ecdh.go#L245: return nil, errors.New("crypto/ecdh: mismatched curves")
ecdh.go#L253: return nil, errors.New("crypto/ecdh: public key is the identity element")
crypto/internal/fips140/ecdsa
cast.go#L100: return errors.New("unexpected result")
cast.go#L132: return errors.New("unexpected result")
ecdsa.go#L276: return nil, errors.New("ecdsa: private key does not match curve")
ecdsa.go#L309: return nil, errors.New("ecdsa: private key does not match curve")
ecdsa.go#L353: return nil, errors.New("ecdsa: internal error: r is zero")
ecdsa.go#L369: return nil, errors.New("ecdsa: internal error: s is zero")
ecdsa.go#L441: return errors.New("ecdsa: public key does not match curve")
ecdsa.go#L461: return errors.New("ecdsa: invalid signature: r is zero")
ecdsa.go#L468: return errors.New("ecdsa: invalid signature: s is zero")
ecdsa.go#L500: return errors.New("ecdsa: signature did not verify")
crypto/internal/fips140/ed25519
cast.go#L72: return errors.New("unexpected result")
ed25519.go#L87: return nil, errors.New("ed25519: bad seed length: " + strconv.Itoa(l))
ed25519.go#L121: return nil, errors.New("ed25519: bad private key length: " + strconv.Itoa(l))
ed25519.go#L156: return nil, errors.New("ed25519: bad public key length: " + strconv.Itoa(l))
ed25519.go#L160: return nil, errors.New("ed25519: bad public key")
ed25519.go#L203: return nil, errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
ed25519.go#L206: return nil, errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
ed25519.go#L224: return nil, errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
ed25519.go#L285: return errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
ed25519.go#L288: return errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
ed25519.go#L298: return errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
ed25519.go#L305: return errors.New("ed25519: bad signature length: " + strconv.Itoa(l))
ed25519.go#L309: return errors.New("ed25519: invalid signature")
ed25519.go#L330: return errors.New("ed25519: invalid signature")
ed25519.go#L338: return errors.New("ed25519: invalid signature")
crypto/internal/fips140/edwards25519
edwards25519.go#L156: return nil, errors.New("edwards25519: invalid point encoding length")
edwards25519.go#L174: return nil, errors.New("edwards25519: invalid point encoding")
scalar.go#L111: return nil, errors.New("edwards25519: invalid SetUniformBytes input length")
scalar.go#L160: return nil, errors.New("invalid scalar length")
scalar.go#L163: return nil, errors.New("invalid scalar encoding")
scalar.go#L210: return nil, errors.New("edwards25519: invalid SetBytesWithClamping input length")
crypto/internal/fips140/edwards25519/field
fe.go#L201: return nil, errors.New("edwards25519: invalid field element input size")
crypto/internal/fips140/hkdf
cast.go#L29: return errors.New("unexpected result")
crypto/internal/fips140/hmac
cast.go#L30: return errors.New("unexpected result")
crypto/internal/fips140/mlkem
cast.go#L49: return errors.New("unexpected result")
field.go#L19: return 0, errors.New("unreduced field element")
field.go#L166: return T{}, errors.New("mlkem: invalid encoding length")
field.go#L174: return T{}, errors.New("mlkem: invalid polynomial encoding")
field.go#L177: return T{}, errors.New("mlkem: invalid polynomial encoding")
mlkem1024.go#L147: return nil, errors.New("mlkem: invalid seed length")
mlkem1024.go#L169: return nil, errors.New("mlkem: invalid NIST decapsulation key length")
mlkem1024.go#L177: return nil, errors.New("mlkem: invalid secret key encoding")
mlkem1024.go#L192: return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes")
mlkem1024.go#L272: return errors.New("mlkem: PCT failed")
mlkem1024.go#L330: return nil, errors.New("mlkem: invalid encapsulation key length")
mlkem1024.go#L405: return nil, errors.New("mlkem: invalid ciphertext length")
mlkem768.go#L206: return nil, errors.New("mlkem: invalid seed length")
mlkem768.go#L228: return nil, errors.New("mlkem: invalid NIST decapsulation key length")
mlkem768.go#L236: return nil, errors.New("mlkem: invalid secret key encoding")
mlkem768.go#L251: return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes")
mlkem768.go#L331: return errors.New("mlkem: PCT failed")
mlkem768.go#L389: return nil, errors.New("mlkem: invalid encapsulation key length")
mlkem768.go#L464: return nil, errors.New("mlkem: invalid ciphertext length")
crypto/internal/fips140/nistec
p224.go#L90: return nil, errors.New("invalid P224 compressed point encoding")
p224.go#L106: return nil, errors.New("invalid P224 point encoding")
p224.go#L137: return errors.New("P224 point not on curve")
p224.go#L178: return nil, errors.New("P224 point is the point at infinity")
p224.go#L414: return nil, errors.New("invalid scalar length")
p256_asm.go#L96: return nil, errors.New("invalid P256 element encoding")
p256_asm.go#L111: return nil, errors.New("invalid P256 element encoding")
p256_asm.go#L118: return nil, errors.New("invalid P256 compressed point encoding")
p256_asm.go#L132: return nil, errors.New("invalid P256 point encoding")
p256_asm.go#L163: return errors.New("P256 point not on curve")
p256_asm.go#L420: return nil, errors.New("invalid scalar length")
p256_asm.go#L435: return nil, errors.New("invalid scalar length")
p256_asm.go#L522: return nil, errors.New("P256 point is the point at infinity")
p256_ordinv.go#L23: return nil, errors.New("invalid scalar length")
p384.go#L90: return nil, errors.New("invalid P384 compressed point encoding")
p384.go#L106: return nil, errors.New("invalid P384 point encoding")
p384.go#L137: return errors.New("P384 point not on curve")
p384.go#L178: return nil, errors.New("P384 point is the point at infinity")
p384.go#L414: return nil, errors.New("invalid scalar length")
p521.go#L90: return nil, errors.New("invalid P521 compressed point encoding")
p521.go#L106: return nil, errors.New("invalid P521 point encoding")
p521.go#L137: return errors.New("P521 point not on curve")
p521.go#L178: return nil, errors.New("P521 point is the point at infinity")
p521.go#L414: return nil, errors.New("invalid scalar length")
crypto/internal/fips140/nistec/fiat
p224.go#L74: return nil, errors.New("invalid P224Element encoding")
p224.go#L86: return nil, errors.New("invalid P224Element encoding")
p256.go#L74: return nil, errors.New("invalid P256Element encoding")
p256.go#L86: return nil, errors.New("invalid P256Element encoding")
p384.go#L74: return nil, errors.New("invalid P384Element encoding")
p384.go#L86: return nil, errors.New("invalid P384Element encoding")
p521.go#L74: return nil, errors.New("invalid P521Element encoding")
p521.go#L86: return nil, errors.New("invalid P521Element encoding")
crypto/internal/fips140/rsa
cast.go#L230: return errors.New("unexpected result")
keygen.go#L19: return nil, errors.New("rsa: key too small")
keygen.go#L46: return nil, errors.New("rsa: generated p == q, random source is broken")
keygen.go#L54: return nil, errors.New("rsa: internal error: modulus size incorrect")
keygen.go#L92: return nil, errors.New("rsa: internal error: e*d != 1 mod λ(N)")
keygen.go#L113: var errDivisorTooLarge = errors.New("divisor too large")
keygen.go#L137: return nil, errors.New("rsa: internal error: gcd(a, b) is even")
keygen.go#L149: return nil, errors.New("rsa: internal error: gcd(a, b) is zero")
keygen.go#L152: return nil, errors.New("rsa: internal error: b is not divisible by gcd(a, b)")
keygen.go#L162: return nil, errors.New("rsa: prime size must be at least 16 bits")
keygen.go#L322: return nil, errors.New("candidate is even")
keygen.go#L329: return nil, errors.New("candidate is one")
keygen.go#L350: return false, errors.New("incorrect length")
keygen.go#L357: return false, errors.New("out-of-range candidate")
pkcs1v15.go#L70: return nil, errors.New("crypto/rsa: unsupported hash function")
pkcs1v22.go#L84: return nil, errors.New("crypto/rsa: input must be hashed with given hash")
pkcs1v22.go#L153: return errors.New("rsa: internal error: inconsistent length")
pkcs1v22.go#L279: return nil, errors.New("crypto/rsa: salt length cannot be negative")
pkcs1v22.go#L321: return errors.New("crypto/rsa: salt length cannot be negative")
rsa.go#L91: return nil, errors.New("crypto/rsa: p is even")
rsa.go#L219: return errors.New("crypto/rsa: invalid prime")
rsa.go#L223: return errors.New("crypto/rsa: invalid prime")
rsa.go#L226: return errors.New("crypto/rsa: p * q != n")
rsa.go#L240: return errors.New("crypto/rsa: invalid prime")
rsa.go#L244: return errors.New("crypto/rsa: invalid CRT exponent")
rsa.go#L250: return errors.New("crypto/rsa: invalid CRT exponent")
rsa.go#L255: return errors.New("crypto/rsa: invalid prime")
rsa.go#L259: return errors.New("crypto/rsa: invalid CRT exponent")
rsa.go#L264: return errors.New("crypto/rsa: invalid CRT exponent")
rsa.go#L274: return errors.New("crypto/rsa: invalid CRT coefficient")
rsa.go#L288: return errors.New("crypto/rsa: p == q")
rsa.go#L300: return errors.New("crypto/rsa: |p - q| too small")
rsa.go#L310: return errors.New("crypto/rsa: d too small")
rsa.go#L339: return false, errors.New("crypto/rsa: missing public modulus")
rsa.go#L342: return false, errors.New("crypto/rsa: public modulus is even")
rsa.go#L354: return false, errors.New("crypto/rsa: public exponent too small or negative")
rsa.go#L359: return false, errors.New("crypto/rsa: public exponent is even")
rsa.go#L371: return false, errors.New("crypto/rsa: public exponent too large")
rsa.go#L393: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
rsa.go#L394: var ErrDecryption = errors.New("crypto/rsa: decryption error")
rsa.go#L395: var ErrVerification = errors.New("crypto/rsa: verification error")
crypto/internal/fips140/sha256
cast.go#L28: return errors.New("unexpected result")
sha256.go#L85: return errors.New("crypto/sha256: invalid hash state identifier")
sha256.go#L88: return errors.New("crypto/sha256: invalid hash state size")
crypto/internal/fips140/sha3
cast.go#L28: return errors.New("unexpected result")
sha3.go#L201: return errors.New("sha3: invalid hash state")
sha3.go#L212: return errors.New("sha3: invalid hash state identifier")
sha3.go#L218: return errors.New("sha3: invalid hash state function")
sha3.go#L226: return errors.New("sha3: invalid hash state")
sha3.go#L230: return errors.New("sha3: invalid hash state")
shake.go#L110: return errors.New("sha3: invalid hash state")
crypto/internal/fips140/sha512
cast.go#L32: return errors.New("unexpected result")
sha512.go#L165: return errors.New("crypto/sha512: invalid hash state identifier")
sha512.go#L173: return errors.New("crypto/sha512: invalid hash state identifier")
sha512.go#L176: return errors.New("crypto/sha512: invalid hash state size")
crypto/internal/fips140/tls12
cast.go#L34: return errors.New("unexpected result")
crypto/internal/fips140/tls13
cast.go#L33: return errors.New("unexpected result")
crypto/internal/hpke
hpke.go#L73: return nil, errors.New("unsupported suite ID")
hpke.go#L187: return nil, errors.New("unsupported KDF id")
hpke.go#L193: return nil, errors.New("unsupported AEAD id")
hpke.go#L302: return nil, errors.New("unsupported KEM id")
hpke.go#L310: return nil, errors.New("unsupported KEM id")
crypto/md5
md5.go#L78: return errors.New("crypto/md5: invalid hash state identifier")
md5.go#L81: return errors.New("crypto/md5: invalid hash state size")
md5.go#L118: return 0, errors.New("crypto/md5: use of MD5 is not allowed in FIPS 140-only mode")
crypto/rand
util.go#L19: return nil, errors.New("crypto/rand: use of Prime is not allowed in FIPS 140-only mode")
util.go#L22: return nil, errors.New("crypto/rand: prime size must be at least 2-bit")
crypto/rc4
rc4.go#L35: return nil, errors.New("crypto/rc4: use of RC4 is not allowed in FIPS 140-only mode")
crypto/rsa
fips.go#L88: return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L91: return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
fips.go#L101: return nil, errors.New("crypto/rsa: use of PSS salt longer than the hash is not allowed in FIPS 140-only mode")
fips.go#L115: return nil, errors.New("crypto/rsa: invalid PSS salt length")
fips.go#L153: return errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L163: return errors.New("crypto/rsa: use of PSS salt longer than the hash is not allowed in FIPS 140-only mode")
fips.go#L220: return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L223: return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
fips.go#L278: return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L306: return nil, errors.New("crypto/rsa: input must be hashed message")
fips.go#L327: return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L349: return errors.New("crypto/rsa: input must be hashed message")
fips.go#L373: return errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
fips.go#L404: return errors.New("crypto/rsa: public key missing N")
fips.go#L407: return errors.New("crypto/rsa: use of keys smaller than 2048 bits is not allowed in FIPS 140-only mode")
fips.go#L410: return errors.New("crypto/rsa: use of keys with odd size is not allowed in FIPS 140-only mode")
fips.go#L413: return errors.New("crypto/rsa: use of public exponent <= 2¹⁶ is not allowed in FIPS 140-only mode")
fips.go#L416: return errors.New("crypto/rsa: use of even public exponent is not allowed in FIPS 140-only mode")
fips.go#L429: return errors.New("crypto/rsa: use of multi-prime keys is not allowed in FIPS 140-only mode")
fips.go#L432: return errors.New("crypto/rsa: use of primes of different sizes is not allowed in FIPS 140-only mode")
pkcs1v15.go#L44: return nil, errors.New("crypto/rsa: use of PKCS#1 v1.5 encryption is not allowed in FIPS 140-only mode")
pkcs1v15.go#L197: return 0, nil, 0, errors.New("crypto/rsa: use of PKCS#1 v1.5 encryption is not allowed in FIPS 140-only mode")
