func errors.New

1455 uses

	errors (current package)
		errors.go#L64: func New(text string) error {
		errors.go#L90: var ErrUnsupported = New("unsupported operation")

	bufio
		bufio.go#L23: 	ErrInvalidUnreadByte = errors.New("bufio: invalid use of UnreadByte")
		bufio.go#L24: 	ErrInvalidUnreadRune = errors.New("bufio: invalid use of UnreadRune")
		bufio.go#L25: 	ErrBufferFull        = errors.New("bufio: buffer full")
		bufio.go#L26: 	ErrNegativeCount     = errors.New("bufio: negative count")
		bufio.go#L96: var errNegativeRead = errors.New("bufio: reader returned negative count from Read")
		bufio.go#L560: var errNegativeWrite = errors.New("bufio: writer returned negative count from Write")
		scan.go#L71: 	ErrTooLong         = errors.New("bufio.Scanner: token too long")
		scan.go#L72: 	ErrNegativeAdvance = errors.New("bufio.Scanner: SplitFunc returns negative advance count")
		scan.go#L73: 	ErrAdvanceTooFar   = errors.New("bufio.Scanner: SplitFunc returns advance count beyond input")
		scan.go#L74: 	ErrBadReadCount    = errors.New("bufio.Scanner: Read returned impossible count")
		scan.go#L128: var ErrFinalToken = errors.New("final token")

	bytes
		buffer.go#L44: var ErrTooLarge = errors.New("bytes.Buffer: too large")
		buffer.go#L45: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
		buffer.go#L398: 		return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
		buffer.go#L407: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")
		reader.go#L53: 		return 0, errors.New("bytes.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("bytes.Reader.UnreadByte: at beginning of slice")
		reader.go#L105: 		return errors.New("bytes.Reader.UnreadRune: at beginning of slice")
		reader.go#L108: 		return errors.New("bytes.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("bytes.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("bytes.Reader.Seek: negative position")

	compress/flate
		deflate.go#L695: var errWriterClosed = errors.New("flate: closed writer")

	compress/gzip
		gunzip.go#L32: 	ErrChecksum = errors.New("gzip: invalid checksum")
		gunzip.go#L34: 	ErrHeader = errors.New("gzip: invalid header")
		gzip.go#L95: 		return errors.New("gzip.Write: Extra data is too large")
		gzip.go#L113: 			return errors.New("gzip.Write: non-Latin-1 header string")

	context
		context.go#L167: var Canceled = errors.New("context canceled")

	crypto/cipher
		gcm.go#L32: 		return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
		gcm.go#L46: 		return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
		gcm.go#L61: 		return nil, errors.New("crypto/cipher: use of GCM with arbitrary IVs is not allowed in FIPS 140-only mode, use NewGCMWithRandomNonce")
		gcm.go#L70: 			return nil, errors.New("crypto/cipher: use of GCM with non-AES ciphers is not allowed in FIPS 140-only mode")
		gcm.go#L96: 		return nil, errors.New("cipher: NewGCMWithRandomNonce requires aes.Block")
		gcm.go#L209: 		return nil, errors.New("cipher: incorrect tag size given to GCM")
		gcm.go#L212: 		return nil, errors.New("cipher: the nonce can't have zero length")
		gcm.go#L218: 		return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
		gcm.go#L273: var errOpen = errors.New("cipher: message authentication failed")

	crypto/des
		cipher.go#L33: 		return nil, errors.New("crypto/des: use of DES is not allowed in FIPS 140-only mode")
		cipher.go#L81: 		return nil, errors.New("crypto/des: use of TripleDES is not allowed in FIPS 140-only mode")

	crypto/dsa
		dsa.go#L47: var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
		dsa.go#L68: 		return errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")
		dsa.go#L91: 		return errors.New("crypto/dsa: invalid ParameterSizes")
		dsa.go#L166: 		return errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")
		dsa.go#L170: 		return errors.New("crypto/dsa: parameters not set up before generating key")
		dsa.go#L216: 		return nil, nil, errors.New("crypto/dsa: use of DSA is not allowed in FIPS 140-only mode")

	crypto/ecdh
		ecdh.go#L121: 		return nil, errors.New("crypto/ecdh: private key and public key curves do not match")
		nist.go#L48: 		return nil, errors.New("crypto/ecdh: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		nist.go#L85: 			return nil, errors.New("crypto/ecdh: invalid private key")
		nist.go#L89: 			return nil, errors.New("crypto/ecdh: invalid private key")
		nist.go#L121: 		return nil, errors.New("crypto/ecdh: invalid public key")
		nist.go#L130: 			return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L39: 		return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
		x25519.go#L51: 		return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
		x25519.go#L54: 		return nil, errors.New("crypto/ecdh: invalid private key size")
		x25519.go#L71: 		return nil, errors.New("crypto/ecdh: use of X25519 is not allowed in FIPS 140-only mode")
		x25519.go#L74: 		return nil, errors.New("crypto/ecdh: invalid public key")
		x25519.go#L86: 		return nil, errors.New("crypto/ecdh: bad X25519 remote ECDH input: low order point")

	crypto/ecdsa
		ecdsa.go#L54: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L57: 		return nil, errors.New("ecdsa: invalid public key")
		ecdsa.go#L92: 		return nil, errors.New("ecdsa: unsupported curve by crypto/ecdh")
		ecdsa.go#L96: 		return nil, errors.New("ecdsa: invalid private key")
		ecdsa.go#L190: 		return nil, errors.New("crypto/ecdsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		ecdsa.go#L201: var errNoAsm = errors.New("no assembly implementation available")
		ecdsa.go#L239: 		return nil, errors.New("crypto/ecdsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		ecdsa.go#L260: 		return nil, errors.New("ecdsa: Sign called with nil opts")
		ecdsa.go#L264: 		return nil, errors.New("ecdsa: hash length does not match hash function")
		ecdsa.go#L276: 		return nil, errors.New("ecdsa: curve not supported by deterministic signatures")
		ecdsa.go#L287: 		return nil, errors.New("crypto/ecdsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		ecdsa.go#L312: 		b.SetError(errors.New("invalid integer"))
		ecdsa.go#L375: 		return nil, nil, errors.New("invalid ASN.1")
		ecdsa.go#L417: 		return nil, errors.New("negative coordinate")
		ecdsa.go#L420: 		return nil, errors.New("overflowing coordinate")
		ecdsa.go#L435: 		return nil, nil, errors.New("ecdsa: public key point is the infinity")
		ecdsa_legacy.go#L24: 		return nil, errors.New("crypto/ecdsa: use of custom curves is not allowed in FIPS 140-only mode")
		ecdsa_legacy.go#L57: var errZeroParam = errors.New("zero parameter")
		ecdsa_legacy.go#L78: 		return nil, nil, errors.New("invalid ASN.1 from SignASN1")
		ecdsa_legacy.go#L85: 		return nil, errors.New("crypto/ecdsa: use of custom curves is not allowed in FIPS 140-only mode")

	crypto/ed25519
		ed25519.go#L108: 			return nil, errors.New("crypto/ed25519: use of Ed25519ctx is not allowed in FIPS 140-only mode")
		ed25519.go#L114: 		return nil, errors.New("ed25519: expected opts.HashFunc() zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")
		ed25519.go#L227: 			return errors.New("crypto/ed25519: use of Ed25519ctx is not allowed in FIPS 140-only mode")
		ed25519.go#L233: 		return errors.New("ed25519: expected opts.Hash zero (unhashed message, for standard Ed25519) or SHA-512 (for Ed25519ph)")

	crypto/elliptic
		nistec.go#L147: 		return p, errors.New("negative coordinate")
		nistec.go#L150: 		return p, errors.New("overflowing coordinate")

	crypto/internal/fips140
		cast.go#L47: 		err = errors.New("simulated CAST failure")
		cast.go#L79: 		err = errors.New("simulated PCT failure")
		fips140.go#L41: 		return errors.New("FIPS 140-3 mode is incompatible with ASAN")
		fips140.go#L51: 		return errors.New("FIPS 140-3 mode is not supported on " + runtime.GOOS + "-" + runtime.GOARCH)
		fips140.go#L55: 		return errors.New("FIPS 140-3 mode is incompatible with GOEXPERIMENT=boringcrypto")

	crypto/internal/fips140/aes
		cast.go#L39: 			return errors.New("unexpected result")
		cast.go#L43: 			return errors.New("unexpected result")

	crypto/internal/fips140/aes/gcm
		cast.go#L39: 			return errors.New("unexpected result")
		gcm.go#L33: 		return nil, errors.New("cipher: incorrect tag size given to GCM")
		gcm.go#L36: 		return nil, errors.New("cipher: the nonce can't have zero length")
		gcm.go#L39: 		return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
		gcm.go#L91: var errOpen = errors.New("cipher: message authentication failed")

	crypto/internal/fips140/bigmod
		nat.go#L179: 		return nil, errors.New("input overflows the modulus")
		nat.go#L198: 		return nil, errors.New("input overflows the modulus size")
		nat.go#L225: 		return errors.New("input overflows the modulus size")
		nat.go#L572: 		return nil, errors.New("modulus must be > 1")
		nat.go#L1121: 		return nil, nil, errors.New("extendedGCD: a or m is zero")
		nat.go#L1124: 		return nil, nil, errors.New("extendedGCD: both a and m are even")

	crypto/internal/fips140/drbg
		cast.go#L54: 			return errors.New("unexpected result")

	crypto/internal/fips140/ecdh
		cast.go#L48: 			return errors.New("unexpected result")
		ecdh.go#L173: 		return nil, errors.New("crypto/ecdh: invalid private key")
		ecdh.go#L206: 			return errors.New("crypto/ecdh: public key does not match private key")
		ecdh.go#L220: 		return nil, errors.New("crypto/ecdh: invalid public key")
		ecdh.go#L242: 		return nil, errors.New("crypto/ecdh: mismatched curves")
		ecdh.go#L245: 		return nil, errors.New("crypto/ecdh: mismatched curves")
		ecdh.go#L253: 		return nil, errors.New("crypto/ecdh: public key is the identity element")

	crypto/internal/fips140/ecdsa
		cast.go#L100: 			return errors.New("unexpected result")
		cast.go#L132: 			return errors.New("unexpected result")
		ecdsa.go#L276: 		return nil, errors.New("ecdsa: private key does not match curve")
		ecdsa.go#L309: 		return nil, errors.New("ecdsa: private key does not match curve")
		ecdsa.go#L353: 		return nil, errors.New("ecdsa: internal error: r is zero")
		ecdsa.go#L369: 		return nil, errors.New("ecdsa: internal error: s is zero")
		ecdsa.go#L441: 		return errors.New("ecdsa: public key does not match curve")
		ecdsa.go#L461: 		return errors.New("ecdsa: invalid signature: r is zero")
		ecdsa.go#L468: 		return errors.New("ecdsa: invalid signature: s is zero")
		ecdsa.go#L500: 		return errors.New("ecdsa: signature did not verify")

	crypto/internal/fips140/ed25519
		cast.go#L72: 			return errors.New("unexpected result")
		ed25519.go#L87: 		return nil, errors.New("ed25519: bad seed length: " + strconv.Itoa(l))
		ed25519.go#L121: 		return nil, errors.New("ed25519: bad private key length: " + strconv.Itoa(l))
		ed25519.go#L156: 		return nil, errors.New("ed25519: bad public key length: " + strconv.Itoa(l))
		ed25519.go#L160: 		return nil, errors.New("ed25519: bad public key")
		ed25519.go#L203: 		return nil, errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L206: 		return nil, errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L224: 		return nil, errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L285: 		return errors.New("ed25519: bad Ed25519ph message hash length: " + strconv.Itoa(l))
		ed25519.go#L288: 		return errors.New("ed25519: bad Ed25519ph context length: " + strconv.Itoa(l))
		ed25519.go#L298: 		return errors.New("ed25519: bad Ed25519ctx context length: " + strconv.Itoa(l))
		ed25519.go#L305: 		return errors.New("ed25519: bad signature length: " + strconv.Itoa(l))
		ed25519.go#L309: 		return errors.New("ed25519: invalid signature")
		ed25519.go#L330: 		return errors.New("ed25519: invalid signature")
		ed25519.go#L338: 		return errors.New("ed25519: invalid signature")

	crypto/internal/fips140/edwards25519
		edwards25519.go#L156: 		return nil, errors.New("edwards25519: invalid point encoding length")
		edwards25519.go#L174: 		return nil, errors.New("edwards25519: invalid point encoding")
		scalar.go#L111: 		return nil, errors.New("edwards25519: invalid SetUniformBytes input length")
		scalar.go#L160: 		return nil, errors.New("invalid scalar length")
		scalar.go#L163: 		return nil, errors.New("invalid scalar encoding")
		scalar.go#L210: 		return nil, errors.New("edwards25519: invalid SetBytesWithClamping input length")

	crypto/internal/fips140/edwards25519/field
		fe.go#L201: 		return nil, errors.New("edwards25519: invalid field element input size")

	crypto/internal/fips140/hkdf
		cast.go#L29: 			return errors.New("unexpected result")

	crypto/internal/fips140/hmac
		cast.go#L30: 			return errors.New("unexpected result")