rsa.go#L197: return nil, errors.New("crypto/rsa: invalid options for Decrypt")
rsa.go#L235: return errors.New("crypto/rsa: missing primes")
rsa.go#L263: return errors.New("crypto/rsa: missing public modulus")
rsa.go#L299: return nil, errors.New("crypto/rsa: generated key exponent too large")
rsa.go#L320: return nil, errors.New("crypto/rsa: use of keys smaller than 2048 bits is not allowed in FIPS 140-only mode")
rsa.go#L323: return nil, errors.New("crypto/rsa: use of keys with odd size is not allowed in FIPS 140-only mode")
rsa.go#L326: return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
rsa.go#L394: return nil, errors.New("crypto/rsa: multi-prime RSA is not allowed in FIPS 140-only mode")
rsa.go#L403: return nil, errors.New("crypto/rsa: GenerateMultiPrimeKey: nprimes must be >= 2")
rsa.go#L417: return nil, errors.New("crypto/rsa: too few primes of given length to generate an RSA key")
rsa.go#L495: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
rsa.go#L499: var ErrDecryption = errors.New("crypto/rsa: decryption error")
rsa.go#L503: var ErrVerification = errors.New("crypto/rsa: verification error")
rsa.go#L525: return precomputed, errors.New("crypto/rsa: missing public modulus")
rsa.go#L528: return precomputed, errors.New("crypto/rsa: missing private exponent")
rsa.go#L534: return precomputed, errors.New("crypto/rsa: prime P is nil")
rsa.go#L537: return precomputed, errors.New("crypto/rsa: prime Q is nil")
rsa.go#L585: return precomputed, errors.New("crypto/rsa: prime factor is nil")
rsa.go#L588: return precomputed, errors.New("crypto/rsa: prime factor is <= 1")
rsa.go#L600: return precomputed, errors.New("crypto/rsa: prime factors are not relatively prime")
rsa.go#L615: return precomputed, errors.New("crypto/rsa: prime factors are not relatively prime")
crypto/sha1
sha1.go#L71: return errors.New("crypto/sha1: invalid hash state identifier")
sha1.go#L74: return errors.New("crypto/sha1: invalid hash state size")
sha1.go#L125: return 0, errors.New("crypto/sha1: use of SHA-1 is not allowed in FIPS 140-only mode")
crypto/tls
auth.go#L31: return errors.New("ECDSA verification failure")
auth.go#L39: return errors.New("Ed25519 verification failure")
auth.go#L59: return errors.New("internal error: unknown signature type")
auth.go#L253: return 0, errors.New("tls: peer doesn't support any of the certificate's signature algorithms")
common.go#L1235: var errNoCertificates = errors.New("tls: no certificates configured")
common.go#L1305: return errors.New("no mutually supported protocol versions")
common.go#L1373: return supportsRSAFallback(errors.New("client doesn't support ECDHE, can only use legacy RSA key exchange"))
common.go#L1399: return errors.New("client doesn't support certificate curve")
common.go#L1404: return errors.New("connection doesn't support Ed25519")
common.go#L1437: return supportsRSAFallback(errors.New("client doesn't support any cipher suites compatible with the certificate"))
common.go#L1472: return errors.New("chain is not signed by an acceptable CA")
common.go#L1711: return nil, errors.New("tls: no FIPS compatible certificate chains found")
conn.go#L620: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
conn.go#L625: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
conn.go#L792: return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
conn.go#L977: return 0, errors.New("tls: internal error: sending non-handshake message to QUIC transport")
conn.go#L1187: errShutdown = errors.New("tls: protocol is shutdown")
conn.go#L1255: return errors.New("tls: internal error: unexpected renegotiation")
conn.go#L1284: return errors.New("tls: unknown Renegotiation value")
conn.go#L1311: return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
conn.go#L1331: return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
conn.go#L1450: var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake complete")
conn.go#L1578: c.handshakeErr = errors.New("tls: internal error: handshake should have had a result")
conn.go#L1676: return errors.New("tls: VerifyHostname called on TLS server connection")
conn.go#L1679: return errors.New("tls: handshake has not yet been performed")
conn.go#L1682: return errors.New("tls: handshake did not verify certificate chain")
ech.go#L56: var errMalformedECHConfig = errors.New("tls: malformed ECHConfigList")
ech.go#L139: return nil, errors.New("tls: malformed ECHConfig")
ech.go#L206: return echCipher{}, errors.New("tls: no supported symmetric ciphersuites for ECH")
ech.go#L254: return nil, errors.New("tls: malformed outer client hello")
ech.go#L259: return nil, errors.New("tls: malformed outer client hello")
ech.go#L267: return nil, errors.New("tls: invalid inner client hello")
ech.go#L292: return nil, errors.New("tls: invalid inner client hello")
ech.go#L300: return nil, errors.New("tls: invalid inner client hello")
ech.go#L328: recon.SetError(errors.New("tls: invalid inner client hello"))
ech.go#L333: recon.SetError(errors.New("tls: invalid inner client hello"))
ech.go#L340: recon.SetError(errors.New("tls: invalid inner client hello"))
ech.go#L344: recon.SetError(errors.New("tls: invalid outer extensions"))
ech.go#L349: recon.SetError(errors.New("tls: invalid outer extensions"))
ech.go#L377: return nil, errors.New("tls: invalid reconstructed inner client hello")
ech.go#L400: return nil, errors.New("tls: client sent encrypted_client_hello extension with unsupported versions")
ech.go#L405: return nil, errors.New("tls: client sent encrypted_client_hello extension but did not offer TLS 1.3")
ech.go#L503: var errMalformedECHExt = errors.New("tls: malformed encrypted_client_hello extension")
ech.go#L504: var errInvalidECHExt = errors.New("tls: client sent invalid encrypted_client_hello extension")
handshake_client.go#L50: return nil, nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
handshake_client.go#L56: return nil, nil, nil, errors.New("tls: invalid NextProtos value")
handshake_client.go#L62: return nil, nil, nil, errors.New("tls: NextProtos values too large")
handshake_client.go#L67: return nil, nil, nil, errors.New("tls: no supported versions satisfy MinVersion and MaxVersion")
handshake_client.go#L119: return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
handshake_client.go#L130: return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
handshake_client.go#L156: return nil, nil, nil, errors.New("tls: no supported elliptic curves for ECDHE")
handshake_client.go#L188: return nil, nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
handshake_client.go#L212: return nil, nil, nil, errors.New("tls: MinVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
handshake_client.go#L215: return nil, nil, nil, errors.New("tls: MaxVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
handshake_client.go#L223: return nil, nil, nil, errors.New("tls: EncryptedClientHelloConfigList contains no valid configs")
handshake_client.go#L311: return errors.New("tls: short read from Rand: " + err.Error())
handshake_client.go#L364: return errors.New("tls: downgrade attempt detected, possibly due to a MitM attack or a broken middlebox")
handshake_client.go#L639: return errors.New("tls: server chose an unconfigured cipher suite")
handshake_client.go#L684: return errors.New("tls: received unexpected CertificateStatus message")
handshake_client.go#L710: return errors.New("tls: server's identity changed during renegotiation")
handshake_client.go#L789: return errors.New("tls: failed to write to key log: " + err.Error())
handshake_client.go#L882: return false, errors.New("tls: server selected unsupported compression format")
handshake_client.go#L889: return false, errors.New("tls: initial handshake had non-empty renegotiation extension")
handshake_client.go#L899: return false, errors.New("tls: incorrect renegotiation extension contents")
handshake_client.go#L917: return false, errors.New("tls: server resumed a session with a different version")
handshake_client.go#L922: return false, errors.New("tls: server resumed a session with a different cipher suite")
handshake_client.go#L928: return false, errors.New("tls: server resumed a session with a different EMS extension")
handshake_client.go#L953: return errors.New("tls: server did not select an ALPN protocol")
handshake_client.go#L958: return errors.New("tls: server advertised unrequested ALPN extension")
handshake_client.go#L965: return errors.New("tls: server selected unadvertised ALPN protocol")
handshake_client.go#L992: return errors.New("tls: server's Finished message was incorrect")
handshake_client.go#L1011: return errors.New("tls: server sent unrequested session ticket")
handshake_client.go#L1091: return errors.New("tls: failed to parse certificate from server: " + err.Error())
handshake_client_tls13.go#L54: return errors.New("tls: server selected TLS 1.3 in a renegotiation")
handshake_client_tls13.go#L107: return errors.New("tls: unexpected encrypted client hello extension in server hello despite ECH being accepted")
handshake_client_tls13.go#L112: return errors.New("tls: unexpected server_name extension in server hello")
handshake_client_tls13.go#L169: return errors.New("tls: server selected TLS 1.3 using the legacy version field")
handshake_client_tls13.go#L174: return errors.New("tls: server selected an invalid version after a HelloRetryRequest")
handshake_client_tls13.go#L179: return errors.New("tls: server sent an incorrect legacy version")
handshake_client_tls13.go#L190: return errors.New("tls: server sent a ServerHello extension forbidden in TLS 1.3")
handshake_client_tls13.go#L195: return errors.New("tls: server did not echo the legacy session ID")
handshake_client_tls13.go#L200: return errors.New("tls: server selected unsupported compression format")
handshake_client_tls13.go#L206: return errors.New("tls: server changed cipher suite after a HelloRetryRequest")
handshake_client_tls13.go#L210: return errors.New("tls: server chose an unconfigured cipher suite")
handshake_client_tls13.go#L259: return errors.New("tls: malformed encrypted client hello extension")
handshake_client_tls13.go#L287: return errors.New("tls: unexpected encrypted client hello extension in serverHello")
handshake_client_tls13.go#L295: return errors.New("tls: server sent an unnecessary HelloRetryRequest message")
handshake_client_tls13.go#L304: return errors.New("tls: received malformed key_share extension")
handshake_client_tls13.go#L313: return errors.New("tls: server selected unsupported group")
handshake_client_tls13.go#L319: return errors.New("tls: server sent an unnecessary HelloRetryRequest key_share")
handshake_client_tls13.go#L328: return errors.New("tls: CurvePreferences includes unsupported curve")
handshake_client_tls13.go#L419: return errors.New("tls: server sent two HelloRetryRequest messages")
handshake_client_tls13.go#L424: return errors.New("tls: server sent a cookie in a normal ServerHello")
handshake_client_tls13.go#L429: return errors.New("tls: malformed key_share extension")
handshake_client_tls13.go#L434: return errors.New("tls: server did not send a key share")
handshake_client_tls13.go#L440: return errors.New("tls: server selected unsupported group")
handshake_client_tls13.go#L449: return errors.New("tls: server selected an invalid PSK")
handshake_client_tls13.go#L461: return errors.New("tls: server selected an invalid PSK and cipher suite pair")
handshake_client_tls13.go#L481: return errors.New("tls: invalid server X25519MLKEM768 key share")
handshake_client_tls13.go#L488: return errors.New("tls: invalid server key share")
handshake_client_tls13.go#L493: return errors.New("tls: invalid server key share")
handshake_client_tls13.go#L503: return errors.New("tls: invalid X25519MLKEM768 server key share")
handshake_client_tls13.go#L573: return errors.New("tls: server did not send a quic_transport_parameters extension")
handshake_client_tls13.go#L579: return errors.New("tls: server sent an unexpected quic_transport_parameters extension")
handshake_client_tls13.go#L585: return errors.New("tls: server sent an unexpected early_data extension")
handshake_client_tls13.go#L593: return errors.New("tls: server accepted 0-RTT with the wrong cipher suite")
handshake_client_tls13.go#L597: return errors.New("tls: server accepted 0-RTT with the wrong ALPN")
handshake_client_tls13.go#L605: return errors.New("tls: server sent encrypted client hello retry configs after accepting encrypted client hello")
handshake_client_tls13.go#L652: return errors.New("tls: received empty certificates message")
handshake_client_tls13.go#L679: return errors.New("tls: certificate used with invalid signature algorithm")
handshake_client_tls13.go#L687: return errors.New("tls: certificate used with invalid signature algorithm")
handshake_client_tls13.go#L693: return errors.New("tls: invalid signature by the server certificate: " + err.Error())
handshake_client_tls13.go#L723: return errors.New("tls: invalid server finished hash")
handshake_client_tls13.go#L815: return errors.New("tls: failed to sign handshake: " + err.Error())
handshake_client_tls13.go#L856: return errors.New("tls: received new session ticket from a client")
handshake_client_tls13.go#L870: return errors.New("tls: received a session ticket with invalid lifetime")
handshake_client_tls13.go#L876: return errors.New("tls: invalid early data for QUIC connection")
handshake_messages.go#L406: return errors.New("tls: internal error: pskBinders length mismatch")
handshake_messages.go#L410: return errors.New("tls: internal error: pskBinders length mismatch")
handshake_server.go#L193: return nil, nil, errors.New("tls: Encrypted Client Hello cannot be used pre-TLS 1.3")
handshake_server.go#L221: return errors.New("tls: client does not support uncompressed connections")
handshake_server.go#L244: return errors.New("tls: initial handshake had non-empty renegotiation extension")
handshake_server.go#L395: return errors.New("tls: no cipher suite supported by both client and server")
handshake_server.go#L413: return errors.New("tls: client using inappropriate protocol fallback")
handshake_server.go#L528: return errors.New("tls: session supported extended_master_secret but client does not")
handshake_server.go#L749: return errors.New("tls: client certificate used with invalid signature algorithm")
handshake_server.go#L766: return errors.New("tls: invalid signature by the client certificate: " + err.Error())
handshake_server.go#L828: return errors.New("tls: client's Finished message is incorrect")
handshake_server.go#L905: return errors.New("tls: failed to parse client certificate: " + err.Error())
handshake_server.go#L922: return errors.New("tls: client didn't provide a certificate")
handshake_server_tls13.go#L118: return errors.New("tls: client used the legacy version field to negotiate TLS 1.3")
handshake_server_tls13.go#L136: return errors.New("tls: client using inappropriate protocol fallback")
handshake_server_tls13.go#L145: return errors.New("tls: TLS 1.3 client supports illegal compression methods")
handshake_server_tls13.go#L156: return errors.New("tls: initial handshake had non-empty renegotiation extension")
handshake_server_tls13.go#L162: return errors.New("tls: early_data without pre_shared_key")
handshake_server_tls13.go#L172: return errors.New("tls: client sent unexpected early data")
handshake_server_tls13.go#L193: return errors.New("tls: no cipher suite supported by both client and server")
handshake_server_tls13.go#L213: return errors.New("tls: no key exchanges supported by both client and server")
handshake_server_tls13.go#L253: return errors.New("tls: invalid X25519MLKEM768 client key share")
handshake_server_tls13.go#L259: return errors.New("tls: CurvePreferences includes unsupported curve")
handshake_server_tls13.go#L270: return errors.New("tls: invalid client key share")
handshake_server_tls13.go#L275: return errors.New("tls: invalid client key share")
handshake_server_tls13.go#L281: return errors.New("tls: invalid X25519MLKEM768 client key share")
handshake_server_tls13.go#L309: return errors.New("tls: client offered TLS version older than TLS 1.3")
handshake_server_tls13.go#L315: return errors.New("tls: client did not send a quic_transport_parameters extension")
handshake_server_tls13.go#L321: return errors.New("tls: client sent an unexpected quic_transport_parameters extension")
handshake_server_tls13.go#L349: return errors.New("tls: invalid or missing PSK binders")
handshake_server_tls13.go#L427: return errors.New("tls: internal error: failed to clone hash")
handshake_server_tls13.go#L438: return errors.New("tls: invalid PSK binder")
handshake_server_tls13.go#L607: return nil, errors.New("tls: second client hello missing encrypted client hello extension")
handshake_server_tls13.go#L613: return nil, errors.New("tls: client sent invalid encrypted client hello extension")
handshake_server_tls13.go#L618: return nil, errors.New("tls: unexpected switch in encrypted client hello extension type")
handshake_server_tls13.go#L624: return nil, errors.New("tls: second client hello encrypted client hello extension does not match")
handshake_server_tls13.go#L630: return nil, errors.New("tls: failed to decrypt second client hello encrypted client hello extension payload")
handshake_server_tls13.go#L636: return nil, errors.New("tls: client sent invalid encrypted client hello extension")
handshake_server_tls13.go#L645: return nil, errors.New("tls: client didn't send one key share in second ClientHello")
handshake_server_tls13.go#L651: return nil, errors.New("tls: client sent unexpected key share in second ClientHello")
handshake_server_tls13.go#L656: return nil, errors.New("tls: client indicated early data in second ClientHello")
handshake_server_tls13.go#L661: return nil, errors.New("tls: client illegally modified second ClientHello")
handshake_server_tls13.go#L878: return errors.New("tls: failed to sign handshake: " + err.Error())
handshake_server_tls13.go#L982: return errors.New("tls: internal error: unknown cipher suite")
handshake_server_tls13.go#L1093: return errors.New("tls: client certificate used with invalid signature algorithm")
handshake_server_tls13.go#L1101: return errors.New("tls: client certificate used with invalid signature algorithm")
handshake_server_tls13.go#L1107: return errors.New("tls: invalid signature by the client certificate: " + err.Error())
handshake_server_tls13.go#L1141: return errors.New("tls: invalid client finished hash")
key_agreement.go#L38: var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
key_agreement.go#L39: var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
key_agreement.go#L61: return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
key_agreement.go#L78: return errors.New("tls: unexpected ServerKeyExchange")
key_agreement.go#L92: return nil, nil, errors.New("tls: server certificate contains incorrect key type for selected ciphersuite")
key_agreement.go#L179: return nil, errors.New("tls: no supported elliptic curves offered")
key_agreement.go#L182: return nil, errors.New("tls: CurvePreferences includes unsupported curve")
key_agreement.go#L224: return nil, errors.New("tls: certificate cannot be used with the selected cipher suite")
key_agreement.go#L235: return nil, errors.New("tls: failed to sign ECDHE parameters: " + err.Error())
key_agreement.go#L280: return errors.New("tls: server selected unsupported curve")
key_agreement.go#L297: return errors.New("tls: server selected unsupported curve")
key_agreement.go#L331: return errors.New("tls: certificate used with invalid signature algorithm")
key_agreement.go#L355: return errors.New("tls: invalid signature by the server certificate: " + err.Error())
key_agreement.go#L362: return nil, nil, errors.New("tls: missing ServerKeyExchange message")
key_schedule.go#L65: return nil, errors.New("tls: internal error: unsupported curve")
prf.go#L258: return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
prf.go#L265: return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when neither TLS 1.3 nor Extended Master Secret are negotiated; override with GODEBUG=tlsunsafeekm=1")
quic.go#L205: return quicError(errors.New("tls: Start called more than once"))
quic.go#L209: return quicError(errors.New("tls: Config MinVersion must be at least TLS 1.3"))
quic.go#L260: return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
quic.go#L306: return quicError(errors.New("tls: SendSessionTicket called before handshake completed"))
quic.go#L309: return quicError(errors.New("tls: SendSessionTicket called on the client"))
quic.go#L312: return quicError(errors.New("tls: SendSessionTicket called multiple times"))
quic.go#L325: return quicError(errors.New("tls: StoreSessionTicket called on the server"))
ticket.go#L148: b.SetError(errors.New("tls: internal error: empty verified chain"))
ticket.go#L199: return nil, errors.New("tls: invalid session encoding")
ticket.go#L204: return nil, errors.New("tls: invalid session encoding")
ticket.go#L214: return nil, errors.New("tls: invalid session encoding")
ticket.go#L222: return nil, errors.New("tls: invalid session encoding")
ticket.go#L236: return nil, errors.New("tls: invalid session encoding")
ticket.go#L241: return nil, errors.New("tls: invalid session encoding")
ticket.go#L245: return nil, errors.New("tls: invalid session encoding")
ticket.go#L251: return nil, errors.New("tls: invalid session encoding")
ticket.go#L265: return nil, errors.New("tls: invalid session encoding")
ticket.go#L271: return nil, errors.New("tls: invalid session encoding")
ticket.go#L277: return nil, errors.New("tls: no server certificates in client session")
ticket.go#L281: return nil, errors.New("tls: invalid session encoding")
ticket.go#L286: return nil, errors.New("tls: invalid session encoding")
ticket.go#L322: return nil, errors.New("tls: internal error: session ticket keys unavailable")
ticket.go#L337: return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
tls.go#L93: return nil, errors.New("tls: neither Certificates, GetCertificate, nor GetConfigForClient set in Config")
tls.go#L275: return fail(errors.New("tls: failed to find any PEM data in certificate input"))
tls.go#L278: return fail(errors.New("tls: failed to find certificate PEM data in certificate input, but did find a private key; PEM inputs may have been switched"))
tls.go#L289: return fail(errors.New("tls: failed to find any PEM data in key input"))
tls.go#L292: return fail(errors.New("tls: found a certificate rather than a key in the PEM for the private key"))
tls.go#L324: return fail(errors.New("tls: private key type does not match public key type"))
tls.go#L327: return fail(errors.New("tls: private key does not match public key"))
tls.go#L332: return fail(errors.New("tls: private key type does not match public key type"))
tls.go#L335: return fail(errors.New("tls: private key does not match public key"))
tls.go#L340: return fail(errors.New("tls: private key type does not match public key type"))
tls.go#L343: return fail(errors.New("tls: private key does not match public key"))
tls.go#L346: return fail(errors.New("tls: unknown public key algorithm"))
tls.go#L364: return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
tls.go#L371: return nil, errors.New("tls: failed to parse private key")
crypto/x509
oid.go#L19: errInvalidOID = errors.New("invalid oid")
parser.go#L67: return "", errors.New("invalid PrintableString")
parser.go#L73: return "", errors.New("invalid UTF-8 string")
parser.go#L78: return "", errors.New("invalid BMPString")
parser.go#L96: return "", errors.New("invalid IA5String")
parser.go#L102: return "", errors.New("invalid NumericString")
parser.go#L114: return nil, errors.New("x509: invalid RDNSequence")
parser.go#L122: return nil, errors.New("x509: invalid RDNSequence")
parser.go#L127: return nil, errors.New("x509: invalid RDNSequence: invalid attribute")
parser.go#L131: return nil, errors.New("x509: invalid RDNSequence: invalid attribute type")
parser.go#L136: return nil, errors.New("x509: invalid RDNSequence: invalid attribute value")
parser.go#L155: return ai, errors.New("x509: malformed OID")
parser.go#L163: return ai, errors.New("x509: malformed parameters")
parser.go#L175: return t, errors.New("x509: malformed UTCTime")
parser.go#L179: return t, errors.New("x509: malformed GeneralizedTime")
parser.go#L182: return t, errors.New("x509: unsupported time format")
parser.go#L203: return ext, errors.New("x509: malformed extension OID field")
parser.go#L207: return ext, errors.New("x509: malformed extension critical field")
parser.go#L212: return ext, errors.New("x509: malformed extension value field")
parser.go#L227: return nil, errors.New("x509: RSA key missing NULL parameters")
parser.go#L232: return nil, errors.New("x509: invalid RSA public key")
parser.go#L235: return nil, errors.New("x509: invalid RSA modulus")
parser.go#L238: return nil, errors.New("x509: invalid RSA public exponent")
parser.go#L242: return nil, errors.New("x509: RSA modulus is not a positive number")
parser.go#L245: return nil, errors.New("x509: RSA public exponent is not a positive number")
parser.go#L257: return nil, errors.New("x509: invalid ECDSA parameters")
parser.go#L261: return nil, errors.New("x509: unsupported elliptic curve")
parser.go#L265: return nil, errors.New("x509: failed to unmarshal elliptic curve point")
parser.go#L277: return nil, errors.New("x509: Ed25519 key encoded with illegal parameters")
parser.go#L280: return nil, errors.New("x509: wrong Ed25519 public key size")
parser.go#L287: return nil, errors.New("x509: X25519 key encoded with illegal parameters")
parser.go#L293: return nil, errors.New("x509: invalid DSA public key")
parser.go#L308: return nil, errors.New("x509: invalid DSA parameters")
parser.go#L312: return nil, errors.New("x509: zero or negative DSA parameter")
parser.go#L316: return nil, errors.New("x509: unknown public key algorithm")
parser.go#L323: return 0, errors.New("x509: invalid key usage")
parser.go#L338: return false, 0, errors.New("x509: invalid basic constraints")
parser.go#L342: return false, 0, errors.New("x509: invalid basic constraints")
parser.go#L348: return false, 0, errors.New("x509: invalid basic constraints")
parser.go#L358: return errors.New("x509: invalid subject alternative names")
parser.go#L364: return errors.New("x509: invalid subject alternative name")
parser.go#L380: return errors.New("x509: SAN rfc822Name is malformed")
parser.go#L386: return errors.New("x509: SAN dNSName is malformed")
parser.go#L392: return errors.New("x509: SAN uniformResourceIdentifier is malformed")
parser.go#L409: return errors.New("x509: cannot parse IP address of length " + strconv.Itoa(len(data)))
parser.go#L423: return nil, errors.New("x509: authority key identifier incorrectly marked critical")
parser.go#L428: return nil, errors.New("x509: invalid authority key identifier")
parser.go#L432: return nil, errors.New("x509: invalid authority key identifier")
parser.go#L443: return nil, nil, errors.New("x509: invalid extended key usages")
parser.go#L448: return nil, nil, errors.New("x509: invalid extended key usages")
parser.go#L463: return nil, errors.New("x509: invalid certificate policies")
parser.go#L469: return nil, errors.New("x509: invalid certificate policies")
parser.go#L472: return nil, errors.New("x509: invalid certificate policies")
parser.go#L477: return nil, errors.New("x509: invalid certificate policies")
parser.go#L533: return false, errors.New("x509: invalid NameConstraints extension")
parser.go#L541: return false, errors.New("x509: empty name constraints extension")
parser.go#L564: return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