	crypto/internal/fips140/mlkem
		cast.go#L49: 			return errors.New("unexpected result")
		field.go#L19: 		return 0, errors.New("unreduced field element")
		field.go#L166: 		return T{}, errors.New("mlkem: invalid encoding length")
		field.go#L174: 			return T{}, errors.New("mlkem: invalid polynomial encoding")
		field.go#L177: 			return T{}, errors.New("mlkem: invalid polynomial encoding")
		mlkem1024.go#L147: 		return nil, errors.New("mlkem: invalid seed length")
		mlkem1024.go#L169: 		return nil, errors.New("mlkem: invalid NIST decapsulation key length")
		mlkem1024.go#L177: 			return nil, errors.New("mlkem: invalid secret key encoding")
		mlkem1024.go#L192: 		return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes")
		mlkem1024.go#L272: 		return errors.New("mlkem: PCT failed")
		mlkem1024.go#L330: 		return nil, errors.New("mlkem: invalid encapsulation key length")
		mlkem1024.go#L405: 		return nil, errors.New("mlkem: invalid ciphertext length")
		mlkem768.go#L206: 		return nil, errors.New("mlkem: invalid seed length")
		mlkem768.go#L228: 		return nil, errors.New("mlkem: invalid NIST decapsulation key length")
		mlkem768.go#L236: 			return nil, errors.New("mlkem: invalid secret key encoding")
		mlkem768.go#L251: 		return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes")
		mlkem768.go#L331: 		return errors.New("mlkem: PCT failed")
		mlkem768.go#L389: 		return nil, errors.New("mlkem: invalid encapsulation key length")
		mlkem768.go#L464: 		return nil, errors.New("mlkem: invalid ciphertext length")

	crypto/internal/fips140/nistec
		p224.go#L90: 			return nil, errors.New("invalid P224 compressed point encoding")
		p224.go#L106: 		return nil, errors.New("invalid P224 point encoding")
		p224.go#L137: 		return errors.New("P224 point not on curve")
		p224.go#L178: 		return nil, errors.New("P224 point is the point at infinity")
		p224.go#L414: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L96: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L111: 			return nil, errors.New("invalid P256 element encoding")
		p256_asm.go#L118: 			return nil, errors.New("invalid P256 compressed point encoding")
		p256_asm.go#L132: 		return nil, errors.New("invalid P256 point encoding")
		p256_asm.go#L163: 		return errors.New("P256 point not on curve")
		p256_asm.go#L420: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L435: 		return nil, errors.New("invalid scalar length")
		p256_asm.go#L522: 		return nil, errors.New("P256 point is the point at infinity")
		p256_ordinv.go#L23: 		return nil, errors.New("invalid scalar length")
		p384.go#L90: 			return nil, errors.New("invalid P384 compressed point encoding")
		p384.go#L106: 		return nil, errors.New("invalid P384 point encoding")
		p384.go#L137: 		return errors.New("P384 point not on curve")
		p384.go#L178: 		return nil, errors.New("P384 point is the point at infinity")
		p384.go#L414: 		return nil, errors.New("invalid scalar length")
		p521.go#L90: 			return nil, errors.New("invalid P521 compressed point encoding")
		p521.go#L106: 		return nil, errors.New("invalid P521 point encoding")
		p521.go#L137: 		return errors.New("P521 point not on curve")
		p521.go#L178: 		return nil, errors.New("P521 point is the point at infinity")
		p521.go#L414: 		return nil, errors.New("invalid scalar length")

	crypto/internal/fips140/nistec/fiat
		p224.go#L74: 		return nil, errors.New("invalid P224Element encoding")
		p224.go#L86: 			return nil, errors.New("invalid P224Element encoding")
		p256.go#L74: 		return nil, errors.New("invalid P256Element encoding")
		p256.go#L86: 			return nil, errors.New("invalid P256Element encoding")
		p384.go#L74: 		return nil, errors.New("invalid P384Element encoding")
		p384.go#L86: 			return nil, errors.New("invalid P384Element encoding")
		p521.go#L74: 		return nil, errors.New("invalid P521Element encoding")
		p521.go#L86: 			return nil, errors.New("invalid P521Element encoding")

	crypto/internal/fips140/rsa
		cast.go#L230: 			return errors.New("unexpected result")
		keygen.go#L19: 		return nil, errors.New("rsa: key too small")
		keygen.go#L46: 			return nil, errors.New("rsa: generated p == q, random source is broken")
		keygen.go#L54: 			return nil, errors.New("rsa: internal error: modulus size incorrect")
		keygen.go#L92: 			return nil, errors.New("rsa: internal error: e*d != 1 mod λ(N)")
		keygen.go#L113: var errDivisorTooLarge = errors.New("divisor too large")
		keygen.go#L137: 		return nil, errors.New("rsa: internal error: gcd(a, b) is even")
		keygen.go#L149: 		return nil, errors.New("rsa: internal error: gcd(a, b) is zero")
		keygen.go#L152: 		return nil, errors.New("rsa: internal error: b is not divisible by gcd(a, b)")
		keygen.go#L162: 		return nil, errors.New("rsa: prime size must be at least 16 bits")
		keygen.go#L322: 		return nil, errors.New("candidate is even")
		keygen.go#L329: 		return nil, errors.New("candidate is one")
		keygen.go#L350: 		return false, errors.New("incorrect length")
		keygen.go#L357: 		return false, errors.New("out-of-range candidate")
		pkcs1v15.go#L70: 			return nil, errors.New("crypto/rsa: unsupported hash function")
		pkcs1v22.go#L84: 		return nil, errors.New("crypto/rsa: input must be hashed with given hash")
		pkcs1v22.go#L153: 		return errors.New("rsa: internal error: inconsistent length")
		pkcs1v22.go#L279: 		return nil, errors.New("crypto/rsa: salt length cannot be negative")
		pkcs1v22.go#L321: 		return errors.New("crypto/rsa: salt length cannot be negative")
		rsa.go#L91: 		return nil, errors.New("crypto/rsa: p is even")
		rsa.go#L219: 		return errors.New("crypto/rsa: invalid prime")
		rsa.go#L223: 		return errors.New("crypto/rsa: invalid prime")
		rsa.go#L226: 		return errors.New("crypto/rsa: p * q != n")
		rsa.go#L240: 		return errors.New("crypto/rsa: invalid prime")
		rsa.go#L244: 		return errors.New("crypto/rsa: invalid CRT exponent")
		rsa.go#L250: 		return errors.New("crypto/rsa: invalid CRT exponent")
		rsa.go#L255: 		return errors.New("crypto/rsa: invalid prime")
		rsa.go#L259: 		return errors.New("crypto/rsa: invalid CRT exponent")
		rsa.go#L264: 		return errors.New("crypto/rsa: invalid CRT exponent")
		rsa.go#L274: 		return errors.New("crypto/rsa: invalid CRT coefficient")
		rsa.go#L288: 			return errors.New("crypto/rsa: p == q")
		rsa.go#L300: 		return errors.New("crypto/rsa: |p - q| too small")
		rsa.go#L310: 		return errors.New("crypto/rsa: d too small")
		rsa.go#L339: 		return false, errors.New("crypto/rsa: missing public modulus")
		rsa.go#L342: 		return false, errors.New("crypto/rsa: public modulus is even")
		rsa.go#L354: 		return false, errors.New("crypto/rsa: public exponent too small or negative")
		rsa.go#L359: 		return false, errors.New("crypto/rsa: public exponent is even")
		rsa.go#L371: 		return false, errors.New("crypto/rsa: public exponent too large")
		rsa.go#L393: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
		rsa.go#L394: var ErrDecryption = errors.New("crypto/rsa: decryption error")
		rsa.go#L395: var ErrVerification = errors.New("crypto/rsa: verification error")

	crypto/internal/fips140/sha256
		cast.go#L28: 			return errors.New("unexpected result")
		sha256.go#L85: 		return errors.New("crypto/sha256: invalid hash state identifier")
		sha256.go#L88: 		return errors.New("crypto/sha256: invalid hash state size")

	crypto/internal/fips140/sha3
		cast.go#L28: 			return errors.New("unexpected result")
		sha3.go#L201: 		return errors.New("sha3: invalid hash state")
		sha3.go#L212: 		return errors.New("sha3: invalid hash state identifier")
		sha3.go#L218: 		return errors.New("sha3: invalid hash state function")
		sha3.go#L226: 		return errors.New("sha3: invalid hash state")
		sha3.go#L230: 		return errors.New("sha3: invalid hash state")
		shake.go#L110: 		return errors.New("sha3: invalid hash state")

	crypto/internal/fips140/sha512
		cast.go#L32: 			return errors.New("unexpected result")
		sha512.go#L165: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L173: 		return errors.New("crypto/sha512: invalid hash state identifier")
		sha512.go#L176: 		return errors.New("crypto/sha512: invalid hash state size")

	crypto/internal/fips140/tls12
		cast.go#L34: 			return errors.New("unexpected result")

	crypto/internal/fips140/tls13
		cast.go#L33: 			return errors.New("unexpected result")

	crypto/internal/hpke
		hpke.go#L73: 		return nil, errors.New("unsupported suite ID")
		hpke.go#L187: 		return nil, errors.New("unsupported KDF id")
		hpke.go#L193: 		return nil, errors.New("unsupported AEAD id")
		hpke.go#L302: 		return nil, errors.New("unsupported KEM id")
		hpke.go#L310: 		return nil, errors.New("unsupported KEM id")

	crypto/md5
		md5.go#L78: 		return errors.New("crypto/md5: invalid hash state identifier")
		md5.go#L81: 		return errors.New("crypto/md5: invalid hash state size")
		md5.go#L118: 		return 0, errors.New("crypto/md5: use of MD5 is not allowed in FIPS 140-only mode")

	crypto/rand
		util.go#L19: 		return nil, errors.New("crypto/rand: use of Prime is not allowed in FIPS 140-only mode")
		util.go#L22: 		return nil, errors.New("crypto/rand: prime size must be at least 2-bit")

	crypto/rc4
		rc4.go#L35: 		return nil, errors.New("crypto/rc4: use of RC4 is not allowed in FIPS 140-only mode")

	crypto/rsa
		fips.go#L88: 		return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L91: 		return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		fips.go#L101: 		return nil, errors.New("crypto/rsa: use of PSS salt longer than the hash is not allowed in FIPS 140-only mode")
		fips.go#L115: 			return nil, errors.New("crypto/rsa: invalid PSS salt length")
		fips.go#L153: 		return errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L163: 		return errors.New("crypto/rsa: use of PSS salt longer than the hash is not allowed in FIPS 140-only mode")
		fips.go#L220: 		return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L223: 		return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		fips.go#L278: 			return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L306: 			return nil, errors.New("crypto/rsa: input must be hashed message")
		fips.go#L327: 		return nil, errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L349: 			return errors.New("crypto/rsa: input must be hashed message")
		fips.go#L373: 		return errors.New("crypto/rsa: use of hash functions other than SHA-2 or SHA-3 is not allowed in FIPS 140-only mode")
		fips.go#L404: 		return errors.New("crypto/rsa: public key missing N")
		fips.go#L407: 		return errors.New("crypto/rsa: use of keys smaller than 2048 bits is not allowed in FIPS 140-only mode")
		fips.go#L410: 		return errors.New("crypto/rsa: use of keys with odd size is not allowed in FIPS 140-only mode")
		fips.go#L413: 		return errors.New("crypto/rsa: use of public exponent <= 2¹⁶ is not allowed in FIPS 140-only mode")
		fips.go#L416: 		return errors.New("crypto/rsa: use of even public exponent is not allowed in FIPS 140-only mode")
		fips.go#L429: 		return errors.New("crypto/rsa: use of multi-prime keys is not allowed in FIPS 140-only mode")
		fips.go#L432: 		return errors.New("crypto/rsa: use of primes of different sizes is not allowed in FIPS 140-only mode")
		pkcs1v15.go#L44: 		return nil, errors.New("crypto/rsa: use of PKCS#1 v1.5 encryption is not allowed in FIPS 140-only mode")
		pkcs1v15.go#L197: 		return 0, nil, 0, errors.New("crypto/rsa: use of PKCS#1 v1.5 encryption is not allowed in FIPS 140-only mode")
		rsa.go#L197: 		return nil, errors.New("crypto/rsa: invalid options for Decrypt")
		rsa.go#L235: 		return errors.New("crypto/rsa: missing primes")
		rsa.go#L263: 		return errors.New("crypto/rsa: missing public modulus")
		rsa.go#L299: 			return nil, errors.New("crypto/rsa: generated key exponent too large")
		rsa.go#L320: 		return nil, errors.New("crypto/rsa: use of keys smaller than 2048 bits is not allowed in FIPS 140-only mode")
		rsa.go#L323: 		return nil, errors.New("crypto/rsa: use of keys with odd size is not allowed in FIPS 140-only mode")
		rsa.go#L326: 		return nil, errors.New("crypto/rsa: only crypto/rand.Reader is allowed in FIPS 140-only mode")
		rsa.go#L394: 		return nil, errors.New("crypto/rsa: multi-prime RSA is not allowed in FIPS 140-only mode")
		rsa.go#L403: 		return nil, errors.New("crypto/rsa: GenerateMultiPrimeKey: nprimes must be >= 2")
		rsa.go#L417: 			return nil, errors.New("crypto/rsa: too few primes of given length to generate an RSA key")
		rsa.go#L495: var ErrMessageTooLong = errors.New("crypto/rsa: message too long for RSA key size")
		rsa.go#L499: var ErrDecryption = errors.New("crypto/rsa: decryption error")
		rsa.go#L503: var ErrVerification = errors.New("crypto/rsa: verification error")
		rsa.go#L525: 		return precomputed, errors.New("crypto/rsa: missing public modulus")
		rsa.go#L528: 		return precomputed, errors.New("crypto/rsa: missing private exponent")
		rsa.go#L534: 		return precomputed, errors.New("crypto/rsa: prime P is nil")
		rsa.go#L537: 		return precomputed, errors.New("crypto/rsa: prime Q is nil")
		rsa.go#L585: 			return precomputed, errors.New("crypto/rsa: prime factor is nil")
		rsa.go#L588: 			return precomputed, errors.New("crypto/rsa: prime factor is <= 1")
		rsa.go#L600: 		return precomputed, errors.New("crypto/rsa: prime factors are not relatively prime")
		rsa.go#L615: 			return precomputed, errors.New("crypto/rsa: prime factors are not relatively prime")