parser.go#L606: return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
parser.go#L630: return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
parser.go#L720: return errors.New("x509: invalid CRL distribution points")
parser.go#L725: return errors.New("x509: invalid CRL distribution point")
parser.go#L730: return errors.New("x509: invalid CRL distribution point")
parser.go#L736: return errors.New("x509: invalid CRL distribution point")
parser.go#L744: return errors.New("x509: invalid CRL distribution point")
parser.go#L758: return errors.New("x509: invalid policy constraints extension")
parser.go#L763: return errors.New("x509: invalid policy constraints extension")
parser.go#L768: return errors.New("x509: policy constraints requireExplicitPolicy field overflows int")
parser.go#L775: return errors.New("x509: invalid policy constraints extension")
parser.go#L780: return errors.New("x509: policy constraints inhibitPolicyMapping field overflows int")
parser.go#L792: return errors.New("x509: subject key identifier incorrectly marked critical")
parser.go#L797: return errors.New("x509: invalid subject key identifier")
parser.go#L814: return errors.New("x509: invalid policy mappings extension")
parser.go#L822: return errors.New("x509: invalid policy mappings extension")
parser.go#L829: return errors.New("x509: invalid inhibit any policy extension")
parser.go#L840: return errors.New("x509: authority info access incorrectly marked critical")
parser.go#L844: return errors.New("x509: invalid authority info access")
parser.go#L849: return errors.New("x509: invalid authority info access")
parser.go#L853: return errors.New("x509: invalid authority info access")
parser.go#L859: return errors.New("x509: invalid authority info access")
parser.go#L891: return nil, errors.New("x509: malformed certificate")
parser.go#L895: return nil, errors.New("x509: malformed certificate")
parser.go#L902: return nil, errors.New("x509: malformed tbs certificate")
parser.go#L906: return nil, errors.New("x509: malformed tbs certificate")
parser.go#L910: return nil, errors.New("x509: malformed version")
parser.go#L913: return nil, errors.New("x509: malformed version")
parser.go#L919: return nil, errors.New("x509: invalid version")
parser.go#L924: return nil, errors.New("x509: malformed serial number")
parser.go#L928: return nil, errors.New("x509: negative serial number")
parser.go#L937: return nil, errors.New("x509: malformed signature algorithm identifier")
parser.go#L944: return nil, errors.New("x509: malformed algorithm identifier")
parser.go#L947: return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
parser.go#L957: return nil, errors.New("x509: malformed issuer")
parser.go#L968: return nil, errors.New("x509: malformed validity")
parser.go#L977: return nil, errors.New("x509: malformed issuer")
parser.go#L988: return nil, errors.New("x509: malformed spki")
parser.go#L992: return nil, errors.New("x509: malformed spki")
parser.go#L996: return nil, errors.New("x509: malformed public key algorithm identifier")
parser.go#L1005: return nil, errors.New("x509: malformed subjectPublicKey")
parser.go#L1019: return nil, errors.New("x509: malformed issuerUniqueID")
parser.go#L1022: return nil, errors.New("x509: malformed subjectUniqueID")
parser.go#L1028: return nil, errors.New("x509: malformed extensions")
parser.go#L1033: return nil, errors.New("x509: malformed extensions")
parser.go#L1038: return nil, errors.New("x509: malformed extension")
parser.go#L1061: return nil, errors.New("x509: malformed signature")
parser.go#L1079: return nil, errors.New("x509: trailing data")
parser.go#L1113: return nil, errors.New("x509: malformed crl")
parser.go#L1117: return nil, errors.New("x509: malformed crl")
parser.go#L1124: return nil, errors.New("x509: malformed tbs crl")
parser.go#L1128: return nil, errors.New("x509: malformed tbs crl")
parser.go#L1133: return nil, errors.New("x509: unsupported crl version")
parser.go#L1136: return nil, errors.New("x509: malformed crl")
parser.go#L1144: return nil, errors.New("x509: malformed signature algorithm identifier")
parser.go#L1151: return nil, errors.New("x509: malformed algorithm identifier")
parser.go#L1154: return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
parser.go#L1164: return nil, errors.New("x509: malformed signature")
parser.go#L1170: return nil, errors.New("x509: malformed issuer")
parser.go#L1193: return nil, errors.New("x509: malformed crl")
parser.go#L1200: return nil, errors.New("x509: malformed crl")
parser.go#L1204: return nil, errors.New("x509: malformed crl")
parser.go#L1209: return nil, errors.New("x509: malformed serial number")
parser.go#L1218: return nil, errors.New("x509: malformed extensions")
parser.go#L1224: return nil, errors.New("x509: malformed extension")
parser.go#L1253: return nil, errors.New("x509: malformed extensions")
parser.go#L1257: return nil, errors.New("x509: malformed extensions")
parser.go#L1262: return nil, errors.New("x509: malformed extension")
parser.go#L1277: return nil, errors.New("x509: malformed crl number")
pem_decrypt.go#L110: var IncorrectPasswordError = errors.New("x509: decryption password incorrect")
pem_decrypt.go#L127: return nil, errors.New("x509: no DEK-Info header in block")
pem_decrypt.go#L132: return nil, errors.New("x509: malformed DEK-Info header")
pem_decrypt.go#L137: return nil, errors.New("x509: unknown encryption mode")
pem_decrypt.go#L144: return nil, errors.New("x509: incorrect IV size")
pem_decrypt.go#L156: return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size")
pem_decrypt.go#L171: return nil, errors.New("x509: invalid padding")
pem_decrypt.go#L198: return nil, errors.New("x509: unknown encryption mode")
pem_decrypt.go#L202: return nil, errors.New("x509: cannot generate IV: " + err.Error())
pkcs1.go#L62: return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
pkcs1.go#L65: return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
pkcs1.go#L71: return nil, errors.New("x509: unsupported private key version")
pkcs1.go#L78: return nil, errors.New("x509: private key contains zero or negative value")
pkcs1.go#L96: return nil, errors.New("x509: private key contains zero or negative prime")
pkcs1.go#L172: return nil, errors.New("x509: failed to parse public key (use ParsePKIXPublicKey instead for this key format)")
pkcs1.go#L181: return nil, errors.New("x509: public key contains zero or negative value")
pkcs1.go#L184: return nil, errors.New("x509: public key contains large public exponent")
pkcs8.go#L42: return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
pkcs8.go#L45: return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
pkcs8.go#L53: return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error())
pkcs8.go#L65: return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error())
pkcs8.go#L71: return nil, errors.New("x509: invalid Ed25519 private key parameters")
pkcs8.go#L84: return nil, errors.New("x509: invalid X25519 private key parameters")
pkcs8.go#L124: return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
pkcs8.go#L128: return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
pkcs8.go#L137: return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
pkcs8.go#L162: return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
pkcs8.go#L166: return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
pkcs8.go#L175: return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
sec1.go#L49: return nil, errors.New("x509: unknown elliptic curve")
sec1.go#L59: return nil, errors.New("invalid elliptic key public key")
sec1.go#L88: return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
sec1.go#L91: return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
sec1.go#L93: return nil, errors.New("x509: failed to parse EC private key: " + err.Error())
sec1.go#L106: return nil, errors.New("x509: unknown elliptic curve")
sec1.go#L112: return nil, errors.New("x509: invalid elliptic curve private key value")
sec1.go#L124: return nil, errors.New("x509: invalid private key length")
verify.go#L184: var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate")
verify.go#L635: return errors.New("x509: internal error: empty chain when appending CA cert")
verify.go#L974: err = errors.New("x509: signature check attempts limit reached while verifying certificate chain")
x509.go#L76: return nil, errors.New("x509: failed to parse public key (use ParsePKCS1PublicKey instead for this key format)")
x509.go#L80: return nil, errors.New("x509: trailing data after ASN.1 of public-key")
x509.go#L102: return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
x509.go#L105: return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: invalid elliptic curve public key")
x509.go#L125: return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
x509.go#L877: var ErrUnsupportedAlgorithm = errors.New("x509: cannot verify signature: algorithm unimplemented")
x509.go#L1012: return errors.New("x509: ECDSA verification failure")
x509.go#L1020: return errors.New("x509: Ed25519 verification failure")
x509.go#L1431: return ext, errors.New("x509: unknown extended key usage")
x509.go#L1466: child.SetError(errors.New("invalid policy object identifier"))
x509.go#L1537: return 0, ai, errors.New("x509: unsupported elliptic curve")
x509.go#L1545: return 0, ai, errors.New("x509: only RSA, ECDSA and Ed25519 keys supported")
x509.go#L1555: return 0, ai, errors.New("x509: requested SignatureAlgorithm does not match private key type")
x509.go#L1558: return 0, ai, errors.New("x509: signing with MD5 is not supported")
x509.go#L1568: return 0, ai, errors.New("x509: unknown SignatureAlgorithm")
x509.go#L1671: return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
x509.go#L1703: return nil, errors.New("x509: serial number must be positive")
x509.go#L1707: return nil, errors.New("x509: only CAs are allowed to specify MaxPathLen")
x509.go#L1753: return nil, errors.New("x509: internal error: supported public key does not implement Equal")
x509.go#L1755: return nil, errors.New("x509: provided PrivateKey doesn't match parent's PublicKey")
x509.go#L1824: return nil, errors.New("x509: trailing data after CRL")
x509.go#L1837: return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
x509.go#L1969: return nil, errors.New("x509: failed to unmarshal raw CSR Attributes")
x509.go#L2018: return nil, errors.New("x509: certificate request contains duplicate requested extensions")
x509.go#L2050: return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
x509.go#L2141: return nil, errors.New("x509: failed to serialise extensions attribute: " + err.Error())
x509.go#L2234: return nil, errors.New("x509: trailing data after X.509 Subject")
x509.go#L2397: return nil, errors.New("x509: template can not be nil")
x509.go#L2400: return nil, errors.New("x509: issuer can not be nil")
x509.go#L2403: return nil, errors.New("x509: issuer must have the crlSign key usage bit set")
x509.go#L2406: return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
x509.go#L2409: return nil, errors.New("x509: template.ThisUpdate is after template.NextUpdate")
x509.go#L2412: return nil, errors.New("x509: template contains nil Number field")
x509.go#L2436: return nil, errors.New("x509: template contains entry with nil SerialNumber field")
x509.go#L2439: return nil, errors.New("x509: template contains entry with zero RevocationTime field")
x509.go#L2452: return nil, errors.New("x509: template contains entry with ReasonCode ExtraExtension; use ReasonCode field instead")
x509.go#L2484: return nil, errors.New("x509: CRL number exceeds 20 octets")
database/sql
convert.go#L22: var errNilPtr = errors.New("destination pointer is nil") // embedded in descriptive error
convert.go#L336: return errors.New("invalid context to convert cursor rows, missing parent *Rows")
convert.go#L401: return errors.New("destination not a pointer")
ctxutil.go#L111: return nil, errors.New("sql: driver does not support non-default isolation level")
ctxutil.go#L117: return nil, errors.New("sql: driver does not support read-only transactions")
ctxutil.go#L141: return nil, errors.New("sql: driver does not support the use of Named Parameters")
sql.go#L493: var ErrNoRows = errors.New("sql: no rows in result set")
sql.go#L654: return func() error { return errors.New("sql: duplicate driverConn close") }
sql.go#L664: return errors.New("sql: duplicate driverConn close")
sql.go#L1313: var errDBClosed = errors.New("sql: database is closed")
sql.go#L1936: var ErrConnDone = errors.New("sql: connection is already closed")
sql.go#L2230: var ErrTxDone = errors.New("sql: transaction has already been committed or rolled back")
sql.go#L2425: return &Stmt{stickyErr: errors.New("sql: Tx.Stmt: statement from different database used")}
sql.go#L2725: err = errors.New("sql: statement is closed")
sql.go#L3178: var errRowsClosed = errors.New("sql: Rows are closed")
sql.go#L3179: var errNoRows = errors.New("sql: no Rows available")
sql.go#L3392: return errors.New("sql: Scan called without calling Next")
sql.go#L3508: return errors.New("sql: RawBytes isn't allowed on Row.Scan")
database/sql/driver
driver.go#L149: var ErrSkip = errors.New("driver: skip fast-path; continue as if unimplemented")
driver.go#L163: var ErrBadConn = errors.New("driver: bad connection")
driver.go#L386: var ErrRemoveArgument = errors.New("driver: remove argument from query")
driver.go#L531: return 0, errors.New("LastInsertId is not supported by this driver")
driver.go#L548: return 0, errors.New("no LastInsertId available after DDL statement")
driver.go#L552: return 0, errors.New("no RowsAffected available after DDL statement")
encoding/asn1
asn1.go#L475: return "", errors.New("asn1: invalid UTF-8 string")
asn1.go#L486: return "", errors.New("pkcs12: odd-length BMP string")
asn1.go#L527: err = errors.New("asn1: internal error in parseTagAndLength")
marshal.go#L643: return nil, errors.New("asn1: string not valid UTF-8")
encoding/binary
binary.go#L33: var errBufferTooSmall = errors.New("buffer too small")
binary.go#L282: return errors.New("binary.Read: invalid type " + reflect.TypeOf(data).String())
binary.go#L319: return 0, errors.New("binary.Decode: invalid type " + reflect.TypeOf(data).String())
binary.go#L426: return errors.New("binary.Write: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
binary.go#L455: return 0, errors.New("binary.Encode: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
binary.go#L482: return nil, errors.New("binary.Append: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
varint.go#L124: var errOverflow = errors.New("binary: varint overflows a 64-bit integer")
encoding/hex
hex.go#L67: var ErrLength = errors.New("encoding/hex: odd length hex string")
hex.go#L264: return 0, errors.New("encoding/hex: dumper closed")
encoding/json
stream.go#L272: return errors.New("json.RawMessage: UnmarshalJSON on nil pointer")
encoding/pem
pem.go#L244: return errors.New("pem: cannot encode a header key that contains a colon")
encoding/xml
marshal.go#L992: p.err = errors.New("use of closed Encoder")
marshal.go#L1003: p.err = errors.New("use of closed Encoder")
marshal.go#L1014: p.err = errors.New("use of closed Encoder")
read.go#L150: return errors.New("non-pointer passed to Unmarshal")
read.go#L154: return errors.New("nil pointer passed to Unmarshal")
read.go#L318: var errUnmarshalDepth = errors.New("exceeded max depth")
read.go#L395: return errors.New("unknown type " + v.Type().String())
read.go#L636: return errors.New("cannot unmarshal into " + dst0.Type().String())
xml.go#L539: var errRawToken = errors.New("xml: cannot use RawToken from UnmarshalXML method")
flag
flag.go#L101: var ErrHelp = errors.New("flag: help requested")
flag.go#L105: var errParse = errors.New("parse error")
flag.go#L109: var errRange = errors.New("value out of range")
flag.go#L1061: return errors.New(msg)
fmt
errors.go#L30: err = errors.New(s)
scan.go#L180: return 0, errors.New("ScanState's Read should not be called. Use ReadRune")
scan.go#L244: panic(scanError{errors.New(err)})
scan.go#L371: return errors.New("fmt: scanning called UnreadRune with no rune available")
scan.go#L465: var errComplex = errors.New("syntax error scanning complex number")
scan.go#L466: var errBool = errors.New("syntax error scanning boolean")
github.com/aws/aws-sdk-go-v2/aws/arn
arn.go#L63: return ARN{}, errors.New(invalidPrefix)
arn.go#L67: return ARN{}, errors.New(invalidSections)
github.com/aws/aws-sdk-go-v2/internal/sync/singleflight
singleflight.go#L18: var errGoexit = errors.New("runtime.Goexit was called")
github.com/aws/smithy-go/internal/sync/singleflight
singleflight.go#L18: var errGoexit = errors.New("runtime.Goexit was called")
github.com/go-pg/migrations/v8
collection.go#L89: return errors.New("Register expects at least 1 arg")
github.com/go-pg/pg/v10
listener.go#L19: errListenerClosed = errors.New("pg: listener is closed")
listener.go#L20: errPingTimeout = errors.New("pg: ping timeout")
messages.go#L157: return errors.New("pg: SSL is not enabled on the server")
options.go#L182: return nil, errors.New("pg: invalid scheme: " + parsedURL.Scheme)
options.go#L210: return nil, errors.New("pg: database name not provided")
options.go#L253: return nil, errors.New("pg: options other than 'sslmode', 'application_name' and 'connect_timeout' are not supported")
stmt.go#L13: var errStmtClosed = errors.New("pg: statement is closed")
tx.go#L17: var ErrTxDone = errors.New("pg: transaction has already been committed or rolled back")
github.com/go-pg/pg/v10/internal/pool
pool.go#L15: ErrClosed = errors.New("pg: database is closed")
pool.go#L16: ErrPoolTimeout = errors.New("pg: connection pool timeout")
pool_sticky.go#L146: return errors.New("pg: StickyConnPool.Close: infinite loop")
pool_sticky.go#L162: return errors.New("pg: StickyConnPool does not have a Conn")
reader_bytes.go#L57: return errors.New("UnreadByte: at beginning of slice")
github.com/go-pg/pg/v10/orm
composite_parser.go#L13: var errEndOfComposite = errors.New("pg: end of composite")
model.go#L12: var errModelNil = errors.New("pg: Model(nil)")
query.go#L632: q.err(errors.New("pg: no joins to apply JoinOn"))
query.go#L645: q.err(errors.New("pg: no joins to apply JoinOn"))
query.go#L1414: err := errors.New(
github.com/go-pg/pg/v10/types
array_parser.go#L13: var errEndOfArray = errors.New("pg: end of array")
hstore_parser.go#L10: var errEndOfHstore = errors.New("pg: end of hstore")
scan.go#L42: return errors.New("pg: Scan(nil)")
scan.go#L55: return errors.New("pg: Scan(nil)")
scan_value.go#L172: return errors.New("pg: Scan(nil)")
scan_value.go#L181: return errors.New("pg: Scan(nil)")
github.com/golang/protobuf/jsonpb
decode.go#L74: return errors.New("invalid nil message")
decode.go#L155: return errors.New("Any JSON doesn't have '@type'")
decode.go#L184: return errors.New("Any JSON doesn't have 'value'")
encode.go#L88: return nil, errors.New("Marshal called with nil")
encode.go#L181: return errors.New("signs of seconds and nanos do not match")
encode.go#L214: return errors.New("nil Value")
github.com/golang/protobuf/proto
buffer.go#L313: return nil, 0, errors.New("proto: cannot parse reserved wire type")
deprecated.go#L18: ErrNil = errors.New("proto: Marshal called with nil")
deprecated.go#L21: ErrTooLarge = errors.New("proto: message encodes to over 2 GB")
deprecated.go#L24: ErrInternalBadWireType = errors.New("proto: internal error: bad wiretype for oneof")
deprecated.go#L35: return nil, errors.New("proto: not implemented")
deprecated.go#L40: return errors.New("proto: not implemented")
deprecated.go#L45: return nil, errors.New("proto: not implemented")
deprecated.go#L50: return errors.New("proto: not implemented")
extensions.go#L39: var ErrMissingExtension = errors.New("proto: missing extension")
extensions.go#L41: var errNotExtendable = errors.New("proto: not an extendable proto.Message")
text_decode.go#L662: var errBadUTF8 = errors.New("proto: bad UTF-8")
github.com/golang/protobuf/ptypes
duration.go#L63: return errors.New("duration: nil Duration")
timestamp.go#L100: return errors.New("timestamp: nil Timestamp")
github.com/tmthrgd/go-hex
hex.go#L18: var errLength = errors.New("go-hex: odd length hex string")
github.com/valyala/fastjson
scanner.go#L94: var errEOF = errors.New("end of s")
github.com/vmihailenco/bufpool
buffer.go#L41: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
buffer.go#L313: return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
buffer.go#L322: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")
github.com/vmihailenco/msgpack/v5
decode.go#L269: return errors.New("msgpack: Decode(nil)")
decode_map.go#L11: var errArrayStruct = errors.New("msgpack: number of fields in array-encoded struct has changed")
decode_value.go#L196: v.Set(reflect.ValueOf(errors.New(vv)))
go.pact.im/x/extraio
count.go#L11: var ErrCounterOverflow = errors.New("extraio: counter overflow")
hardlimit.go#L10: var ErrExceededReadLimit = errors.New("extraio: exceeded read limit")
go.pact.im/x/flaky
debounce.go#L14: var ErrDebounced = errors.New("flaky: debounced")
schedule.go#L14: ErrNoNextSchedule = errors.New("flaky: no next scheduled time")
schedule.go#L18: ErrScheduleDeadline = errors.New("flaky: scheduled time exceeds context deadline")
go.pact.im/x/goupdate
flags.go#L22: var errParse = errors.New("parse error")
workspaces.go#L38: return nil, errors.New("no go.work or go.mod files found")
go.pact.im/x/process
process.go#L16: var ErrProcessInvalidState = errors.New("process: invalid process state")
go.pact.im/x/supervisor
errors.go#L10: ErrNotRunning = errors.New("supervisor: not running")
errors.go#L14: ErrProcessNotFound = errors.New("supervisor: process not found")
errors.go#L18: ErrProcessNotRunning = errors.New("supervisor: process is not running")
errors.go#L22: ErrProcessExists = errors.New("supervisor: process already exists")
go.uber.org/goleak
leaks.go#L60: return errors.New("Cleanup can only be passed to VerifyNone or VerifyTestMain")
go.uber.org/mock/gomock
callset.go#L131: return nil, errors.New(callsErrors.String())
go.uber.org/zap
config.go#L185: return nil, errors.New("missing Level")
encoder.go#L32: errNoEncoderNameSpecified = errors.New("no encoder name specified")
encoder.go#L66: return nil, errors.New("missing EncodeTime in EncoderConfig")
http_handler.go#L112: return 0, errors.New("must specify logging level")
http_handler.go#L129: return 0, errors.New("must specify logging level")
sink.go#L79: return errors.New("can't register a sink factory for empty string")
sink.go#L164: return "", errors.New("must start with a letter")
go.uber.org/zap/zapcore
level.go#L29: var errUnmarshalNilLevel = errors.New("can't unmarshal a nil *Level")
go/build
build.go#L1125: var errNoModules = errors.New("not using modules")
build.go#L1269: return errors.New(errStr)
build.go#L1548: errMultipleGoBuild = errors.New("multiple //go:build comments")
build.go#L1916: err = errors.New("unclosed quote")
build.go#L1918: err = errors.New("unfinished escaping")
build.go#L2072: return "?", errors.New("architecture letter no longer used")
read.go#L60: errSyntax = errors.New("syntax error")
read.go#L61: errNUL = errors.New("unexpected NUL in input")
go/build/constraint
expr.go#L149: var errNotConstraint = errors.New("not a build constraint")
expr.go#L469: var errComplex = errors.New("expression too complex for // +build lines")
go/parser
interface.go#L39: return nil, errors.New("invalid source")
go/types
instantiate.go#L224: return i, errors.New(cause)
golang.org/x/crypto/blake2b
blake2b.go#L45: errKeySize = errors.New("blake2b: invalid key size")
blake2b.go#L46: errHashSize = errors.New("blake2b: invalid hash size")
blake2b.go#L164: return nil, errors.New("crypto/blake2b: cannot marshal MACs")
blake2b.go#L182: return errors.New("crypto/blake2b: invalid hash state identifier")
blake2b.go#L185: return errors.New("crypto/blake2b: invalid hash state size")
blake2x.go#L57: return nil, errors.New("blake2b: XOF length too large")
golang.org/x/net/http2
databuffer.go#L76: var errReadEmpty = errors.New("read from empty dataBuffer")
errors.go#L80: var errFromPeer = errors.New("received from peer")
errors.go#L143: errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
errors.go#L144: errPseudoAfterRegular = errors.New("pseudo header field after regular")
frame.go#L475: var ErrFrameTooLarge = errors.New("http2: frame too large")
frame.go#L536: fr.errDetail = errors.New(reason)
frame.go#L635: errStreamID = errors.New("invalid stream ID")
frame.go#L636: errDepStreamID = errors.New("invalid dependent stream ID")
frame.go#L637: errPadLength = errors.New("pad length too large")
frame.go#L638: errPadBytes = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
frame.go#L988: return errors.New("illegal window increment value")
frame.go#L1529: return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
gotrack.go#L111: err = errors.New("invalid base " + strconv.Itoa(base))
pipe.go#L81: errClosedPipeWrite = errors.New("write on closed buffer")
pipe.go#L82: errUninitializedPipeWrite = errors.New("write on uninitialized buffer")
server.go#L63: errClientDisconnected = errors.New("client disconnected")
server.go#L64: errClosedBody = errors.New("body closed by handler")
server.go#L65: errHandlerComplete = errors.New("http2: request body closed due to handler exiting")
server.go#L66: errStreamClosed = errors.New("http2: stream closed")
server.go#L1081: var errPrefaceTimeout = errors.New("timeout waiting for client preface")
server.go#L1311: var errHandlerPanicked = errors.New("http2: handler panicked")
server.go#L3021: return 0, errors.New("http2: handler wrote more than declared Content-Length")
server.go#L3041: ErrRecursivePush = errors.New("http2: recursive push not allowed")
server.go#L3042: ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
server.go#L3090: return errors.New("URL must have a host")
server.go#L3275: return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
transport.go#L590: return nil, errors.New("http2: unsupported scheme")
transport.go#L643: errClientConnClosed = errors.New("http2: client conn is closed")
transport.go#L644: errClientConnUnusable = errors.New("http2: client conn not usable")
transport.go#L645: errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
transport.go#L743: return nil, errors.New("http2: could not negotiate protocol mutually")
transport.go#L1192: err := errors.New("http2: client connection force closed via ClientConn.Close")
transport.go#L1199: err := errors.New("http2: client connection lost")
transport.go#L1208: var errRequestCanceled = errors.New("net/http: request canceled")
transport.go#L1723: errStopReqBodyWrite = errors.New("http2: aborting request body write")
transport.go#L1726: errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
transport.go#L1728: errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
transport.go#L1966: var errNilRequestURL = errors.New("http2: Request.URI is nil")
transport.go#L1984: return nil, errors.New("http2: invalid Host header")
transport.go#L2429: Cause: errors.New("protocol error: headers after END_STREAM"),
transport.go#L2488: return nil, errors.New("malformed response from server: missing status pseudo header")
transport.go#L2492: return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
transport.go#L2534: return nil, errors.New("1xx informational response with END_STREAM flag")
transport.go#L2539: return nil, errors.New("http2: too many 1xx informational responses")
transport.go#L2646: err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
transport.go#L2686: var errClosedResponseBody = errors.New("http2: response body closed")