	crypto/sha1
		sha1.go#L71: 		return errors.New("crypto/sha1: invalid hash state identifier")
		sha1.go#L74: 		return errors.New("crypto/sha1: invalid hash state size")
		sha1.go#L125: 		return 0, errors.New("crypto/sha1: use of SHA-1 is not allowed in FIPS 140-only mode")

	crypto/tls
		auth.go#L31: 			return errors.New("ECDSA verification failure")
		auth.go#L39: 			return errors.New("Ed25519 verification failure")
		auth.go#L59: 		return errors.New("internal error: unknown signature type")
		auth.go#L253: 	return 0, errors.New("tls: peer doesn't support any of the certificate's signature algorithms")
		common.go#L1235: var errNoCertificates = errors.New("tls: no certificates configured")
		common.go#L1305: 		return errors.New("no mutually supported protocol versions")
		common.go#L1373: 		return supportsRSAFallback(errors.New("client doesn't support ECDHE, can only use legacy RSA key exchange"))
		common.go#L1399: 				return errors.New("client doesn't support certificate curve")
		common.go#L1404: 				return errors.New("connection doesn't support Ed25519")
		common.go#L1437: 		return supportsRSAFallback(errors.New("client doesn't support any cipher suites compatible with the certificate"))
		common.go#L1472: 	return errors.New("chain is not signed by an acceptable CA")
		common.go#L1711: 		return nil, errors.New("tls: no FIPS compatible certificate chains found")
		conn.go#L620: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
		conn.go#L625: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
		conn.go#L792: 		return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
		conn.go#L977: 			return 0, errors.New("tls: internal error: sending non-handshake message to QUIC transport")
		conn.go#L1187: 	errShutdown = errors.New("tls: protocol is shutdown")
		conn.go#L1255: 		return errors.New("tls: internal error: unexpected renegotiation")
		conn.go#L1284: 		return errors.New("tls: unknown Renegotiation value")
		conn.go#L1311: 		return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
		conn.go#L1331: 		return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
		conn.go#L1450: var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake complete")
		conn.go#L1578: 		c.handshakeErr = errors.New("tls: internal error: handshake should have had a result")
		conn.go#L1676: 		return errors.New("tls: VerifyHostname called on TLS server connection")
		conn.go#L1679: 		return errors.New("tls: handshake has not yet been performed")
		conn.go#L1682: 		return errors.New("tls: handshake did not verify certificate chain")
		ech.go#L56: var errMalformedECHConfig = errors.New("tls: malformed ECHConfigList")
		ech.go#L139: 			return nil, errors.New("tls: malformed ECHConfig")
		ech.go#L206: 	return echCipher{}, errors.New("tls: no supported symmetric ciphersuites for ECH")
		ech.go#L254: 		return nil, errors.New("tls: malformed outer client hello")
		ech.go#L259: 		return nil, errors.New("tls: malformed outer client hello")
		ech.go#L267: 			return nil, errors.New("tls: invalid inner client hello")
		ech.go#L292: 		return nil, errors.New("tls: invalid inner client hello")
		ech.go#L300: 			return nil, errors.New("tls: invalid inner client hello")
		ech.go#L328: 					recon.SetError(errors.New("tls: invalid inner client hello"))
		ech.go#L333: 						recon.SetError(errors.New("tls: invalid inner client hello"))
		ech.go#L340: 							recon.SetError(errors.New("tls: invalid inner client hello"))
		ech.go#L344: 							recon.SetError(errors.New("tls: invalid outer extensions"))
		ech.go#L349: 								recon.SetError(errors.New("tls: invalid outer extensions"))
		ech.go#L377: 		return nil, errors.New("tls: invalid reconstructed inner client hello")
		ech.go#L400: 			return nil, errors.New("tls: client sent encrypted_client_hello extension with unsupported versions")
		ech.go#L405: 		return nil, errors.New("tls: client sent encrypted_client_hello extension but did not offer TLS 1.3")
		ech.go#L503: var errMalformedECHExt = errors.New("tls: malformed encrypted_client_hello extension")
		ech.go#L504: var errInvalidECHExt = errors.New("tls: client sent invalid encrypted_client_hello extension")
		handshake_client.go#L50: 		return nil, nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
		handshake_client.go#L56: 			return nil, nil, nil, errors.New("tls: invalid NextProtos value")
		handshake_client.go#L62: 		return nil, nil, nil, errors.New("tls: NextProtos values too large")
		handshake_client.go#L67: 		return nil, nil, nil, errors.New("tls: no supported versions satisfy MinVersion and MaxVersion")
		handshake_client.go#L119: 		return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L130: 			return nil, nil, nil, errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L156: 			return nil, nil, nil, errors.New("tls: no supported elliptic curves for ECDHE")
		handshake_client.go#L188: 				return nil, nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client.go#L212: 			return nil, nil, nil, errors.New("tls: MinVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
		handshake_client.go#L215: 			return nil, nil, nil, errors.New("tls: MaxVersion must be >= VersionTLS13 if EncryptedClientHelloConfigList is populated")
		handshake_client.go#L223: 			return nil, nil, nil, errors.New("tls: EncryptedClientHelloConfigList contains no valid configs")
		handshake_client.go#L311: 			return errors.New("tls: short read from Rand: " + err.Error())
		handshake_client.go#L364: 		return errors.New("tls: downgrade attempt detected, possibly due to a MitM attack or a broken middlebox")
		handshake_client.go#L639: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client.go#L684: 			return errors.New("tls: received unexpected CertificateStatus message")
		handshake_client.go#L710: 			return errors.New("tls: server's identity changed during renegotiation")
		handshake_client.go#L789: 		return errors.New("tls: failed to write to key log: " + err.Error())
		handshake_client.go#L882: 		return false, errors.New("tls: server selected unsupported compression format")
		handshake_client.go#L889: 			return false, errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_client.go#L899: 			return false, errors.New("tls: incorrect renegotiation extension contents")
		handshake_client.go#L917: 		return false, errors.New("tls: server resumed a session with a different version")
		handshake_client.go#L922: 		return false, errors.New("tls: server resumed a session with a different cipher suite")
		handshake_client.go#L928: 		return false, errors.New("tls: server resumed a session with a different EMS extension")
		handshake_client.go#L953: 			return errors.New("tls: server did not select an ALPN protocol")
		handshake_client.go#L958: 		return errors.New("tls: server advertised unrequested ALPN extension")
		handshake_client.go#L965: 	return errors.New("tls: server selected unadvertised ALPN protocol")
		handshake_client.go#L992: 		return errors.New("tls: server's Finished message was incorrect")
		handshake_client.go#L1011: 		return errors.New("tls: server sent unrequested session ticket")
		handshake_client.go#L1091: 			return errors.New("tls: failed to parse certificate from server: " + err.Error())
		handshake_client_tls13.go#L54: 		return errors.New("tls: server selected TLS 1.3 in a renegotiation")
		handshake_client_tls13.go#L107: 				return errors.New("tls: unexpected encrypted client hello extension in server hello despite ECH being accepted")
		handshake_client_tls13.go#L112: 				return errors.New("tls: unexpected server_name extension in server hello")
		handshake_client_tls13.go#L169: 		return errors.New("tls: server selected TLS 1.3 using the legacy version field")
		handshake_client_tls13.go#L174: 		return errors.New("tls: server selected an invalid version after a HelloRetryRequest")
		handshake_client_tls13.go#L179: 		return errors.New("tls: server sent an incorrect legacy version")
		handshake_client_tls13.go#L190: 		return errors.New("tls: server sent a ServerHello extension forbidden in TLS 1.3")
		handshake_client_tls13.go#L195: 		return errors.New("tls: server did not echo the legacy session ID")
		handshake_client_tls13.go#L200: 		return errors.New("tls: server selected unsupported compression format")
		handshake_client_tls13.go#L206: 		return errors.New("tls: server changed cipher suite after a HelloRetryRequest")
		handshake_client_tls13.go#L210: 		return errors.New("tls: server chose an unconfigured cipher suite")
		handshake_client_tls13.go#L259: 				return errors.New("tls: malformed encrypted client hello extension")
		handshake_client_tls13.go#L287: 		return errors.New("tls: unexpected encrypted client hello extension in serverHello")
		handshake_client_tls13.go#L295: 		return errors.New("tls: server sent an unnecessary HelloRetryRequest message")
		handshake_client_tls13.go#L304: 		return errors.New("tls: received malformed key_share extension")
		handshake_client_tls13.go#L313: 			return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L319: 			return errors.New("tls: server sent an unnecessary HelloRetryRequest key_share")
		handshake_client_tls13.go#L328: 			return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_client_tls13.go#L419: 		return errors.New("tls: server sent two HelloRetryRequest messages")
		handshake_client_tls13.go#L424: 		return errors.New("tls: server sent a cookie in a normal ServerHello")
		handshake_client_tls13.go#L429: 		return errors.New("tls: malformed key_share extension")
		handshake_client_tls13.go#L434: 		return errors.New("tls: server did not send a key share")
		handshake_client_tls13.go#L440: 		return errors.New("tls: server selected unsupported group")
		handshake_client_tls13.go#L449: 		return errors.New("tls: server selected an invalid PSK")
		handshake_client_tls13.go#L461: 		return errors.New("tls: server selected an invalid PSK and cipher suite pair")
		handshake_client_tls13.go#L481: 			return errors.New("tls: invalid server X25519MLKEM768 key share")
		handshake_client_tls13.go#L488: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L493: 		return errors.New("tls: invalid server key share")
		handshake_client_tls13.go#L503: 			return errors.New("tls: invalid X25519MLKEM768 server key share")
		handshake_client_tls13.go#L573: 			return errors.New("tls: server did not send a quic_transport_parameters extension")
		handshake_client_tls13.go#L579: 			return errors.New("tls: server sent an unexpected quic_transport_parameters extension")
		handshake_client_tls13.go#L585: 		return errors.New("tls: server sent an unexpected early_data extension")
		handshake_client_tls13.go#L593: 			return errors.New("tls: server accepted 0-RTT with the wrong cipher suite")
		handshake_client_tls13.go#L597: 			return errors.New("tls: server accepted 0-RTT with the wrong ALPN")
		handshake_client_tls13.go#L605: 			return errors.New("tls: server sent encrypted client hello retry configs after accepting encrypted client hello")
		handshake_client_tls13.go#L652: 		return errors.New("tls: received empty certificates message")
		handshake_client_tls13.go#L679: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L687: 		return errors.New("tls: certificate used with invalid signature algorithm")
		handshake_client_tls13.go#L693: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		handshake_client_tls13.go#L723: 		return errors.New("tls: invalid server finished hash")
		handshake_client_tls13.go#L815: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_client_tls13.go#L856: 		return errors.New("tls: received new session ticket from a client")
		handshake_client_tls13.go#L870: 		return errors.New("tls: received a session ticket with invalid lifetime")
		handshake_client_tls13.go#L876: 		return errors.New("tls: invalid early data for QUIC connection")
		handshake_messages.go#L406: 		return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_messages.go#L410: 			return errors.New("tls: internal error: pskBinders length mismatch")
		handshake_server.go#L193: 		return nil, nil, errors.New("tls: Encrypted Client Hello cannot be used pre-TLS 1.3")
		handshake_server.go#L221: 		return errors.New("tls: client does not support uncompressed connections")
		handshake_server.go#L244: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server.go#L395: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server.go#L413: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server.go#L528: 		return errors.New("tls: session supported extended_master_secret but client does not")
		handshake_server.go#L749: 				return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server.go#L766: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server.go#L828: 		return errors.New("tls: client's Finished message is incorrect")
		handshake_server.go#L905: 			return errors.New("tls: failed to parse client certificate: " + err.Error())
		handshake_server.go#L922: 		return errors.New("tls: client didn't provide a certificate")
		handshake_server_tls13.go#L118: 		return errors.New("tls: client used the legacy version field to negotiate TLS 1.3")
		handshake_server_tls13.go#L136: 				return errors.New("tls: client using inappropriate protocol fallback")
		handshake_server_tls13.go#L145: 		return errors.New("tls: TLS 1.3 client supports illegal compression methods")
		handshake_server_tls13.go#L156: 		return errors.New("tls: initial handshake had non-empty renegotiation extension")
		handshake_server_tls13.go#L162: 			return errors.New("tls: early_data without pre_shared_key")
		handshake_server_tls13.go#L172: 		return errors.New("tls: client sent unexpected early data")
		handshake_server_tls13.go#L193: 		return errors.New("tls: no cipher suite supported by both client and server")
		handshake_server_tls13.go#L213: 		return errors.New("tls: no key exchanges supported by both client and server")
		handshake_server_tls13.go#L253: 			return errors.New("tls: invalid X25519MLKEM768 client key share")
		handshake_server_tls13.go#L259: 		return errors.New("tls: CurvePreferences includes unsupported curve")
		handshake_server_tls13.go#L270: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L275: 		return errors.New("tls: invalid client key share")
		handshake_server_tls13.go#L281: 			return errors.New("tls: invalid X25519MLKEM768 client key share")
		handshake_server_tls13.go#L309: 				return errors.New("tls: client offered TLS version older than TLS 1.3")
		handshake_server_tls13.go#L315: 			return errors.New("tls: client did not send a quic_transport_parameters extension")
		handshake_server_tls13.go#L321: 			return errors.New("tls: client sent an unexpected quic_transport_parameters extension")
		handshake_server_tls13.go#L349: 		return errors.New("tls: invalid or missing PSK binders")
		handshake_server_tls13.go#L427: 			return errors.New("tls: internal error: failed to clone hash")
		handshake_server_tls13.go#L438: 			return errors.New("tls: invalid PSK binder")
		handshake_server_tls13.go#L607: 			return nil, errors.New("tls: second client hello missing encrypted client hello extension")
		handshake_server_tls13.go#L613: 			return nil, errors.New("tls: client sent invalid encrypted client hello extension")
		handshake_server_tls13.go#L618: 			return nil, errors.New("tls: unexpected switch in encrypted client hello extension type")
		handshake_server_tls13.go#L624: 				return nil, errors.New("tls: second client hello encrypted client hello extension does not match")
		handshake_server_tls13.go#L630: 				return nil, errors.New("tls: failed to decrypt second client hello encrypted client hello extension payload")
		handshake_server_tls13.go#L636: 				return nil, errors.New("tls: client sent invalid encrypted client hello extension")
		handshake_server_tls13.go#L645: 		return nil, errors.New("tls: client didn't send one key share in second ClientHello")
		handshake_server_tls13.go#L651: 		return nil, errors.New("tls: client sent unexpected key share in second ClientHello")
		handshake_server_tls13.go#L656: 		return nil, errors.New("tls: client indicated early data in second ClientHello")
		handshake_server_tls13.go#L661: 		return nil, errors.New("tls: client illegally modified second ClientHello")
		handshake_server_tls13.go#L878: 		return errors.New("tls: failed to sign handshake: " + err.Error())
		handshake_server_tls13.go#L982: 		return errors.New("tls: internal error: unknown cipher suite")
		handshake_server_tls13.go#L1093: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L1101: 			return errors.New("tls: client certificate used with invalid signature algorithm")
		handshake_server_tls13.go#L1107: 			return errors.New("tls: invalid signature by the client certificate: " + err.Error())
		handshake_server_tls13.go#L1141: 		return errors.New("tls: invalid client finished hash")
		key_agreement.go#L38: var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
		key_agreement.go#L39: var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
		key_agreement.go#L61: 		return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
		key_agreement.go#L78: 	return errors.New("tls: unexpected ServerKeyExchange")
		key_agreement.go#L92: 		return nil, nil, errors.New("tls: server certificate contains incorrect key type for selected ciphersuite")
		key_agreement.go#L179: 		return nil, errors.New("tls: no supported elliptic curves offered")
		key_agreement.go#L182: 		return nil, errors.New("tls: CurvePreferences includes unsupported curve")
		key_agreement.go#L224: 		return nil, errors.New("tls: certificate cannot be used with the selected cipher suite")
		key_agreement.go#L235: 		return nil, errors.New("tls: failed to sign ECDHE parameters: " + err.Error())
		key_agreement.go#L280: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L297: 		return errors.New("tls: server selected unsupported curve")
		key_agreement.go#L331: 			return errors.New("tls: certificate used with invalid signature algorithm")
		key_agreement.go#L355: 		return errors.New("tls: invalid signature by the server certificate: " + err.Error())
		key_agreement.go#L362: 		return nil, nil, errors.New("tls: missing ServerKeyExchange message")
		key_schedule.go#L65: 		return nil, errors.New("tls: internal error: unsupported curve")
		prf.go#L258: 	return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
		prf.go#L265: 	return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when neither TLS 1.3 nor Extended Master Secret are negotiated; override with GODEBUG=tlsunsafeekm=1")
		quic.go#L205: 		return quicError(errors.New("tls: Start called more than once"))
		quic.go#L209: 		return quicError(errors.New("tls: Config MinVersion must be at least TLS 1.3"))
		quic.go#L260: 		return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
		quic.go#L306: 		return quicError(errors.New("tls: SendSessionTicket called before handshake completed"))
		quic.go#L309: 		return quicError(errors.New("tls: SendSessionTicket called on the client"))
		quic.go#L312: 		return quicError(errors.New("tls: SendSessionTicket called multiple times"))
		quic.go#L325: 		return quicError(errors.New("tls: StoreSessionTicket called on the server"))
		ticket.go#L148: 					b.SetError(errors.New("tls: internal error: empty verified chain"))
		ticket.go#L199: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L204: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L214: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L222: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L236: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L241: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L245: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L251: 				return nil, errors.New("tls: invalid session encoding")
		ticket.go#L265: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L271: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L277: 		return nil, errors.New("tls: no server certificates in client session")
		ticket.go#L281: 			return nil, errors.New("tls: invalid session encoding")
		ticket.go#L286: 		return nil, errors.New("tls: invalid session encoding")
		ticket.go#L322: 		return nil, errors.New("tls: internal error: session ticket keys unavailable")
		ticket.go#L337: 		return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
		tls.go#L93: 		return nil, errors.New("tls: neither Certificates, GetCertificate, nor GetConfigForClient set in Config")
		tls.go#L275: 			return fail(errors.New("tls: failed to find any PEM data in certificate input"))
		tls.go#L278: 			return fail(errors.New("tls: failed to find certificate PEM data in certificate input, but did find a private key; PEM inputs may have been switched"))
		tls.go#L289: 				return fail(errors.New("tls: failed to find any PEM data in key input"))
		tls.go#L292: 				return fail(errors.New("tls: found a certificate rather than a key in the PEM for the private key"))
		tls.go#L324: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L327: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L332: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L335: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L340: 			return fail(errors.New("tls: private key type does not match public key type"))
		tls.go#L343: 			return fail(errors.New("tls: private key does not match public key"))
		tls.go#L346: 		return fail(errors.New("tls: unknown public key algorithm"))
		tls.go#L364: 			return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
		tls.go#L371: 	return nil, errors.New("tls: failed to parse private key")