transport.go#L3122: errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
transport.go#L3123: errRequestHeaderListSize = errors.New("http2: request header list larger than peer's advertised limit")
golang.org/x/net/http2/hpack
hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
hpack.go#L238: return DecodingError{errors.New("truncated headers")}
hpack.go#L287: var errNeedMore = errors.New("need more data")
hpack.go#L334: return DecodingError{errors.New("invalid encoding")}
hpack.go#L416: return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
hpack.go#L425: return DecodingError{errors.New("dynamic table size update too large")}
hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")
golang.org/x/text/secure/bidirule
bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")
golang.org/x/text/transform
transform.go#L21: ErrShortDst = errors.New("transform: short destination buffer")
transform.go#L25: ErrShortSrc = errors.New("transform: short source buffer")
transform.go#L29: ErrEndOfSpan = errors.New("transform: input and output are not identical")
transform.go#L33: errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
transform.go#L37: errShortInternal = errors.New("transform: short internal buffer")
golang.org/x/tools/go/packages
packages.go#L352: return nil, errors.New("failed to split patterns into chunks, negative safe argMax value")
packages.go#L361: return nil, errors.New("failed to split patterns into chunks, a pattern is too long")
packages.go#L382: errNotHandled := errors.New("driver returned NotHandled")
golang.org/x/tools/internal/pkgbits
decoder.go#L287: var overflow = errors.New("pkgbits: readUvarint overflows a 64-bit integer")
google.golang.org/grpc
clientconn.go#L69: errConnDrain = errors.New("grpc: the connection is drained")
clientconn.go#L71: errConnClosing = errors.New("grpc: the connection is closing")
clientconn.go#L82: errNoTransportSecurity = errors.New("grpc: no transport security set (use grpc.WithTransportCredentials(insecure.NewCredentials()) explicitly or set credentials)")
clientconn.go#L85: errTransportCredsAndBundle = errors.New("grpc: credentials.Bundle may not be used with individual TransportCredentials")
clientconn.go#L88: errNoTransportCredsInBundle = errors.New("grpc: credentials.Bundle must return non-nil transport credentials")
clientconn.go#L92: errTransportCredentialsMissing = errors.New("grpc: the credentials require transport level security (use grpc.WithTransportCredentials() to set)")
clientconn.go#L1528: var ErrClientConnTimeout = errors.New("grpc: timed out when dialing")
pickfirst.go#L81: b.ResolverError(errors.New("produced zero addresses"))
server.go#L753: var ErrServerStopped = errors.New("grpc: the server has been stopped")
server.go#L945: defer st.Close(errors.New("finished serving streams for the server transport"))
server.go#L1050: st.Close(errors.New("Server.addConn called when server has already been stopped"))
server.go#L1813: st.Close(errors.New("Server.Stop called"))
service_config.go#L182: errDuplicatedName = errors.New("duplicated name")
service_config.go#L183: errEmptyServiceNonEmptyMethod = errors.New("cannot combine empty 'service' and non-empty 'method'")
stream.go#L1100: return toRPCErr(errors.New("grpc: client streaming protocol violation: get <nil>, want <EOF>"))
stream.go#L1175: return nil, errors.New("transport provided is nil")
stream.go#L1417: return toRPCErr(errors.New("grpc: client streaming protocol violation: get <nil>, want <EOF>"))
google.golang.org/grpc/balancer
balancer.go#L259: ErrNoSubConnAvailable = errors.New("no SubConn is available")
balancer.go#L266: ErrTransientFailure = errors.New("all SubConns are in TransientFailure")
balancer.go#L386: var ErrBadResolverState = errors.New("bad resolver state")
google.golang.org/grpc/balancer/base
balancer.go#L135: b.ResolverError(errors.New("produced zero addresses"))
google.golang.org/grpc/credentials
credentials.go#L125: var ErrConnDispatched = errors.New("credentials: rawConn is dispatched out of gRPC")
credentials.go#L249: return errors.New("AuthInfo is nil")
google.golang.org/grpc/internal/balancer/gracefulswitch
gracefulswitch.go#L33: var errBalancerClosed = errors.New("gracefulSwitchBalancer is closed")
google.golang.org/grpc/internal/binarylog
env_config.go#L65: return errors.New("empty string is not a valid method binary logging config")
google.golang.org/grpc/internal/channelz
funcs.go#L230: return nil, errors.New("a SubChannel's parent id cannot be nil")
funcs.go#L278: return nil, errors.New("a ListenSocket's parent id cannot be 0")
funcs.go#L298: return nil, errors.New("a NormalSocket's parent id cannot be 0")
google.golang.org/grpc/internal/grpcutil
method.go#L30: return "", "", errors.New("invalid method name: should start with /")
method.go#L36: return "", "", errors.New("invalid method name: suffix /method is missing")
google.golang.org/grpc/internal/resolver/dns
dns_resolver.go#L73: errMissingAddr = errors.New("dns resolver: missing address")
dns_resolver.go#L79: errEndsWithColon = errors.New("dns resolver: missing port after port-separator colon")
google.golang.org/grpc/internal/resolver/passthrough
passthrough.go#L35: return nil, errors.New("passthrough: received empty target in Build()")
google.golang.org/grpc/internal/status
status.go#L107: return nil, errors.New("no error details for status with code OK")
google.golang.org/grpc/internal/transport
controlbuf.go#L419: return nil, errors.New("transport closed by client")
controlbuf.go#L766: return errors.New("finished processing active streams while in draining mode")
controlbuf.go#L773: return errors.New("earlyAbortStream not handled on client")
controlbuf.go#L801: return errors.New("received GOAWAY with no active streams")
handler_server.go#L56: return nil, errors.New(msg)
handler_server.go#L61: return nil, errors.New(msg)
handler_server.go#L69: return nil, errors.New(msg)
handler_server.go#L74: return nil, errors.New(msg)
handler_server.go#L254: ht.Close(errors.New("finished writing status"))
handler_server.go#L364: ht.Close(errors.New("request is done processing"))
http2_server.go#L907: t.controlBuf.put(&goAway{code: http2.ErrCodeEnhanceYourCalm, debugData: []byte("too_many_pings"), closeConn: errors.New("got too many pings from the client")})
http2_server.go#L1339: retErr = errors.New("second GOAWAY written and no active streams left to process")
transport.go#L48: var ErrNoHeaders = errors.New("stream has no headers")
transport.go#L770: errStreamDone = errors.New("the stream is done")
google.golang.org/protobuf/internal/errors
errors.go#L16: var Error = errors.New("protobuf error")
gotest.tools/v3/assert/cmp
compare.go#L379: stdlibErrorNewType = reflect.TypeOf(errors.New(""))
gotest.tools/v3/internal/source
source.go#L24: return "", errors.New("failed to find expression")
source.go#L34: return nil, errors.New("failed to get call stack")
source.go#L93: return nil, errors.New("failed to find call expression")
update.go#L36: return errors.New("failed to get call stack")
hash/crc32
crc32.go#L185: return errors.New("hash/crc32: invalid hash state identifier")
crc32.go#L188: return errors.New("hash/crc32: invalid hash state size")
crc32.go#L191: return errors.New("hash/crc32: tables do not match")
hash/fnv
fnv.go#L286: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L289: return errors.New("hash/fnv: invalid hash state size")
fnv.go#L297: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L300: return errors.New("hash/fnv: invalid hash state size")
fnv.go#L308: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L311: return errors.New("hash/fnv: invalid hash state size")
fnv.go#L319: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L322: return errors.New("hash/fnv: invalid hash state size")
fnv.go#L330: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L333: return errors.New("hash/fnv: invalid hash state size")
fnv.go#L342: return errors.New("hash/fnv: invalid hash state identifier")
fnv.go#L345: return errors.New("hash/fnv: invalid hash state size")
internal/filepathlite
path.go#L18: var errInvalidPath = errors.New("invalid path")
internal/oserror
errors.go#L13: ErrInvalid = errors.New("invalid argument")
errors.go#L14: ErrPermission = errors.New("permission denied")
errors.go#L15: ErrExist = errors.New("file already exists")
errors.go#L16: ErrNotExist = errors.New("file does not exist")
errors.go#L17: ErrClosed = errors.New("file already closed")
internal/poll
fd.go#L35: var ErrFileClosing = errors.New("use of closed file")
fd.go#L39: var ErrNoDeadline = errors.New("file type does not support deadline")
fd.go#L66: var ErrNotPollable = errors.New("not pollable")
fd_poll_runtime.go#L82: return errors.New("waiting for unsupported file type")
internal/profile
encode.go#L179: return errors.New("string_table[0] must be ''")
proto.go#L183: return 0, nil, errors.New("bad varint")
proto.go#L209: return nil, errors.New("not enough data")
proto.go#L220: return nil, errors.New("too much data")
proto.go#L226: return nil, errors.New("not enough data")
proto.go#L239: return errors.New("type mismatch")
io
io.go#L29: var ErrShortWrite = errors.New("short write")
io.go#L32: var errInvalidWrite = errors.New("invalid write result")
io.go#L35: var ErrShortBuffer = errors.New("short buffer")
io.go#L44: var EOF = errors.New("EOF")
io.go#L48: var ErrUnexpectedEOF = errors.New("unexpected EOF")
io.go#L53: var ErrNoProgress = errors.New("multiple Read calls return no data or error")
io.go#L521: var errWhence = errors.New("Seek: invalid whence")
io.go#L522: var errOffset = errors.New("Seek: invalid offset")
pipe.go#L36: var ErrClosedPipe = errors.New("io: read/write on closed pipe")
io/fs
readdir.go#L42: return nil, &PathError{Op: "readdir", Path: name, Err: errors.New("not implemented")}
sub.go#L122: return nil, errors.New("invalid result from inner fsys Glob: " + name + " not in " + f.dir) // can't use fmt in this package
walk.go#L15: var SkipDir = errors.New("skip this directory")
walk.go#L20: var SkipAll = errors.New("skip everything and stop the walk")
math/big
floatmarsh.go#L72: return errors.New("Float.GobDecode: buffer too small")
floatmarsh.go#L91: return errors.New("Float.GobDecode: buffer too small for finite form float")
floatmarsh.go#L103: return errors.New("Float.GobDecode: " + msg)
intconv.go#L251: return errors.New("Int.Scan: invalid verb")
natconv.go#L60: errNoDigits = errors.New("number has no digits")
natconv.go#L61: errInvalSep = errors.New("'_' must separate successive digits")
ratconv.go#L32: return errors.New("Rat.Scan: invalid verb")
ratconv.go#L35: return errors.New("Rat.Scan: invalid syntax")
ratmarsh.go#L30: return nil, errors.New("Rat.GobEncode: numerator too large")
ratmarsh.go#L50: return errors.New("Rat.GobDecode: buffer too small")
ratmarsh.go#L59: return errors.New("Rat.GobDecode: invalid length")
ratmarsh.go#L63: return errors.New("Rat.GobDecode: buffer too small")
math/rand/v2
chacha8.go#L80: return errors.New("invalid ChaCha8 Read buffer encoding")
pcg.go#L47: var errUnmarshalPCG = errors.New("invalid PCG encoding")
mellium.im/sasl
mechanism.go#L16: ErrInvalidState = errors.New("invalid state")
mechanism.go#L17: ErrInvalidChallenge = errors.New("invalid or missing challenge")
mechanism.go#L18: ErrAuthn = errors.New("authentication error")
mechanism.go#L19: ErrTooManySteps = errors.New("step called too many times")
scram.go#L150: err = errors.New("server sent reserved attribute `m'")
scram.go#L160: err = errors.New("iteration count is invalid")
scram.go#L163: err = errors.New("server nonce does not match client nonce")
scram.go#L166: err = errors.New("server sent empty salt")
scram.go#L175: err = errors.New("sasl: SCRAM with channel binding requires a TLS connection")
scram.go#L183: err = errors.New("sasl: SCRAM with channel binding requires valid TLS keying material")
scram.go#L193: err = errors.New("sasl: SCRAM with channel binding requires valid tls-unique data")
mime
encodedword.go#L29: errInvalidWord = errors.New("mime: invalid RFC 2047 encoded-word")
mediatype.go#L101: return errors.New("mime: no media type")
mediatype.go#L107: return errors.New("mime: expected slash after first token")
mediatype.go#L111: return errors.New("mime: expected token after slash")
mediatype.go#L114: return errors.New("mime: unexpected content after media subtype")
mediatype.go#L122: var ErrInvalidMediaParameter = errors.New("mime: invalid media parameter")
mediatype.go#L180: return "", nil, errors.New("mime: duplicate parameter name")
mime/multipart
formdata.go#L20: var ErrMessageTooLarge = errors.New("multipart: message too large")
writer.go#L48: return errors.New("mime: SetBoundary called after write")
writer.go#L52: return errors.New("mime: invalid boundary length")
writer.go#L67: return errors.New("mime: invalid boundary character")
writer.go#L190: return 0, errors.New("multipart: can't write to finished part")
net
cgo_unix.go#L339: return nil, errors.New("res_ninit failure: " + err.Error())
cgo_unix.go#L364: return nil, errors.New("res_nsearch failure")
dnsclient_unix.go#L43: errLameReferral = errors.New("lame referral")
dnsclient_unix.go#L44: errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message")
dnsclient_unix.go#L45: errCannotMarshalDNSMessage = errors.New("cannot marshal DNS message")
dnsclient_unix.go#L46: errServerMisbehaving = errors.New("server misbehaving")
dnsclient_unix.go#L47: errInvalidDNSResponse = errors.New("invalid DNS response")
dnsclient_unix.go#L48: errNoAnswerFromDNSServer = errors.New("no answer from DNS server")
interface.go#L32: errInvalidInterface = errors.New("invalid network interface")
interface.go#L33: errInvalidInterfaceIndex = errors.New("invalid network interface index")
interface.go#L34: errInvalidInterfaceName = errors.New("invalid network interface name")