	crypto/x509
		oid.go#L19: 	errInvalidOID = errors.New("invalid oid")
		parser.go#L67: 				return "", errors.New("invalid PrintableString")
		parser.go#L73: 			return "", errors.New("invalid UTF-8 string")
		parser.go#L78: 			return "", errors.New("invalid BMPString")
		parser.go#L96: 			return "", errors.New("invalid IA5String")
		parser.go#L102: 				return "", errors.New("invalid NumericString")
		parser.go#L114: 		return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L122: 			return nil, errors.New("x509: invalid RDNSequence")
		parser.go#L127: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute")
		parser.go#L131: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute type")
		parser.go#L136: 				return nil, errors.New("x509: invalid RDNSequence: invalid attribute value")
		parser.go#L155: 		return ai, errors.New("x509: malformed OID")
		parser.go#L163: 		return ai, errors.New("x509: malformed parameters")
		parser.go#L175: 			return t, errors.New("x509: malformed UTCTime")
		parser.go#L179: 			return t, errors.New("x509: malformed GeneralizedTime")
		parser.go#L182: 		return t, errors.New("x509: unsupported time format")
		parser.go#L203: 		return ext, errors.New("x509: malformed extension OID field")
		parser.go#L207: 			return ext, errors.New("x509: malformed extension critical field")
		parser.go#L212: 		return ext, errors.New("x509: malformed extension value field")
		parser.go#L227: 			return nil, errors.New("x509: RSA key missing NULL parameters")
		parser.go#L232: 			return nil, errors.New("x509: invalid RSA public key")
		parser.go#L235: 			return nil, errors.New("x509: invalid RSA modulus")
		parser.go#L238: 			return nil, errors.New("x509: invalid RSA public exponent")
		parser.go#L242: 			return nil, errors.New("x509: RSA modulus is not a positive number")
		parser.go#L245: 			return nil, errors.New("x509: RSA public exponent is not a positive number")
		parser.go#L257: 			return nil, errors.New("x509: invalid ECDSA parameters")
		parser.go#L261: 			return nil, errors.New("x509: unsupported elliptic curve")
		parser.go#L265: 			return nil, errors.New("x509: failed to unmarshal elliptic curve point")
		parser.go#L277: 			return nil, errors.New("x509: Ed25519 key encoded with illegal parameters")
		parser.go#L280: 			return nil, errors.New("x509: wrong Ed25519 public key size")
		parser.go#L287: 			return nil, errors.New("x509: X25519 key encoded with illegal parameters")
		parser.go#L293: 			return nil, errors.New("x509: invalid DSA public key")
		parser.go#L308: 			return nil, errors.New("x509: invalid DSA parameters")
		parser.go#L312: 			return nil, errors.New("x509: zero or negative DSA parameter")
		parser.go#L316: 		return nil, errors.New("x509: unknown public key algorithm")
		parser.go#L323: 		return 0, errors.New("x509: invalid key usage")
		parser.go#L338: 		return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L342: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L348: 			return false, 0, errors.New("x509: invalid basic constraints")
		parser.go#L358: 		return errors.New("x509: invalid subject alternative names")
		parser.go#L364: 			return errors.New("x509: invalid subject alternative name")
		parser.go#L380: 				return errors.New("x509: SAN rfc822Name is malformed")
		parser.go#L386: 				return errors.New("x509: SAN dNSName is malformed")
		parser.go#L392: 				return errors.New("x509: SAN uniformResourceIdentifier is malformed")
		parser.go#L409: 				return errors.New("x509: cannot parse IP address of length " + strconv.Itoa(len(data)))
		parser.go#L423: 		return nil, errors.New("x509: authority key identifier incorrectly marked critical")
		parser.go#L428: 		return nil, errors.New("x509: invalid authority key identifier")
		parser.go#L432: 			return nil, errors.New("x509: invalid authority key identifier")
		parser.go#L443: 		return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L448: 			return nil, nil, errors.New("x509: invalid extended key usages")
		parser.go#L463: 		return nil, errors.New("x509: invalid certificate policies")
		parser.go#L469: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L472: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L477: 			return nil, errors.New("x509: invalid certificate policies")
		parser.go#L533: 		return false, errors.New("x509: invalid NameConstraints extension")
		parser.go#L541: 		return false, errors.New("x509: empty name constraints extension")
		parser.go#L564: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L606: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L630: 					return nil, nil, nil, nil, errors.New("x509: invalid constraint value: " + err.Error())
		parser.go#L720: 					return errors.New("x509: invalid CRL distribution points")
		parser.go#L725: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L730: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L736: 						return errors.New("x509: invalid CRL distribution point")
		parser.go#L744: 							return errors.New("x509: invalid CRL distribution point")
		parser.go#L758: 					return errors.New("x509: invalid policy constraints extension")
		parser.go#L763: 						return errors.New("x509: invalid policy constraints extension")
		parser.go#L768: 						return errors.New("x509: policy constraints requireExplicitPolicy field overflows int")
		parser.go#L775: 						return errors.New("x509: invalid policy constraints extension")
		parser.go#L780: 						return errors.New("x509: policy constraints inhibitPolicyMapping field overflows int")
		parser.go#L792: 					return errors.New("x509: subject key identifier incorrectly marked critical")
		parser.go#L797: 					return errors.New("x509: invalid subject key identifier")
		parser.go#L814: 					return errors.New("x509: invalid policy mappings extension")
		parser.go#L822: 						return errors.New("x509: invalid policy mappings extension")
		parser.go#L829: 					return errors.New("x509: invalid inhibit any policy extension")
		parser.go#L840: 				return errors.New("x509: authority info access incorrectly marked critical")
		parser.go#L844: 				return errors.New("x509: invalid authority info access")
		parser.go#L849: 					return errors.New("x509: invalid authority info access")
		parser.go#L853: 					return errors.New("x509: invalid authority info access")
		parser.go#L859: 					return errors.New("x509: invalid authority info access")
		parser.go#L891: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L895: 		return nil, errors.New("x509: malformed certificate")
		parser.go#L902: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L906: 		return nil, errors.New("x509: malformed tbs certificate")
		parser.go#L910: 		return nil, errors.New("x509: malformed version")
		parser.go#L913: 		return nil, errors.New("x509: malformed version")
		parser.go#L919: 		return nil, errors.New("x509: invalid version")
		parser.go#L924: 		return nil, errors.New("x509: malformed serial number")
		parser.go#L928: 			return nil, errors.New("x509: negative serial number")
		parser.go#L937: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L944: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L947: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L957: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L968: 		return nil, errors.New("x509: malformed validity")
		parser.go#L977: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L988: 		return nil, errors.New("x509: malformed spki")
		parser.go#L992: 		return nil, errors.New("x509: malformed spki")
		parser.go#L996: 		return nil, errors.New("x509: malformed public key algorithm identifier")
		parser.go#L1005: 		return nil, errors.New("x509: malformed subjectPublicKey")
		parser.go#L1019: 			return nil, errors.New("x509: malformed issuerUniqueID")
		parser.go#L1022: 			return nil, errors.New("x509: malformed subjectUniqueID")
		parser.go#L1028: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L1033: 					return nil, errors.New("x509: malformed extensions")
		parser.go#L1038: 						return nil, errors.New("x509: malformed extension")
		parser.go#L1061: 		return nil, errors.New("x509: malformed signature")
		parser.go#L1079: 		return nil, errors.New("x509: trailing data")
		parser.go#L1113: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1117: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1124: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1128: 		return nil, errors.New("x509: malformed tbs crl")
		parser.go#L1133: 		return nil, errors.New("x509: unsupported crl version")
		parser.go#L1136: 		return nil, errors.New("x509: malformed crl")
		parser.go#L1144: 		return nil, errors.New("x509: malformed signature algorithm identifier")
		parser.go#L1151: 		return nil, errors.New("x509: malformed algorithm identifier")
		parser.go#L1154: 		return nil, errors.New("x509: inner and outer signature algorithm identifiers don't match")
		parser.go#L1164: 		return nil, errors.New("x509: malformed signature")
		parser.go#L1170: 		return nil, errors.New("x509: malformed issuer")
		parser.go#L1193: 			return nil, errors.New("x509: malformed crl")
		parser.go#L1200: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1204: 				return nil, errors.New("x509: malformed crl")
		parser.go#L1209: 				return nil, errors.New("x509: malformed serial number")
		parser.go#L1218: 				return nil, errors.New("x509: malformed extensions")
		parser.go#L1224: 						return nil, errors.New("x509: malformed extension")
		parser.go#L1253: 		return nil, errors.New("x509: malformed extensions")
		parser.go#L1257: 			return nil, errors.New("x509: malformed extensions")
		parser.go#L1262: 				return nil, errors.New("x509: malformed extension")
		parser.go#L1277: 					return nil, errors.New("x509: malformed crl number")
		pem_decrypt.go#L110: var IncorrectPasswordError = errors.New("x509: decryption password incorrect")
		pem_decrypt.go#L127: 		return nil, errors.New("x509: no DEK-Info header in block")
		pem_decrypt.go#L132: 		return nil, errors.New("x509: malformed DEK-Info header")
		pem_decrypt.go#L137: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L144: 		return nil, errors.New("x509: incorrect IV size")
		pem_decrypt.go#L156: 		return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size")
		pem_decrypt.go#L171: 		return nil, errors.New("x509: invalid padding")
		pem_decrypt.go#L198: 		return nil, errors.New("x509: unknown encryption mode")
		pem_decrypt.go#L202: 		return nil, errors.New("x509: cannot generate IV: " + err.Error())
		pkcs1.go#L62: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs1.go#L65: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		pkcs1.go#L71: 		return nil, errors.New("x509: unsupported private key version")
		pkcs1.go#L78: 		return nil, errors.New("x509: private key contains zero or negative value")
		pkcs1.go#L96: 			return nil, errors.New("x509: private key contains zero or negative prime")
		pkcs1.go#L172: 			return nil, errors.New("x509: failed to parse public key (use ParsePKIXPublicKey instead for this key format)")
		pkcs1.go#L181: 		return nil, errors.New("x509: public key contains zero or negative value")
		pkcs1.go#L184: 		return nil, errors.New("x509: public key contains large public exponent")
		pkcs8.go#L42: 			return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)")
		pkcs8.go#L45: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		pkcs8.go#L53: 			return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L65: 			return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error())
		pkcs8.go#L71: 			return nil, errors.New("x509: invalid Ed25519 private key parameters")
		pkcs8.go#L84: 			return nil, errors.New("x509: invalid X25519 private key parameters")
		pkcs8.go#L124: 			return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L128: 			return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L137: 			return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		pkcs8.go#L162: 				return nil, errors.New("x509: unknown curve while marshaling to PKCS#8")
		pkcs8.go#L166: 				return nil, errors.New("x509: failed to marshal curve OID: " + err.Error())
		pkcs8.go#L175: 				return nil, errors.New("x509: failed to marshal EC private key while building PKCS#8: " + err.Error())
		sec1.go#L49: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L59: 		return nil, errors.New("invalid elliptic key public key")
		sec1.go#L88: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)")
		sec1.go#L91: 			return nil, errors.New("x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)")
		sec1.go#L93: 		return nil, errors.New("x509: failed to parse EC private key: " + err.Error())
		sec1.go#L106: 		return nil, errors.New("x509: unknown elliptic curve")
		sec1.go#L112: 		return nil, errors.New("x509: invalid elliptic curve private key value")
		sec1.go#L124: 			return nil, errors.New("x509: invalid private key length")
		verify.go#L184: var errNotParsed = errors.New("x509: missing ASN.1 contents; use ParseCertificate")
		verify.go#L635: 			return errors.New("x509: internal error: empty chain when appending CA cert")
		verify.go#L974: 			err = errors.New("x509: signature check attempts limit reached while verifying certificate chain")
		x509.go#L76: 			return nil, errors.New("x509: failed to parse public key (use ParsePKCS1PublicKey instead for this key format)")
		x509.go#L80: 		return nil, errors.New("x509: trailing data after ASN.1 of public-key")
		x509.go#L102: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L105: 			return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: invalid elliptic curve public key")
		x509.go#L125: 				return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: unsupported elliptic curve")
		x509.go#L877: var ErrUnsupportedAlgorithm = errors.New("x509: cannot verify signature: algorithm unimplemented")
		x509.go#L1012: 			return errors.New("x509: ECDSA verification failure")
		x509.go#L1020: 			return errors.New("x509: Ed25519 verification failure")
		x509.go#L1431: 			return ext, errors.New("x509: unknown extended key usage")
		x509.go#L1466: 							child.SetError(errors.New("invalid policy object identifier"))
		x509.go#L1537: 			return 0, ai, errors.New("x509: unsupported elliptic curve")
		x509.go#L1545: 		return 0, ai, errors.New("x509: only RSA, ECDSA and Ed25519 keys supported")
		x509.go#L1555: 				return 0, ai, errors.New("x509: requested SignatureAlgorithm does not match private key type")
		x509.go#L1558: 				return 0, ai, errors.New("x509: signing with MD5 is not supported")
		x509.go#L1568: 	return 0, ai, errors.New("x509: unknown SignatureAlgorithm")
		x509.go#L1671: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1703: 		return nil, errors.New("x509: serial number must be positive")
		x509.go#L1707: 		return nil, errors.New("x509: only CAs are allowed to specify MaxPathLen")
		x509.go#L1753: 		return nil, errors.New("x509: internal error: supported public key does not implement Equal")
		x509.go#L1755: 		return nil, errors.New("x509: provided PrivateKey doesn't match parent's PublicKey")
		x509.go#L1824: 		return nil, errors.New("x509: trailing data after CRL")
		x509.go#L1837: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L1969: 		return nil, errors.New("x509: failed to unmarshal raw CSR Attributes")
		x509.go#L2018: 				return nil, errors.New("x509: certificate request contains duplicate requested extensions")
		x509.go#L2050: 		return nil, errors.New("x509: certificate private key does not implement crypto.Signer")
		x509.go#L2141: 			return nil, errors.New("x509: failed to serialise extensions attribute: " + err.Error())
		x509.go#L2234: 		return nil, errors.New("x509: trailing data after X.509 Subject")
		x509.go#L2397: 		return nil, errors.New("x509: template can not be nil")
		x509.go#L2400: 		return nil, errors.New("x509: issuer can not be nil")
		x509.go#L2403: 		return nil, errors.New("x509: issuer must have the crlSign key usage bit set")
		x509.go#L2406: 		return nil, errors.New("x509: issuer certificate doesn't contain a subject key identifier")
		x509.go#L2409: 		return nil, errors.New("x509: template.ThisUpdate is after template.NextUpdate")
		x509.go#L2412: 		return nil, errors.New("x509: template contains nil Number field")
		x509.go#L2436: 				return nil, errors.New("x509: template contains entry with nil SerialNumber field")
		x509.go#L2439: 				return nil, errors.New("x509: template contains entry with zero RevocationTime field")
		x509.go#L2452: 					return nil, errors.New("x509: template contains entry with ReasonCode ExtraExtension; use ReasonCode field instead")
		x509.go#L2484: 		return nil, errors.New("x509: CRL number exceeds 20 octets")

	database/sql
		convert.go#L22: var errNilPtr = errors.New("destination pointer is nil") // embedded in descriptive error
		convert.go#L336: 				return errors.New("invalid context to convert cursor rows, missing parent *Rows")
		convert.go#L401: 		return errors.New("destination not a pointer")
		ctxutil.go#L111: 			return nil, errors.New("sql: driver does not support non-default isolation level")
		ctxutil.go#L117: 			return nil, errors.New("sql: driver does not support read-only transactions")
		ctxutil.go#L141: 			return nil, errors.New("sql: driver does not support the use of Named Parameters")
		sql.go#L493: var ErrNoRows = errors.New("sql: no rows in result set")
		sql.go#L654: 		return func() error { return errors.New("sql: duplicate driverConn close") }
		sql.go#L664: 		return errors.New("sql: duplicate driverConn close")
		sql.go#L1313: var errDBClosed = errors.New("sql: database is closed")
		sql.go#L1936: var ErrConnDone = errors.New("sql: connection is already closed")
		sql.go#L2230: var ErrTxDone = errors.New("sql: transaction has already been committed or rolled back")
		sql.go#L2425: 		return &Stmt{stickyErr: errors.New("sql: Tx.Stmt: statement from different database used")}
		sql.go#L2725: 		err = errors.New("sql: statement is closed")
		sql.go#L3178: var errRowsClosed = errors.New("sql: Rows are closed")
		sql.go#L3179: var errNoRows = errors.New("sql: no Rows available")
		sql.go#L3392: 		return errors.New("sql: Scan called without calling Next")
		sql.go#L3508: 		return errors.New("sql: RawBytes isn't allowed on Row.Scan")

	database/sql/driver
		driver.go#L149: var ErrSkip = errors.New("driver: skip fast-path; continue as if unimplemented")
		driver.go#L163: var ErrBadConn = errors.New("driver: bad connection")
		driver.go#L386: var ErrRemoveArgument = errors.New("driver: remove argument from query")
		driver.go#L531: 	return 0, errors.New("LastInsertId is not supported by this driver")
		driver.go#L548: 	return 0, errors.New("no LastInsertId available after DDL statement")
		driver.go#L552: 	return 0, errors.New("no RowsAffected available after DDL statement")

	encoding/asn1
		asn1.go#L475: 		return "", errors.New("asn1: invalid UTF-8 string")
		asn1.go#L486: 		return "", errors.New("pkcs12: odd-length BMP string")
		asn1.go#L527: 		err = errors.New("asn1: internal error in parseTagAndLength")
		marshal.go#L643: 						return nil, errors.New("asn1: string not valid UTF-8")

	encoding/binary
		binary.go#L33: var errBufferTooSmall = errors.New("buffer too small")
		binary.go#L282: 		return errors.New("binary.Read: invalid type " + reflect.TypeOf(data).String())
		binary.go#L319: 		return 0, errors.New("binary.Decode: invalid type " + reflect.TypeOf(data).String())
		binary.go#L426: 		return errors.New("binary.Write: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		binary.go#L455: 		return 0, errors.New("binary.Encode: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		binary.go#L482: 		return nil, errors.New("binary.Append: some values are not fixed-sized in type " + reflect.TypeOf(data).String())
		varint.go#L124: var errOverflow = errors.New("binary: varint overflows a 64-bit integer")

	encoding/hex
		hex.go#L67: var ErrLength = errors.New("encoding/hex: odd length hex string")
		hex.go#L264: 		return 0, errors.New("encoding/hex: dumper closed")

	encoding/json
		stream.go#L272: 		return errors.New("json.RawMessage: UnmarshalJSON on nil pointer")

	encoding/pem
		pem.go#L244: 			return errors.New("pem: cannot encode a header key that contains a colon")

	encoding/xml
		marshal.go#L992: 		p.err = errors.New("use of closed Encoder")
		marshal.go#L1003: 		p.err = errors.New("use of closed Encoder")
		marshal.go#L1014: 		p.err = errors.New("use of closed Encoder")
		read.go#L150: 		return errors.New("non-pointer passed to Unmarshal")
		read.go#L154: 		return errors.New("nil pointer passed to Unmarshal")
		read.go#L318: var errUnmarshalDepth = errors.New("exceeded max depth")
		read.go#L395: 		return errors.New("unknown type " + v.Type().String())
		read.go#L636: 		return errors.New("cannot unmarshal into " + dst0.Type().String())
		xml.go#L539: var errRawToken = errors.New("xml: cannot use RawToken from UnmarshalXML method")

	flag
		flag.go#L101: var ErrHelp = errors.New("flag: help requested")
		flag.go#L105: var errParse = errors.New("parse error")
		flag.go#L109: var errRange = errors.New("value out of range")
		flag.go#L1061: 	return errors.New(msg)

	fmt
		errors.go#L30: 		err = errors.New(s)
		scan.go#L180: 	return 0, errors.New("ScanState's Read should not be called. Use ReadRune")
		scan.go#L244: 	panic(scanError{errors.New(err)})
		scan.go#L371: 		return errors.New("fmt: scanning called UnreadRune with no rune available")
		scan.go#L465: var errComplex = errors.New("syntax error scanning complex number")
		scan.go#L466: var errBool = errors.New("syntax error scanning boolean")

	github.com/aws/aws-sdk-go-v2/aws/arn
		arn.go#L63: 		return ARN{}, errors.New(invalidPrefix)
		arn.go#L67: 		return ARN{}, errors.New(invalidSections)

	github.com/aws/aws-sdk-go-v2/internal/sync/singleflight
		singleflight.go#L18: var errGoexit = errors.New("runtime.Goexit was called")

	github.com/aws/smithy-go/internal/sync/singleflight
		singleflight.go#L18: var errGoexit = errors.New("runtime.Goexit was called")

	github.com/go-pg/migrations/v8
		collection.go#L89: 		return errors.New("Register expects at least 1 arg")

	github.com/go-pg/pg/v10
		listener.go#L19: 	errListenerClosed = errors.New("pg: listener is closed")
		listener.go#L20: 	errPingTimeout    = errors.New("pg: ping timeout")
		messages.go#L157: 			return errors.New("pg: SSL is not enabled on the server")
		options.go#L182: 		return nil, errors.New("pg: invalid scheme: " + parsedURL.Scheme)
		options.go#L210: 		return nil, errors.New("pg: database name not provided")
		options.go#L253: 		return nil, errors.New("pg: options other than 'sslmode', 'application_name' and 'connect_timeout' are not supported")
		stmt.go#L13: var errStmtClosed = errors.New("pg: statement is closed")
		tx.go#L17: var ErrTxDone = errors.New("pg: transaction has already been committed or rolled back")

	github.com/go-pg/pg/v10/internal/pool
		pool.go#L15: 	ErrClosed      = errors.New("pg: database is closed")
		pool.go#L16: 	ErrPoolTimeout = errors.New("pg: connection pool timeout")
		pool_sticky.go#L146: 	return errors.New("pg: StickyConnPool.Close: infinite loop")
		pool_sticky.go#L162: 		return errors.New("pg: StickyConnPool does not have a Conn")
		reader_bytes.go#L57: 		return errors.New("UnreadByte: at beginning of slice")