interface.go#L35: errNoSuchInterface = errors.New("no such network interface")
interface.go#L36: errNoSuchMulticastInterface = errors.New("no such multicast network interface")
lookup.go#L904: return "", errors.New("no CNAME record received")
lookup.go#L908: return "", errors.New("could not parse CNAME record")
net.go#L433: errNoSuitableAddress = errors.New("no suitable address found")
net.go#L436: errMissingAddress = errors.New("missing address")
net.go#L440: ErrWriteToConnected = errors.New("use of WriteTo with pre-connected connection")
nss.go#L174: conf.err = errors.New("no colon on line")
nss.go#L198: conf.err = errors.New("unclosed criterion bracket")
nss.go#L204: conf.err = errors.New("invalid criteria: " + srcs[1:bclose])
nss.go#L230: return errors.New("criterion too short")
nss.go#L234: return errors.New("criterion lacks equal sign")
unixsock_posix.go#L42: return nil, errors.New("unknown mode: " + mode)
net/http
client.go#L207: var ErrSchemeMismatch = errors.New("http: server gave HTTP response to HTTPS client")
client.go#L216: return nil, alwaysFalse, errors.New("http: no Client.Transport or DefaultTransport")
client.go#L221: return nil, alwaysFalse, errors.New("http: nil Request.URL")
client.go#L226: return nil, alwaysFalse, errors.New("http: Request.RequestURI can't be set in client requests")
client.go#L493: var ErrUseLastResponse = errors.New("net/http: use last response")
client.go#L600: Err: errors.New("http: nil Request.URL"),
client.go#L821: return errors.New("stopped after 10 redirects")
cookie.go#L61: errBlankCookie = errors.New("http: blank cookie")
cookie.go#L62: errEqualNotFoundInCookie = errors.New("http: '=' not found in cookie")
cookie.go#L63: errInvalidCookieName = errors.New("http: invalid cookie name")
cookie.go#L64: errInvalidCookieValue = errors.New("http: invalid cookie value")
cookie.go#L296: return errors.New("http: nil Cookie")
cookie.go#L299: return errors.New("http: invalid Cookie.Name")
cookie.go#L302: return errors.New("http: invalid Cookie.Expires")
cookie.go#L318: return errors.New("http: invalid Cookie.Domain")
cookie.go#L323: return errors.New("http: partitioned cookies must be set with Secure")
fs.go#L79: return nil, errors.New("http: invalid or unsafe file path")
fs.go#L259: var errSeeker = errors.New("seeker can't seek")
fs.go#L263: var errNoOverlap = errors.New("invalid range: failed to overlap")
fs.go#L898: var errMissingSeek = errors.New("io.File missing Seek method")
fs.go#L899: var errMissingReadDir = errors.New("io.File directory missing ReadDir method")
fs.go#L1013: return nil, errors.New("invalid range")
fs.go#L1024: return nil, errors.New("invalid range")
fs.go#L1035: return nil, errors.New("invalid range")
fs.go#L1039: return nil, errors.New("invalid range")
fs.go#L1049: return nil, errors.New("invalid range")
fs.go#L1064: return nil, errors.New("invalid range")
h2_bundle.go#L1264: var http2errReadEmpty = errors.New("read from empty dataBuffer")
h2_bundle.go#L1409: var http2errFromPeer = errors.New("received from peer")
h2_bundle.go#L1472: http2errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
h2_bundle.go#L1473: http2errPseudoAfterRegular = errors.New("pseudo header field after regular")
h2_bundle.go#L2046: var http2ErrFrameTooLarge = errors.New("http2: frame too large")
h2_bundle.go#L2107: fr.errDetail = errors.New(reason)
h2_bundle.go#L2206: http2errStreamID = errors.New("invalid stream ID")
h2_bundle.go#L2207: http2errDepStreamID = errors.New("invalid dependent stream ID")
h2_bundle.go#L2208: http2errPadLength = errors.New("pad length too large")
h2_bundle.go#L2209: http2errPadBytes = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
h2_bundle.go#L2559: return errors.New("illegal window increment value")
h2_bundle.go#L3100: return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
h2_bundle.go#L3355: err = errors.New("invalid base " + strconv.Itoa(base))
h2_bundle.go#L3998: http2errClosedPipeWrite = errors.New("write on closed buffer")
h2_bundle.go#L3999: http2errUninitializedPipeWrite = errors.New("write on uninitialized buffer")
h2_bundle.go#L4116: http2errClientDisconnected = errors.New("client disconnected")
h2_bundle.go#L4117: http2errClosedBody = errors.New("body closed by handler")
h2_bundle.go#L4118: http2errHandlerComplete = errors.New("http2: request body closed due to handler exiting")
h2_bundle.go#L4119: http2errStreamClosed = errors.New("http2: stream closed")
h2_bundle.go#L5174: var http2errPrefaceTimeout = errors.New("timeout waiting for client preface")
h2_bundle.go#L5404: var http2errHandlerPanicked = errors.New("http2: handler panicked")
h2_bundle.go#L7141: return 0, errors.New("http2: handler wrote more than declared Content-Length")
h2_bundle.go#L7161: http2ErrRecursivePush = errors.New("http2: recursive push not allowed")
h2_bundle.go#L7162: http2ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
h2_bundle.go#L7210: return errors.New("URL must have a host")
h2_bundle.go#L7395: return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
h2_bundle.go#L8048: return nil, errors.New("http2: unencrypted HTTP/2 not enabled")
h2_bundle.go#L8051: return nil, errors.New("http2: unsupported scheme")
h2_bundle.go#L8120: http2errClientConnClosed = errors.New("http2: client conn is closed")
h2_bundle.go#L8121: http2errClientConnUnusable = errors.New("http2: client conn not usable")
h2_bundle.go#L8122: http2errClientConnNotEstablished = errors.New("http2: client conn could not be established")
h2_bundle.go#L8123: http2errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
h2_bundle.go#L8221: return nil, errors.New("http2: could not negotiate protocol mutually")
h2_bundle.go#L8679: err := errors.New("http2: client connection force closed via ClientConn.Close")
h2_bundle.go#L8686: err := errors.New("http2: client connection lost")
h2_bundle.go#L8695: var http2errRequestCanceled = errors.New("net/http: request canceled")
h2_bundle.go#L8905: var http2errExtendedConnectNotSupported = errors.New("net/http: extended connect not supported by peer")
h2_bundle.go#L9265: http2errStopReqBodyWrite = errors.New("http2: aborting request body write")
h2_bundle.go#L9268: http2errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
h2_bundle.go#L9270: http2errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
h2_bundle.go#L9509: var http2errNilRequestURL = errors.New("http2: Request.URI is nil")
h2_bundle.go#L9527: return nil, errors.New("http2: invalid Host header")
h2_bundle.go#L9536: return nil, errors.New("http2: invalid :protocol header in non-CONNECT request")
h2_bundle.go#L10007: Cause: errors.New("protocol error: headers after END_STREAM"),
h2_bundle.go#L10066: return nil, errors.New("malformed response from server: missing status pseudo header")
h2_bundle.go#L10070: return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
h2_bundle.go#L10112: return nil, errors.New("1xx informational response with END_STREAM flag")
h2_bundle.go#L10140: return nil, errors.New("header list too large")
h2_bundle.go#L10243: err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
h2_bundle.go#L10283: var http2errClosedResponseBody = errors.New("http2: response body closed")
h2_bundle.go#L10761: http2errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
h2_bundle.go#L10762: http2errRequestHeaderListSize = errors.New("http2: request header list larger than peer's advertised limit")
h2_bundle.go#L10996: return nil, errors.New("http2: TLS conn unexpectedly found in unencrypted handoff")
pattern.go#L86: return nil, errors.New("empty pattern")
pattern.go#L113: return nil, errors.New("host/path missing /")
pattern.go#L119: return nil, errors.New("host contains '{' (missing initial '/'?)")
pattern.go#L127: return nil, errors.New("non-CONNECT pattern with unclean path can never match")
pattern.go#L153: return nil, errors.New("bad wildcard segment (must start with '{')")
pattern.go#L156: return nil, errors.New("bad wildcard segment (must end with '}')")
pattern.go#L161: return nil, errors.New("{$} not at end")
pattern.go#L168: return nil, errors.New("{...} wildcard not at end")
pattern.go#L171: return nil, errors.New("empty wildcard")
request.go#L41: var ErrMissingFile = errors.New("http: no such file")
request.go#L442: var ErrNoCookie = errors.New("http: named cookie not present")
request.go#L499: return nil, errors.New("http: MultipartReader called twice")
request.go#L502: return nil, errors.New("http: multipart handled by ParseMultipartForm")
request.go#L514: return nil, errors.New("missing form body")
request.go#L577: var errMissingHost = errors.New("http: Request.Write on Request with no Host or URL set")
request.go#L637: return errors.New("http: invalid Host header")
request.go#L657: return errors.New("net/http: can't write control character in Request.URL")
request.go#L900: return nil, errors.New("net/http: nil Context")
request.go#L1265: err = errors.New("missing form body")
request.go#L1291: err = errors.New("http: POST too large")
request.go#L1372: return errors.New("http: multipart handled by MultipartReader")
request.go#L1448: return nil, nil, errors.New("http: multipart handled by MultipartReader")
response.go#L131: var ErrNoLocation = errors.New("http: no Location header in response")
server.go#L43: ErrBodyNotAllowed = errors.New("http: request method or response status code does not allow body")
server.go#L50: ErrHijacked = errors.New("http: connection has been hijacked")
server.go#L56: ErrContentLength = errors.New("http: wrote more than the declared Content-Length")
server.go#L61: ErrWriteAfterFlush = errors.New("unused")
server.go#L1016: var errTooLarge = errors.New("http: request too large")
server.go#L1917: var ErrAbortHandler = errors.New("net/http: abort Handler")
server.go#L2878: return errors.New("http: invalid pattern")
server.go#L2881: return errors.New("http: nil handler")
server.go#L2884: return errors.New("http: nil handler")
server.go#L3382: var ErrServerClosed = errors.New("http: Server closed")
server.go#L3787: var ErrHandlerTimeout = errors.New("http: Handler timeout")
socks_bundle.go#L63: return nil, errors.New("too many authentication methods")
socks_bundle.go#L78: return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
socks_bundle.go#L82: return nil, errors.New("no acceptable authentication methods")
socks_bundle.go#L100: return nil, errors.New("unknown address type")
socks_bundle.go#L104: return nil, errors.New("FQDN too long")
socks_bundle.go#L119: return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
socks_bundle.go#L122: return nil, errors.New("unknown error " + cmdErr.String())
socks_bundle.go#L125: return nil, errors.New("non-zero reserved field")
socks_bundle.go#L142: return nil, errors.New("unknown address type " + strconv.Itoa(int(b[3])))
socks_bundle.go#L171: return "", 0, errors.New("port number out of range " + port)
socks_bundle.go#L314: return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
socks_bundle.go#L350: return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
socks_bundle.go#L393: return errors.New("network not implemented")
socks_bundle.go#L398: return errors.New("command not implemented")
socks_bundle.go#L449: return errors.New("invalid username/password")
socks_bundle.go#L465: return errors.New("invalid username/password version")
socks_bundle.go#L468: return errors.New("username/password authentication failed")
socks_bundle.go#L472: return errors.New("unsupported authentication method " + strconv.Itoa(int(auth)))
transfer.go#L829: var ErrBodyReadAfterClose = errors.New("http: invalid Read on closed Body")
transfer.go#L909: var errTrailerEOF = errors.New("http: unexpected EOF reading trailer")
transfer.go#L934: return errors.New("http: suspiciously long trailer after chunked body")
transport.go#L589: return nil, errors.New("http: nil Request.URL")
transport.go#L593: return nil, errors.New("http: nil Request.Header")
transport.go#L634: return nil, errors.New("http: no Host in request URL")
transport.go#L751: var errCannotRewind = errors.New("net/http: cannot rewind body after connection loss")
transport.go#L856: var ErrSkipAltProtocol = errors.New("net/http: skip alternate protocol")
transport.go#L1000: errKeepAlivesDisabled = errors.New("http: putIdleConn: keep alives disabled")
transport.go#L1001: errConnBroken = errors.New("http: putIdleConn: connection is in bad state")
transport.go#L1002: errCloseIdle = errors.New("http: putIdleConn: CloseIdleConnections was called")
transport.go#L1003: errTooManyIdle = errors.New("http: putIdleConn: too many idle connections")
transport.go#L1004: errTooManyIdleHost = errors.New("http: putIdleConn: too many idle connections for host")
transport.go#L1005: errCloseIdleConns = errors.New("http: CloseIdleConnections called")
transport.go#L1006: errReadLoopExiting = errors.New("http: persistConn.readLoop exiting")
transport.go#L1007: errIdleConnTimeout = errors.New("http: idle connection timeout")
transport.go#L1013: errServerClosedIdle = errors.New("http: server closed idle connection")
transport.go#L1280: err = errors.New("net/http: Transport.DialContext hook returned (nil, nil)")
transport.go#L1287: err = errors.New("net/http: Transport.Dial hook returned (nil, nil)")
transport.go#L1475: err = errors.New("net/http: Transport.DialTLS or DialTLSContext returned (nil, nil)")
transport.go#L1900: return nil, errors.New("unknown status code")
transport.go#L1902: return nil, errors.New(text)
transport.go#L1920: return nil, errors.New("http: Transport does not support unencrypted HTTP/2")
transport.go#L2237: var errCallerOwnsConn = errors.New("read loop ending; caller owns writable underlying conn")
transport.go#L2720: var errRequestCanceledConn = errors.New("net/http: request canceled while waiting for connection") // TODO: unify?
transport.go#L2724: var errRequestDone = errors.New("net/http: request completed")
transport.go#L2971: var errReadOnClosedResBody = errors.New("http: read on closed response body")
net/http/httputil
dump.go#L290: var errNoBody = errors.New("sentinel error value")
persist.go#L30: var errClosed = errors.New("i/o operation on closed connection")
persist.go#L203: return errors.New("persist server pipe count")
reverseproxy.go#L382: p.getErrorHandler()(rw, req, errors.New("ReverseProxy must have exactly one of Director or Rewrite set"))
net/http/internal
chunked.go#L21: var ErrLineTooLong = errors.New("header line too long")
chunked.go#L81: cr.err = errors.New("chunked encoding contains too much non-data")
chunked.go#L108: cr.err = errors.New("malformed chunked encoding")
chunked.go#L174: return nil, errors.New("chunked line ends with bare LF")
chunked.go#L176: return nil, errors.New("invalid CR in chunked line")
chunked.go#L280: return 0, errors.New("empty hex number for chunk length")
chunked.go#L291: return 0, errors.New("invalid byte in chunk length")
chunked.go#L294: return 0, errors.New("http chunk length too large")
net/netip
netip.go#L679: return Prefix{}, errors.New("negative Prefix bits")
netip.go#L687: return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv4")
netip.go#L692: return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv6")
netip.go#L1065: return errors.New("unexpected slice size")
netip.go#L1092: return "", "", false, errors.New("not an ip:port")
netip.go#L1097: return "", "", false, errors.New("no IP")
netip.go#L1100: return "", "", false, errors.New("no port")
netip.go#L1104: return "", "", false, errors.New("missing ]")
netip.go#L1125: return ipp, errors.New("invalid port " + strconv.Quote(port) + " parsing " + strconv.Quote(s))
netip.go#L1133: return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", square brackets can only be used with IPv6 addresses")
netip.go#L1135: return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", IPv6 addresses must be surrounded by square brackets")
netip.go#L1273: return errors.New("unexpected slice size")
netip.go#L1578: return errors.New("unexpected slice size")
net/textproto
reader.go#L22: var errMessageTooLarge = errors.New("message too large")
net/url
url.go#L457: return "", "", errors.New("missing protocol scheme")
url.go#L513: return nil, errors.New("net/url: invalid control character in URL")
url.go#L517: return nil, errors.New("empty url")
url.go#L547: return nil, errors.New("invalid URI for request")
url.go#L558: return nil, errors.New("first path segment in URL cannot contain colon")
url.go#L603: return nil, "", errors.New("net/url: invalid userinfo")
url.go#L631: return "", errors.New("missing ']' in host")
os
exec.go#L18: var ErrProcessDone = errors.New("os: process already finished")
exec_unix.go#L84: return errors.New("os: unsupported signal type")
exec_unix.go#L102: return errors.New("os: process already released")
exec_unix.go#L105: return errors.New("os: process not initialized")
exec_unix.go#L115: return errors.New("os: process already released")
executable_procfs.go#L19: return "", errors.New("Executable not implemented for " + runtime.GOOS)
file.go#L138: return 0, &PathError{Op: "readat", Path: f.name, Err: errors.New("negative offset")}
file.go#L212: var errWriteAtInAppendMode = errors.New("os: invalid use of WriteAt on file opened with O_APPEND")
file.go#L228: return 0, &PathError{Op: "writeat", Path: f.name, Err: errors.New("negative offset")}
file.go#L401: var errPathEscapes = errors.New("path escapes from parent")
file.go#L494: return "", errors.New("%LocalAppData% is not defined")
file.go#L500: return "", errors.New("$HOME is not defined")
file.go#L507: return "", errors.New("$home is not defined")
file.go#L516: return "", errors.New("neither $XDG_CACHE_HOME nor $HOME are defined")
file.go#L520: return "", errors.New("path in $XDG_CACHE_HOME is relative")
file.go#L547: return "", errors.New("%AppData% is not defined")
file.go#L553: return "", errors.New("$HOME is not defined")
file.go#L560: return "", errors.New("$home is not defined")
file.go#L569: return "", errors.New("neither $XDG_CONFIG_HOME nor $HOME are defined")
file.go#L573: return "", errors.New("path in $XDG_CONFIG_HOME is relative")
file.go#L606: return "", errors.New(enverr + " is not defined")
file.go#L783: return "", errors.New("os: DirFS with empty root")
pidfd_linux.go#L127: return errors.New("os: process already released")
root.go#L112: return nil, &PathError{Op: "openat", Path: name, Err: errors.New("unsupported file mode")}
root.go#L138: return &PathError{Op: "mkdirat", Path: name, Err: errors.New("unsupported file mode")}
root.go#L192: return nil, "", errors.New("empty path")
root_unix.go#L42: return nil, &PathError{Op: "open", Path: name, Err: errors.New("not a directory")}
tempfile.go#L60: var errPatternHasSeparator = errors.New("pattern contains path separator")
os/exec
exec.go#L127: var ErrWaitDelay = errors.New("exec: WaitDelay expired before I/O complete")
exec.go#L639: return errors.New("exec: already started")
exec.go#L654: c.Err = errors.New("exec: no command")
exec.go#L692: return errors.New("exec: command with a non-nil Cancel was not created with CommandContext")
exec.go#L916: return errors.New("exec: not started")
exec.go#L919: return errors.New("exec: Wait was already called")
exec.go#L1008: return nil, errors.New("exec: Stdout already set")
exec.go#L1031: return nil, errors.New("exec: Stdout already set")
exec.go#L1034: return nil, errors.New("exec: Stderr already set")
exec.go#L1051: return nil, errors.New("exec: Stdin already set")
exec.go#L1054: return nil, errors.New("exec: StdinPipe after process started")
exec.go#L1076: return nil, errors.New("exec: Stdout already set")
exec.go#L1079: return nil, errors.New("exec: StdoutPipe after process started")
exec.go#L1101: return nil, errors.New("exec: Stderr already set")
exec.go#L1104: return nil, errors.New("exec: StderrPipe after process started")
exec.go#L1262: err = errors.New("exec: environment variable contains NUL")
exec.go#L1330: var ErrDot = errors.New("cannot run executable found relative to current directory")
lp_unix.go#L20: var ErrNotFound = errors.New("executable file not found in $PATH")
path
match.go#L14: var ErrBadPattern = errors.New("syntax error in pattern")
path/filepath
match.go#L18: var ErrBadPattern = errors.New("syntax error in pattern")
path.go#L205: return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
path.go#L231: return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
symlink.go#L101: return "", errors.New("EvalSymlinks: too many links")
reflect
value.go#L1335: return Value{}, errors.New("reflect: indirection through nil pointer to embedded struct field " + nameFor(v.typ().Elem()))
runtime/pprof
elf.go#L15: errBadELF = errors.New("malformed ELF binary")
elf.go#L16: errNoBuildID = errors.New("no NT_GNU_BUILD_ID found in ELF binary")
proto_other.go#L29: return 0, 0, "", "", errors.New("not implemented")
strconv
atoi.go#L21: var ErrRange = errors.New("value out of range")
atoi.go#L24: var ErrSyntax = errors.New("invalid syntax")
atoi.go#L56: return &NumError{fn, stringslite.Clone(str), errors.New("invalid base " + Itoa(base))}
atoi.go#L60: return &NumError{fn, stringslite.Clone(str), errors.New("invalid bit size " + Itoa(bitSize))}
strings
reader.go#L53: return 0, errors.New("strings.Reader.ReadAt: negative offset")
reader.go#L79: return errors.New("strings.Reader.UnreadByte: at beginning of string")
reader.go#L105: return errors.New("strings.Reader.UnreadRune: at beginning of string")
reader.go#L108: return errors.New("strings.Reader.UnreadRune: previous operation was not ReadRune")
reader.go#L127: return 0, errors.New("strings.Reader.Seek: invalid whence")
reader.go#L130: return 0, errors.New("strings.Reader.Seek: negative position")
syscall
exec_linux.go#L796: return errpkg.New("clone(CLONE_PIDFD) failed to return pidfd")
exec_unix.go#L193: return 0, errorspkg.New("both Setctty and Foreground set in SysProcAttr")
exec_unix.go#L196: return 0, errorspkg.New("Setctty set but Ctty not valid in child")
testing
fuzz.go#L391: return errors.New(buf.String())
testing.go#L1640: var errNilPanicOrGoexit = errors.New("test executed panic(nil) or runtime.Goexit")
testing.go#L1943: var errMain = errors.New("testing: unexpected use of func Main")
testing/iotest
reader.go#L74: var ErrTimeout = errors.New("timeout")
text/template
exec.go#L255: walkBreak = errors.New("break")
exec.go#L256: walkContinue = errors.New("continue")
funcs.go#L411: errBadComparisonType = errors.New("invalid type for comparison")
funcs.go#L412: errBadComparison = errors.New("incompatible types for comparison")
funcs.go#L413: errNoComparison = errors.New("missing argument for comparison")
time
format.go#L468: var errAtoi = errors.New("time: invalid number")
format.go#L838: var errBad = errors.New("bad value for field") // placeholder not passed to user
format.go#L1551: var errLeadingInt = errors.New("time: bad [0-9]*") // never printed
format.go#L1640: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1652: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1658: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1672: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1684: return 0, errors.New("time: missing unit in duration " + quote(orig))
format.go#L1690: return 0, errors.New("time: unknown unit " + quote(u) + " in duration " + quote(orig))
format.go#L1694: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1703: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1708: return 0, errors.New("time: invalid duration " + quote(orig))
format.go#L1715: return 0, errors.New("time: invalid duration " + quote(orig))
format_rfc3339.go#L72: return b, errors.New("year outside of range [0,9999]")
format_rfc3339.go#L76: return b, errors.New("timezone hour outside of range [0,23]")
sys_unix.go#L55: return errors.New("short read")
time.go#L1479: return b, errors.New("Time.MarshalBinary: unexpected zone offset")
time.go#L1522: return errors.New("Time.UnmarshalBinary: no data")
time.go#L1527: return errors.New("Time.UnmarshalBinary: unsupported version")
time.go#L1535: return errors.New("Time.UnmarshalBinary: invalid length")
time.go#L1590: return nil, errors.New("Time.MarshalJSON: " + err.Error())
time.go#L1603: return errors.New("Time.UnmarshalJSON: input is not a JSON string")
time.go#L1614: return nil, errors.New(errPrefix + err.Error())
zoneinfo.go#L643: var errLocation = errors.New("time: invalid location name")
zoneinfo_read.go#L112: var errBadData = errors.New("malformed time zone information")
zoneinfo_read.go#L421: return nil, errors.New("corrupt zip file " + zipfile)
zoneinfo_read.go#L429: return nil, errors.New("corrupt zip file " + zipfile)
zoneinfo_read.go#L471: return nil, errors.New("unsupported compression for " + name + " in " + zipfile)
zoneinfo_read.go#L496: return nil, errors.New("corrupt zip file " + zipfile)
zoneinfo_read.go#L502: return nil, errors.New("corrupt zip file " + zipfile)
zoneinfo_read.go#L568: return nil, errors.New("unknown time zone " + name)
vendor/golang.org/x/crypto/chacha20
chacha_generic.go#L82: return nil, errors.New("chacha20: wrong key size")
chacha_generic.go#L93: return nil, errors.New("chacha20: wrong nonce size")
chacha_generic.go#L354: return nil, errors.New("chacha20: wrong HChaCha20 key size")
chacha_generic.go#L357: return nil, errors.New("chacha20: wrong HChaCha20 nonce size")
vendor/golang.org/x/crypto/chacha20poly1305
chacha20poly1305.go#L42: return nil, errors.New("chacha20poly1305: bad key length")
chacha20poly1305.go#L69: var errOpen = errors.New("chacha20poly1305: message authentication failed")
xchacha20poly1305.go#L26: return nil, errors.New("chacha20poly1305: bad key length")
vendor/golang.org/x/crypto/cryptobyte
builder.go#L244: b.err = errors.New("pending ASN.1 child too long")
builder.go#L302: b.err = errors.New("cryptobyte: length overflow")
builder.go#L305: b.err = errors.New("cryptobyte: Builder is exceeding its fixed-size buffer")
vendor/golang.org/x/net/dns/dnsmessage
message.go#L252: ErrNotStarted = errors.New("parsing/packing of this type isn't available yet")
message.go#L256: ErrSectionDone = errors.New("parsing/packing of this section has completed")
message.go#L258: errBaseLen = errors.New("insufficient data for base length type")
message.go#L259: errCalcLen = errors.New("insufficient data for calculated length type")
message.go#L260: errReserved = errors.New("segment prefix is reserved")
message.go#L261: errTooManyPtr = errors.New("too many pointers (>10)")
message.go#L262: errInvalidPtr = errors.New("invalid pointer")
message.go#L263: errInvalidName = errors.New("invalid dns name")
message.go#L264: errNilResouceBody = errors.New("nil resource body")
message.go#L265: errResourceLen = errors.New("insufficient data for resource body length")
message.go#L266: errSegTooLong = errors.New("segment length too long")
message.go#L267: errNameTooLong = errors.New("name too long")
message.go#L268: errZeroSegLen = errors.New("zero length segment")
message.go#L269: errResTooLong = errors.New("resource length too long")
message.go#L270: errTooManyQuestions = errors.New("too many Questions to pack (>65535)")
message.go#L271: errTooManyAnswers = errors.New("too many Answers to pack (>65535)")
message.go#L272: errTooManyAuthorities = errors.New("too many Authorities to pack (>65535)")
message.go#L273: errTooManyAdditionals = errors.New("too many Additionals to pack (>65535)")
message.go#L274: errNonCanonicalName = errors.New("name is not in canonical format (it must end with a .)")
message.go#L275: errStringTooLong = errors.New("character string exceeds maximum length (255)")
vendor/golang.org/x/net/http/httpproxy
proxy.go#L134: return nil, errors.New("refusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxy")
vendor/golang.org/x/net/http2/hpack
hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
hpack.go#L238: return DecodingError{errors.New("truncated headers")}
hpack.go#L287: var errNeedMore = errors.New("need more data")
hpack.go#L334: return DecodingError{errors.New("invalid encoding")}
hpack.go#L416: return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
hpack.go#L425: return DecodingError{errors.New("dynamic table size update too large")}
hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")
vendor/golang.org/x/text/secure/bidirule
bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")
vendor/golang.org/x/text/transform
transform.go#L21: ErrShortDst = errors.New("transform: short destination buffer")
transform.go#L25: ErrShortSrc = errors.New("transform: short source buffer")
transform.go#L29: ErrEndOfSpan = errors.New("transform: input and output are not identical")
transform.go#L33: errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
transform.go#L37: errShortInternal = errors.New("transform: short internal buffer")