	github.com/go-pg/pg/v10/orm
		composite_parser.go#L13: var errEndOfComposite = errors.New("pg: end of composite")
		model.go#L12: var errModelNil = errors.New("pg: Model(nil)")
		query.go#L632: 		q.err(errors.New("pg: no joins to apply JoinOn"))
		query.go#L645: 		q.err(errors.New("pg: no joins to apply JoinOn"))
		query.go#L1414: 		err := errors.New(

	github.com/go-pg/pg/v10/types
		array_parser.go#L13: var errEndOfArray = errors.New("pg: end of array")
		hstore_parser.go#L10: var errEndOfHstore = errors.New("pg: end of hstore")
		scan.go#L42: 		return errors.New("pg: Scan(nil)")
		scan.go#L55: 			return errors.New("pg: Scan(nil)")
		scan_value.go#L172: 		return errors.New("pg: Scan(nil)")
		scan_value.go#L181: 		return errors.New("pg: Scan(nil)")

	github.com/golang/protobuf/jsonpb
		decode.go#L74: 		return errors.New("invalid nil message")
		decode.go#L155: 			return errors.New("Any JSON doesn't have '@type'")
		decode.go#L184: 				return errors.New("Any JSON doesn't have 'value'")
		encode.go#L88: 		return nil, errors.New("Marshal called with nil")
		encode.go#L181: 			return errors.New("signs of seconds and nanos do not match")
		encode.go#L214: 			return errors.New("nil Value")

	github.com/golang/protobuf/proto
		buffer.go#L313: 			return nil, 0, errors.New("proto: cannot parse reserved wire type")
		deprecated.go#L18: 	ErrNil = errors.New("proto: Marshal called with nil")
		deprecated.go#L21: 	ErrTooLarge = errors.New("proto: message encodes to over 2 GB")
		deprecated.go#L24: 	ErrInternalBadWireType = errors.New("proto: internal error: bad wiretype for oneof")
		deprecated.go#L35: 	return nil, errors.New("proto: not implemented")
		deprecated.go#L40: 	return errors.New("proto: not implemented")
		deprecated.go#L45: 	return nil, errors.New("proto: not implemented")
		deprecated.go#L50: 	return errors.New("proto: not implemented")
		extensions.go#L39: var ErrMissingExtension = errors.New("proto: missing extension")
		extensions.go#L41: var errNotExtendable = errors.New("proto: not an extendable proto.Message")
		text_decode.go#L662: var errBadUTF8 = errors.New("proto: bad UTF-8")

	github.com/golang/protobuf/ptypes
		duration.go#L63: 		return errors.New("duration: nil Duration")
		timestamp.go#L100: 		return errors.New("timestamp: nil Timestamp")

	github.com/tmthrgd/go-hex
		hex.go#L18: var errLength = errors.New("go-hex: odd length hex string")

	github.com/valyala/fastjson
		scanner.go#L94: var errEOF = errors.New("end of s")

	github.com/vmihailenco/bufpool
		buffer.go#L41: var errNegativeRead = errors.New("bytes.Buffer: reader returned negative count from Read")
		buffer.go#L313: 		return errors.New("bytes.Buffer: UnreadRune: previous operation was not a successful ReadRune")
		buffer.go#L322: var errUnreadByte = errors.New("bytes.Buffer: UnreadByte: previous operation was not a successful read")

	github.com/vmihailenco/msgpack/v5
		decode.go#L269: 		return errors.New("msgpack: Decode(nil)")
		decode_map.go#L11: var errArrayStruct = errors.New("msgpack: number of fields in array-encoded struct has changed")
		decode_value.go#L196: 				v.Set(reflect.ValueOf(errors.New(vv)))

	go.pact.im/x/extraio
		count.go#L11: var ErrCounterOverflow = errors.New("extraio: counter overflow")
		hardlimit.go#L10: var ErrExceededReadLimit = errors.New("extraio: exceeded read limit")

	go.pact.im/x/flaky
		debounce.go#L14: var ErrDebounced = errors.New("flaky: debounced")
		schedule.go#L14: 	ErrNoNextSchedule = errors.New("flaky: no next scheduled time")
		schedule.go#L18: 	ErrScheduleDeadline = errors.New("flaky: scheduled time exceeds context deadline")

	go.pact.im/x/goupdate
		flags.go#L22: var errParse = errors.New("parse error")
		workspaces.go#L38: 			return nil, errors.New("no go.work or go.mod files found")

	go.pact.im/x/process
		process.go#L16: var ErrProcessInvalidState = errors.New("process: invalid process state")

	go.pact.im/x/supervisor
		errors.go#L10: 	ErrNotRunning = errors.New("supervisor: not running")
		errors.go#L14: 	ErrProcessNotFound = errors.New("supervisor: process not found")
		errors.go#L18: 	ErrProcessNotRunning = errors.New("supervisor: process is not running")
		errors.go#L22: 	ErrProcessExists = errors.New("supervisor: process already exists")

	go.uber.org/goleak
		leaks.go#L60: 		return errors.New("Cleanup can only be passed to VerifyNone or VerifyTestMain")

	go.uber.org/mock/gomock
		callset.go#L131: 	return nil, errors.New(callsErrors.String())

	go.uber.org/zap
		config.go#L185: 		return nil, errors.New("missing Level")
		encoder.go#L32: 	errNoEncoderNameSpecified = errors.New("no encoder name specified")
		encoder.go#L66: 		return nil, errors.New("missing EncodeTime in EncoderConfig")
		http_handler.go#L112: 		return 0, errors.New("must specify logging level")
		http_handler.go#L129: 		return 0, errors.New("must specify logging level")
		sink.go#L79: 		return errors.New("can't register a sink factory for empty string")
		sink.go#L164: 		return "", errors.New("must start with a letter")

	go.uber.org/zap/zapcore
		level.go#L29: var errUnmarshalNilLevel = errors.New("can't unmarshal a nil *Level")

	go/build
		build.go#L1125: var errNoModules = errors.New("not using modules")
		build.go#L1269: 		return errors.New(errStr)
		build.go#L1548: 	errMultipleGoBuild = errors.New("multiple //go:build comments")
		build.go#L1916: 		err = errors.New("unclosed quote")
		build.go#L1918: 		err = errors.New("unfinished escaping")
		build.go#L2072: 	return "?", errors.New("architecture letter no longer used")
		read.go#L60: 	errSyntax = errors.New("syntax error")
		read.go#L61: 	errNUL    = errors.New("unexpected NUL in input")

	go/build/constraint
		expr.go#L149: var errNotConstraint = errors.New("not a build constraint")
		expr.go#L469: var errComplex = errors.New("expression too complex for // +build lines")

	go/parser
		interface.go#L39: 		return nil, errors.New("invalid source")

	go/types
		instantiate.go#L224: 			return i, errors.New(cause)

	golang.org/x/crypto/blake2b
		blake2b.go#L45: 	errKeySize  = errors.New("blake2b: invalid key size")
		blake2b.go#L46: 	errHashSize = errors.New("blake2b: invalid hash size")
		blake2b.go#L164: 		return nil, errors.New("crypto/blake2b: cannot marshal MACs")
		blake2b.go#L182: 		return errors.New("crypto/blake2b: invalid hash state identifier")
		blake2b.go#L185: 		return errors.New("crypto/blake2b: invalid hash state size")
		blake2x.go#L57: 		return nil, errors.New("blake2b: XOF length too large")

	golang.org/x/net/http2
		databuffer.go#L76: var errReadEmpty = errors.New("read from empty dataBuffer")
		errors.go#L80: var errFromPeer = errors.New("received from peer")
		errors.go#L143: 	errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
		errors.go#L144: 	errPseudoAfterRegular   = errors.New("pseudo header field after regular")
		frame.go#L475: var ErrFrameTooLarge = errors.New("http2: frame too large")
		frame.go#L536: 	fr.errDetail = errors.New(reason)
		frame.go#L635: 	errStreamID    = errors.New("invalid stream ID")
		frame.go#L636: 	errDepStreamID = errors.New("invalid dependent stream ID")
		frame.go#L637: 	errPadLength   = errors.New("pad length too large")
		frame.go#L638: 	errPadBytes    = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
		frame.go#L988: 		return errors.New("illegal window increment value")
		frame.go#L1529: 		return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
		gotrack.go#L111: 		err = errors.New("invalid base " + strconv.Itoa(base))
		pipe.go#L81: 	errClosedPipeWrite        = errors.New("write on closed buffer")
		pipe.go#L82: 	errUninitializedPipeWrite = errors.New("write on uninitialized buffer")
		server.go#L63: 	errClientDisconnected = errors.New("client disconnected")
		server.go#L64: 	errClosedBody         = errors.New("body closed by handler")
		server.go#L65: 	errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
		server.go#L66: 	errStreamClosed       = errors.New("http2: stream closed")
		server.go#L1081: var errPrefaceTimeout = errors.New("timeout waiting for client preface")
		server.go#L1311: var errHandlerPanicked = errors.New("http2: handler panicked")
		server.go#L3021: 		return 0, errors.New("http2: handler wrote more than declared Content-Length")
		server.go#L3041: 	ErrRecursivePush    = errors.New("http2: recursive push not allowed")
		server.go#L3042: 	ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
		server.go#L3090: 			return errors.New("URL must have a host")
		server.go#L3275: 		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
		transport.go#L590: 		return nil, errors.New("http2: unsupported scheme")
		transport.go#L643: 	errClientConnClosed    = errors.New("http2: client conn is closed")
		transport.go#L644: 	errClientConnUnusable  = errors.New("http2: client conn not usable")
		transport.go#L645: 	errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
		transport.go#L743: 		return nil, errors.New("http2: could not negotiate protocol mutually")
		transport.go#L1192: 	err := errors.New("http2: client connection force closed via ClientConn.Close")
		transport.go#L1199: 	err := errors.New("http2: client connection lost")
		transport.go#L1208: var errRequestCanceled = errors.New("net/http: request canceled")
		transport.go#L1723: 	errStopReqBodyWrite = errors.New("http2: aborting request body write")
		transport.go#L1726: 	errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
		transport.go#L1728: 	errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
		transport.go#L1966: var errNilRequestURL = errors.New("http2: Request.URI is nil")
		transport.go#L1984: 		return nil, errors.New("http2: invalid Host header")
		transport.go#L2429: 			Cause:    errors.New("protocol error: headers after END_STREAM"),
		transport.go#L2488: 		return nil, errors.New("malformed response from server: missing status pseudo header")
		transport.go#L2492: 		return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
		transport.go#L2534: 			return nil, errors.New("1xx informational response with END_STREAM flag")
		transport.go#L2539: 			return nil, errors.New("http2: too many 1xx informational responses")
		transport.go#L2646: 				err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
		transport.go#L2686: var errClosedResponseBody = errors.New("http2: response body closed")
		transport.go#L3122: 	errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
		transport.go#L3123: 	errRequestHeaderListSize  = errors.New("http2: request header list larger than peer's advertised limit")

	golang.org/x/net/http2/hpack
		hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
		hpack.go#L238: 		return DecodingError{errors.New("truncated headers")}
		hpack.go#L287: var errNeedMore = errors.New("need more data")
		hpack.go#L334: 	return DecodingError{errors.New("invalid encoding")}
		hpack.go#L416: 		return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
		hpack.go#L425: 		return DecodingError{errors.New("dynamic table size update too large")}
		hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
		huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")

	golang.org/x/text/secure/bidirule
		bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")

	golang.org/x/text/transform
		transform.go#L21: 	ErrShortDst = errors.New("transform: short destination buffer")
		transform.go#L25: 	ErrShortSrc = errors.New("transform: short source buffer")
		transform.go#L29: 	ErrEndOfSpan = errors.New("transform: input and output are not identical")
		transform.go#L33: 	errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
		transform.go#L37: 	errShortInternal = errors.New("transform: short internal buffer")

	golang.org/x/tools/go/packages
		packages.go#L352: 		return nil, errors.New("failed to split patterns into chunks, negative safe argMax value")
		packages.go#L361: 			return nil, errors.New("failed to split patterns into chunks, a pattern is too long")
		packages.go#L382: 	errNotHandled := errors.New("driver returned NotHandled")

	golang.org/x/tools/internal/pkgbits
		decoder.go#L287: var overflow = errors.New("pkgbits: readUvarint overflows a 64-bit integer")

	google.golang.org/grpc
		clientconn.go#L69: 	errConnDrain = errors.New("grpc: the connection is drained")
		clientconn.go#L71: 	errConnClosing = errors.New("grpc: the connection is closing")
		clientconn.go#L82: 	errNoTransportSecurity = errors.New("grpc: no transport security set (use grpc.WithTransportCredentials(insecure.NewCredentials()) explicitly or set credentials)")
		clientconn.go#L85: 	errTransportCredsAndBundle = errors.New("grpc: credentials.Bundle may not be used with individual TransportCredentials")
		clientconn.go#L88: 	errNoTransportCredsInBundle = errors.New("grpc: credentials.Bundle must return non-nil transport credentials")
		clientconn.go#L92: 	errTransportCredentialsMissing = errors.New("grpc: the credentials require transport level security (use grpc.WithTransportCredentials() to set)")
		clientconn.go#L1528: var ErrClientConnTimeout = errors.New("grpc: timed out when dialing")
		pickfirst.go#L81: 		b.ResolverError(errors.New("produced zero addresses"))
		server.go#L753: var ErrServerStopped = errors.New("grpc: the server has been stopped")
		server.go#L945: 	defer st.Close(errors.New("finished serving streams for the server transport"))
		server.go#L1050: 		st.Close(errors.New("Server.addConn called when server has already been stopped"))
		server.go#L1813: 			st.Close(errors.New("Server.Stop called"))
		service_config.go#L182: 	errDuplicatedName             = errors.New("duplicated name")
		service_config.go#L183: 	errEmptyServiceNonEmptyMethod = errors.New("cannot combine empty 'service' and non-empty 'method'")
		stream.go#L1100: 		return toRPCErr(errors.New("grpc: client streaming protocol violation: get <nil>, want <EOF>"))
		stream.go#L1175: 		return nil, errors.New("transport provided is nil")
		stream.go#L1417: 		return toRPCErr(errors.New("grpc: client streaming protocol violation: get <nil>, want <EOF>"))

	google.golang.org/grpc/balancer
		balancer.go#L259: 	ErrNoSubConnAvailable = errors.New("no SubConn is available")
		balancer.go#L266: 	ErrTransientFailure = errors.New("all SubConns are in TransientFailure")
		balancer.go#L386: var ErrBadResolverState = errors.New("bad resolver state")

	google.golang.org/grpc/balancer/base
		balancer.go#L135: 		b.ResolverError(errors.New("produced zero addresses"))

	google.golang.org/grpc/credentials
		credentials.go#L125: var ErrConnDispatched = errors.New("credentials: rawConn is dispatched out of gRPC")
		credentials.go#L249: 		return errors.New("AuthInfo is nil")

	google.golang.org/grpc/internal/balancer/gracefulswitch
		gracefulswitch.go#L33: var errBalancerClosed = errors.New("gracefulSwitchBalancer is closed")

	google.golang.org/grpc/internal/binarylog
		env_config.go#L65: 		return errors.New("empty string is not a valid method binary logging config")

	google.golang.org/grpc/internal/channelz
		funcs.go#L230: 		return nil, errors.New("a SubChannel's parent id cannot be nil")
		funcs.go#L278: 		return nil, errors.New("a ListenSocket's parent id cannot be 0")
		funcs.go#L298: 		return nil, errors.New("a NormalSocket's parent id cannot be 0")

	google.golang.org/grpc/internal/grpcutil
		method.go#L30: 		return "", "", errors.New("invalid method name: should start with /")
		method.go#L36: 		return "", "", errors.New("invalid method name: suffix /method is missing")

	google.golang.org/grpc/internal/resolver/dns
		dns_resolver.go#L73: 	errMissingAddr = errors.New("dns resolver: missing address")
		dns_resolver.go#L79: 	errEndsWithColon = errors.New("dns resolver: missing port after port-separator colon")

	google.golang.org/grpc/internal/resolver/passthrough
		passthrough.go#L35: 		return nil, errors.New("passthrough: received empty target in Build()")

	google.golang.org/grpc/internal/status
		status.go#L107: 		return nil, errors.New("no error details for status with code OK")

	google.golang.org/grpc/internal/transport
		controlbuf.go#L419: 			return nil, errors.New("transport closed by client")
		controlbuf.go#L766: 		return errors.New("finished processing active streams while in draining mode")
		controlbuf.go#L773: 		return errors.New("earlyAbortStream not handled on client")
		controlbuf.go#L801: 			return errors.New("received GOAWAY with no active streams")
		handler_server.go#L56: 		return nil, errors.New(msg)
		handler_server.go#L61: 		return nil, errors.New(msg)
		handler_server.go#L69: 		return nil, errors.New(msg)
		handler_server.go#L74: 		return nil, errors.New(msg)
		handler_server.go#L254: 	ht.Close(errors.New("finished writing status"))
		handler_server.go#L364: 		ht.Close(errors.New("request is done processing"))
		http2_server.go#L907: 		t.controlBuf.put(&goAway{code: http2.ErrCodeEnhanceYourCalm, debugData: []byte("too_many_pings"), closeConn: errors.New("got too many pings from the client")})
		http2_server.go#L1339: 			retErr = errors.New("second GOAWAY written and no active streams left to process")
		transport.go#L48: var ErrNoHeaders = errors.New("stream has no headers")
		transport.go#L770: 	errStreamDone = errors.New("the stream is done")

	google.golang.org/protobuf/internal/errors
		errors.go#L16: var Error = errors.New("protobuf error")

	gotest.tools/v3/assert/cmp
		compare.go#L379: 	stdlibErrorNewType = reflect.TypeOf(errors.New(""))

	gotest.tools/v3/internal/source
		source.go#L24: 		return "", errors.New("failed to find expression")
		source.go#L34: 		return nil, errors.New("failed to get call stack")
		source.go#L93: 		return nil, errors.New("failed to find call expression")
		update.go#L36: 		return errors.New("failed to get call stack")

	hash/crc32
		crc32.go#L185: 		return errors.New("hash/crc32: invalid hash state identifier")
		crc32.go#L188: 		return errors.New("hash/crc32: invalid hash state size")
		crc32.go#L191: 		return errors.New("hash/crc32: tables do not match")

	hash/fnv
		fnv.go#L286: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L289: 		return errors.New("hash/fnv: invalid hash state size")
		fnv.go#L297: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L300: 		return errors.New("hash/fnv: invalid hash state size")
		fnv.go#L308: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L311: 		return errors.New("hash/fnv: invalid hash state size")
		fnv.go#L319: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L322: 		return errors.New("hash/fnv: invalid hash state size")
		fnv.go#L330: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L333: 		return errors.New("hash/fnv: invalid hash state size")
		fnv.go#L342: 		return errors.New("hash/fnv: invalid hash state identifier")
		fnv.go#L345: 		return errors.New("hash/fnv: invalid hash state size")

	internal/filepathlite
		path.go#L18: var errInvalidPath = errors.New("invalid path")

	internal/oserror
		errors.go#L13: 	ErrInvalid    = errors.New("invalid argument")
		errors.go#L14: 	ErrPermission = errors.New("permission denied")
		errors.go#L15: 	ErrExist      = errors.New("file already exists")
		errors.go#L16: 	ErrNotExist   = errors.New("file does not exist")
		errors.go#L17: 	ErrClosed     = errors.New("file already closed")

	internal/poll
		fd.go#L35: var ErrFileClosing = errors.New("use of closed file")
		fd.go#L39: var ErrNoDeadline = errors.New("file type does not support deadline")
		fd.go#L66: var ErrNotPollable = errors.New("not pollable")
		fd_poll_runtime.go#L82: 		return errors.New("waiting for unsupported file type")

	internal/profile
		encode.go#L179: 			return errors.New("string_table[0] must be ''")
		proto.go#L183: 			return 0, nil, errors.New("bad varint")
		proto.go#L209: 			return nil, errors.New("not enough data")
		proto.go#L220: 			return nil, errors.New("too much data")
		proto.go#L226: 			return nil, errors.New("not enough data")
		proto.go#L239: 		return errors.New("type mismatch")

	io
		io.go#L29: var ErrShortWrite = errors.New("short write")
		io.go#L32: var errInvalidWrite = errors.New("invalid write result")
		io.go#L35: var ErrShortBuffer = errors.New("short buffer")
		io.go#L44: var EOF = errors.New("EOF")
		io.go#L48: var ErrUnexpectedEOF = errors.New("unexpected EOF")
		io.go#L53: var ErrNoProgress = errors.New("multiple Read calls return no data or error")
		io.go#L521: var errWhence = errors.New("Seek: invalid whence")
		io.go#L522: var errOffset = errors.New("Seek: invalid offset")
		pipe.go#L36: var ErrClosedPipe = errors.New("io: read/write on closed pipe")

	io/fs
		readdir.go#L42: 		return nil, &PathError{Op: "readdir", Path: name, Err: errors.New("not implemented")}
		sub.go#L122: 			return nil, errors.New("invalid result from inner fsys Glob: " + name + " not in " + f.dir) // can't use fmt in this package
		walk.go#L15: var SkipDir = errors.New("skip this directory")
		walk.go#L20: var SkipAll = errors.New("skip everything and stop the walk")

	math/big
		floatmarsh.go#L72: 		return errors.New("Float.GobDecode: buffer too small")
		floatmarsh.go#L91: 			return errors.New("Float.GobDecode: buffer too small for finite form float")
		floatmarsh.go#L103: 		return errors.New("Float.GobDecode: " + msg)
		intconv.go#L251: 		return errors.New("Int.Scan: invalid verb")
		natconv.go#L60: 	errNoDigits = errors.New("number has no digits")
		natconv.go#L61: 	errInvalSep = errors.New("'_' must separate successive digits")
		ratconv.go#L32: 		return errors.New("Rat.Scan: invalid verb")
		ratconv.go#L35: 		return errors.New("Rat.Scan: invalid syntax")
		ratmarsh.go#L30: 		return nil, errors.New("Rat.GobEncode: numerator too large")
		ratmarsh.go#L50: 		return errors.New("Rat.GobDecode: buffer too small")
		ratmarsh.go#L59: 		return errors.New("Rat.GobDecode: invalid length")
		ratmarsh.go#L63: 		return errors.New("Rat.GobDecode: buffer too small")

	math/rand/v2
		chacha8.go#L80: 			return errors.New("invalid ChaCha8 Read buffer encoding")
		pcg.go#L47: var errUnmarshalPCG = errors.New("invalid PCG encoding")

	mellium.im/sasl
		mechanism.go#L16: 	ErrInvalidState     = errors.New("invalid state")
		mechanism.go#L17: 	ErrInvalidChallenge = errors.New("invalid or missing challenge")
		mechanism.go#L18: 	ErrAuthn            = errors.New("authentication error")
		mechanism.go#L19: 	ErrTooManySteps     = errors.New("step called too many times")
		scram.go#L150: 				err = errors.New("server sent reserved attribute `m'")
		scram.go#L160: 			err = errors.New("iteration count is invalid")
		scram.go#L163: 			err = errors.New("server nonce does not match client nonce")
		scram.go#L166: 			err = errors.New("server sent empty salt")
		scram.go#L175: 			err = errors.New("sasl: SCRAM with channel binding requires a TLS connection")
		scram.go#L183: 				err = errors.New("sasl: SCRAM with channel binding requires valid TLS keying material")
		scram.go#L193: 				err = errors.New("sasl: SCRAM with channel binding requires valid tls-unique data")

	mime
		encodedword.go#L29: 	errInvalidWord = errors.New("mime: invalid RFC 2047 encoded-word")
		mediatype.go#L101: 		return errors.New("mime: no media type")
		mediatype.go#L107: 		return errors.New("mime: expected slash after first token")
		mediatype.go#L111: 		return errors.New("mime: expected token after slash")
		mediatype.go#L114: 		return errors.New("mime: unexpected content after media subtype")
		mediatype.go#L122: var ErrInvalidMediaParameter = errors.New("mime: invalid media parameter")
		mediatype.go#L180: 			return "", nil, errors.New("mime: duplicate parameter name")

	mime/multipart
		formdata.go#L20: var ErrMessageTooLarge = errors.New("multipart: message too large")
		writer.go#L48: 		return errors.New("mime: SetBoundary called after write")
		writer.go#L52: 		return errors.New("mime: invalid boundary length")
		writer.go#L67: 		return errors.New("mime: invalid boundary character")
		writer.go#L190: 		return 0, errors.New("multipart: can't write to finished part")

	net
		cgo_unix.go#L339: 		return nil, errors.New("res_ninit failure: " + err.Error())
		cgo_unix.go#L364: 			return nil, errors.New("res_nsearch failure")
		dnsclient_unix.go#L43: 	errLameReferral              = errors.New("lame referral")
		dnsclient_unix.go#L44: 	errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message")
		dnsclient_unix.go#L45: 	errCannotMarshalDNSMessage   = errors.New("cannot marshal DNS message")
		dnsclient_unix.go#L46: 	errServerMisbehaving         = errors.New("server misbehaving")
		dnsclient_unix.go#L47: 	errInvalidDNSResponse        = errors.New("invalid DNS response")
		dnsclient_unix.go#L48: 	errNoAnswerFromDNSServer     = errors.New("no answer from DNS server")
		interface.go#L32: 	errInvalidInterface         = errors.New("invalid network interface")
		interface.go#L33: 	errInvalidInterfaceIndex    = errors.New("invalid network interface index")
		interface.go#L34: 	errInvalidInterfaceName     = errors.New("invalid network interface name")
		interface.go#L35: 	errNoSuchInterface          = errors.New("no such network interface")
		interface.go#L36: 	errNoSuchMulticastInterface = errors.New("no such multicast network interface")
		lookup.go#L904: 		return "", errors.New("no CNAME record received")
		lookup.go#L908: 		return "", errors.New("could not parse CNAME record")
		net.go#L433: 	errNoSuitableAddress = errors.New("no suitable address found")
		net.go#L436: 	errMissingAddress = errors.New("missing address")
		net.go#L440: 	ErrWriteToConnected = errors.New("use of WriteTo with pre-connected connection")
		nss.go#L174: 			conf.err = errors.New("no colon on line")
		nss.go#L198: 					conf.err = errors.New("unclosed criterion bracket")
		nss.go#L204: 					conf.err = errors.New("invalid criteria: " + srcs[1:bclose])
		nss.go#L230: 			return errors.New("criterion too short")
		nss.go#L234: 			return errors.New("criterion lacks equal sign")
		unixsock_posix.go#L42: 		return nil, errors.New("unknown mode: " + mode)

	net/http
		client.go#L207: var ErrSchemeMismatch = errors.New("http: server gave HTTP response to HTTPS client")
		client.go#L216: 		return nil, alwaysFalse, errors.New("http: no Client.Transport or DefaultTransport")
		client.go#L221: 		return nil, alwaysFalse, errors.New("http: nil Request.URL")
		client.go#L226: 		return nil, alwaysFalse, errors.New("http: Request.RequestURI can't be set in client requests")
		client.go#L493: var ErrUseLastResponse = errors.New("net/http: use last response")
		client.go#L600: 			Err: errors.New("http: nil Request.URL"),
		client.go#L821: 		return errors.New("stopped after 10 redirects")
		cookie.go#L61: 	errBlankCookie           = errors.New("http: blank cookie")
		cookie.go#L62: 	errEqualNotFoundInCookie = errors.New("http: '=' not found in cookie")
		cookie.go#L63: 	errInvalidCookieName     = errors.New("http: invalid cookie name")
		cookie.go#L64: 	errInvalidCookieValue    = errors.New("http: invalid cookie value")
		cookie.go#L296: 		return errors.New("http: nil Cookie")
		cookie.go#L299: 		return errors.New("http: invalid Cookie.Name")
		cookie.go#L302: 		return errors.New("http: invalid Cookie.Expires")
		cookie.go#L318: 			return errors.New("http: invalid Cookie.Domain")
		cookie.go#L323: 			return errors.New("http: partitioned cookies must be set with Secure")
		fs.go#L79: 		return nil, errors.New("http: invalid or unsafe file path")
		fs.go#L259: var errSeeker = errors.New("seeker can't seek")
		fs.go#L263: var errNoOverlap = errors.New("invalid range: failed to overlap")
		fs.go#L898: var errMissingSeek = errors.New("io.File missing Seek method")
		fs.go#L899: var errMissingReadDir = errors.New("io.File directory missing ReadDir method")
		fs.go#L1013: 		return nil, errors.New("invalid range")
		fs.go#L1024: 			return nil, errors.New("invalid range")
		fs.go#L1035: 				return nil, errors.New("invalid range")
		fs.go#L1039: 				return nil, errors.New("invalid range")
		fs.go#L1049: 				return nil, errors.New("invalid range")
		fs.go#L1064: 					return nil, errors.New("invalid range")
		h2_bundle.go#L1264: var http2errReadEmpty = errors.New("read from empty dataBuffer")
		h2_bundle.go#L1409: var http2errFromPeer = errors.New("received from peer")
		h2_bundle.go#L1472: 	http2errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
		h2_bundle.go#L1473: 	http2errPseudoAfterRegular   = errors.New("pseudo header field after regular")
		h2_bundle.go#L2046: var http2ErrFrameTooLarge = errors.New("http2: frame too large")
		h2_bundle.go#L2107: 	fr.errDetail = errors.New(reason)
		h2_bundle.go#L2206: 	http2errStreamID    = errors.New("invalid stream ID")
		h2_bundle.go#L2207: 	http2errDepStreamID = errors.New("invalid dependent stream ID")
		h2_bundle.go#L2208: 	http2errPadLength   = errors.New("pad length too large")
		h2_bundle.go#L2209: 	http2errPadBytes    = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
		h2_bundle.go#L2559: 		return errors.New("illegal window increment value")
		h2_bundle.go#L3100: 		return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
		h2_bundle.go#L3355: 		err = errors.New("invalid base " + strconv.Itoa(base))
		h2_bundle.go#L3998: 	http2errClosedPipeWrite        = errors.New("write on closed buffer")
		h2_bundle.go#L3999: 	http2errUninitializedPipeWrite = errors.New("write on uninitialized buffer")
		h2_bundle.go#L4116: 	http2errClientDisconnected = errors.New("client disconnected")
		h2_bundle.go#L4117: 	http2errClosedBody         = errors.New("body closed by handler")
		h2_bundle.go#L4118: 	http2errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
		h2_bundle.go#L4119: 	http2errStreamClosed       = errors.New("http2: stream closed")
		h2_bundle.go#L5174: var http2errPrefaceTimeout = errors.New("timeout waiting for client preface")
		h2_bundle.go#L5404: var http2errHandlerPanicked = errors.New("http2: handler panicked")
		h2_bundle.go#L7141: 		return 0, errors.New("http2: handler wrote more than declared Content-Length")
		h2_bundle.go#L7161: 	http2ErrRecursivePush    = errors.New("http2: recursive push not allowed")
		h2_bundle.go#L7162: 	http2ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
		h2_bundle.go#L7210: 			return errors.New("URL must have a host")
		h2_bundle.go#L7395: 		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
		h2_bundle.go#L8048: 			return nil, errors.New("http2: unencrypted HTTP/2 not enabled")
		h2_bundle.go#L8051: 		return nil, errors.New("http2: unsupported scheme")
		h2_bundle.go#L8120: 	http2errClientConnClosed         = errors.New("http2: client conn is closed")
		h2_bundle.go#L8121: 	http2errClientConnUnusable       = errors.New("http2: client conn not usable")
		h2_bundle.go#L8122: 	http2errClientConnNotEstablished = errors.New("http2: client conn could not be established")
		h2_bundle.go#L8123: 	http2errClientConnGotGoAway      = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
		h2_bundle.go#L8221: 		return nil, errors.New("http2: could not negotiate protocol mutually")
		h2_bundle.go#L8679: 	err := errors.New("http2: client connection force closed via ClientConn.Close")
		h2_bundle.go#L8686: 	err := errors.New("http2: client connection lost")
		h2_bundle.go#L8695: var http2errRequestCanceled = errors.New("net/http: request canceled")
		h2_bundle.go#L8905: var http2errExtendedConnectNotSupported = errors.New("net/http: extended connect not supported by peer")
		h2_bundle.go#L9265: 	http2errStopReqBodyWrite = errors.New("http2: aborting request body write")
		h2_bundle.go#L9268: 	http2errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
		h2_bundle.go#L9270: 	http2errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
		h2_bundle.go#L9509: var http2errNilRequestURL = errors.New("http2: Request.URI is nil")
		h2_bundle.go#L9527: 		return nil, errors.New("http2: invalid Host header")
		h2_bundle.go#L9536: 		return nil, errors.New("http2: invalid :protocol header in non-CONNECT request")
		h2_bundle.go#L10007: 			Cause:    errors.New("protocol error: headers after END_STREAM"),
		h2_bundle.go#L10066: 		return nil, errors.New("malformed response from server: missing status pseudo header")
		h2_bundle.go#L10070: 		return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
		h2_bundle.go#L10112: 			return nil, errors.New("1xx informational response with END_STREAM flag")
		h2_bundle.go#L10140: 				return nil, errors.New("header list too large")
		h2_bundle.go#L10243: 				err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
		h2_bundle.go#L10283: var http2errClosedResponseBody = errors.New("http2: response body closed")
		h2_bundle.go#L10761: 	http2errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
		h2_bundle.go#L10762: 	http2errRequestHeaderListSize  = errors.New("http2: request header list larger than peer's advertised limit")
		h2_bundle.go#L10996: 		return nil, errors.New("http2: TLS conn unexpectedly found in unencrypted handoff")
		pattern.go#L86: 		return nil, errors.New("empty pattern")
		pattern.go#L113: 		return nil, errors.New("host/path missing /")
		pattern.go#L119: 		return nil, errors.New("host contains '{' (missing initial '/'?)")
		pattern.go#L127: 		return nil, errors.New("non-CONNECT pattern with unclean path can never match")
		pattern.go#L153: 				return nil, errors.New("bad wildcard segment (must start with '{')")
		pattern.go#L156: 				return nil, errors.New("bad wildcard segment (must end with '}')")
		pattern.go#L161: 					return nil, errors.New("{$} not at end")
		pattern.go#L168: 				return nil, errors.New("{...} wildcard not at end")
		pattern.go#L171: 				return nil, errors.New("empty wildcard")
		request.go#L41: var ErrMissingFile = errors.New("http: no such file")
		request.go#L442: var ErrNoCookie = errors.New("http: named cookie not present")
		request.go#L499: 		return nil, errors.New("http: MultipartReader called twice")
		request.go#L502: 		return nil, errors.New("http: multipart handled by ParseMultipartForm")
		request.go#L514: 		return nil, errors.New("missing form body")
		request.go#L577: var errMissingHost = errors.New("http: Request.Write on Request with no Host or URL set")
		request.go#L637: 			return errors.New("http: invalid Host header")
		request.go#L657: 		return errors.New("net/http: can't write control character in Request.URL")
		request.go#L900: 		return nil, errors.New("net/http: nil Context")
		request.go#L1265: 		err = errors.New("missing form body")
		request.go#L1291: 			err = errors.New("http: POST too large")
		request.go#L1372: 		return errors.New("http: multipart handled by MultipartReader")
		request.go#L1448: 		return nil, nil, errors.New("http: multipart handled by MultipartReader")
		response.go#L131: var ErrNoLocation = errors.New("http: no Location header in response")
		server.go#L43: 	ErrBodyNotAllowed = errors.New("http: request method or response status code does not allow body")
		server.go#L50: 	ErrHijacked = errors.New("http: connection has been hijacked")
		server.go#L56: 	ErrContentLength = errors.New("http: wrote more than the declared Content-Length")
		server.go#L61: 	ErrWriteAfterFlush = errors.New("unused")
		server.go#L1016: var errTooLarge = errors.New("http: request too large")
		server.go#L1917: var ErrAbortHandler = errors.New("net/http: abort Handler")
		server.go#L2878: 		return errors.New("http: invalid pattern")
		server.go#L2881: 		return errors.New("http: nil handler")
		server.go#L2884: 		return errors.New("http: nil handler")
		server.go#L3382: var ErrServerClosed = errors.New("http: Server closed")
		server.go#L3787: var ErrHandlerTimeout = errors.New("http: Handler timeout")
		socks_bundle.go#L63: 			return nil, errors.New("too many authentication methods")
		socks_bundle.go#L78: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L82: 		return nil, errors.New("no acceptable authentication methods")
		socks_bundle.go#L100: 			return nil, errors.New("unknown address type")
		socks_bundle.go#L104: 			return nil, errors.New("FQDN too long")
		socks_bundle.go#L119: 		return nil, errors.New("unexpected protocol version " + strconv.Itoa(int(b[0])))
		socks_bundle.go#L122: 		return nil, errors.New("unknown error " + cmdErr.String())
		socks_bundle.go#L125: 		return nil, errors.New("non-zero reserved field")
		socks_bundle.go#L142: 		return nil, errors.New("unknown address type " + strconv.Itoa(int(b[3])))
		socks_bundle.go#L171: 		return "", 0, errors.New("port number out of range " + port)
		socks_bundle.go#L314: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L350: 		return nil, &net.OpError{Op: d.cmd.String(), Net: network, Source: proxy, Addr: dst, Err: errors.New("nil context")}
		socks_bundle.go#L393: 		return errors.New("network not implemented")
		socks_bundle.go#L398: 		return errors.New("command not implemented")
		socks_bundle.go#L449: 			return errors.New("invalid username/password")
		socks_bundle.go#L465: 			return errors.New("invalid username/password version")
		socks_bundle.go#L468: 			return errors.New("username/password authentication failed")
		socks_bundle.go#L472: 	return errors.New("unsupported authentication method " + strconv.Itoa(int(auth)))
		transfer.go#L829: var ErrBodyReadAfterClose = errors.New("http: invalid Read on closed Body")
		transfer.go#L909: var errTrailerEOF = errors.New("http: unexpected EOF reading trailer")
		transfer.go#L934: 		return errors.New("http: suspiciously long trailer after chunked body")
		transport.go#L589: 		return nil, errors.New("http: nil Request.URL")
		transport.go#L593: 		return nil, errors.New("http: nil Request.Header")
		transport.go#L634: 		return nil, errors.New("http: no Host in request URL")
		transport.go#L751: var errCannotRewind = errors.New("net/http: cannot rewind body after connection loss")
		transport.go#L856: var ErrSkipAltProtocol = errors.New("net/http: skip alternate protocol")
		transport.go#L1000: 	errKeepAlivesDisabled = errors.New("http: putIdleConn: keep alives disabled")
		transport.go#L1001: 	errConnBroken         = errors.New("http: putIdleConn: connection is in bad state")
		transport.go#L1002: 	errCloseIdle          = errors.New("http: putIdleConn: CloseIdleConnections was called")
		transport.go#L1003: 	errTooManyIdle        = errors.New("http: putIdleConn: too many idle connections")
		transport.go#L1004: 	errTooManyIdleHost    = errors.New("http: putIdleConn: too many idle connections for host")
		transport.go#L1005: 	errCloseIdleConns     = errors.New("http: CloseIdleConnections called")
		transport.go#L1006: 	errReadLoopExiting    = errors.New("http: persistConn.readLoop exiting")
		transport.go#L1007: 	errIdleConnTimeout    = errors.New("http: idle connection timeout")
		transport.go#L1013: 	errServerClosedIdle = errors.New("http: server closed idle connection")
		transport.go#L1280: 			err = errors.New("net/http: Transport.DialContext hook returned (nil, nil)")
		transport.go#L1287: 			err = errors.New("net/http: Transport.Dial hook returned (nil, nil)")
		transport.go#L1475: 		err = errors.New("net/http: Transport.DialTLS or DialTLSContext returned (nil, nil)")
		transport.go#L1900: 				return nil, errors.New("unknown status code")
		transport.go#L1902: 			return nil, errors.New(text)
		transport.go#L1920: 			return nil, errors.New("http: Transport does not support unencrypted HTTP/2")
		transport.go#L2237: var errCallerOwnsConn = errors.New("read loop ending; caller owns writable underlying conn")
		transport.go#L2720: var errRequestCanceledConn = errors.New("net/http: request canceled while waiting for connection") // TODO: unify?
		transport.go#L2724: var errRequestDone = errors.New("net/http: request completed")
		transport.go#L2971: var errReadOnClosedResBody = errors.New("http: read on closed response body")

	net/http/httputil
		dump.go#L290: var errNoBody = errors.New("sentinel error value")
		persist.go#L30: var errClosed = errors.New("i/o operation on closed connection")
		persist.go#L203: 		return errors.New("persist server pipe count")
		reverseproxy.go#L382: 		p.getErrorHandler()(rw, req, errors.New("ReverseProxy must have exactly one of Director or Rewrite set"))

	net/http/internal
		chunked.go#L21: var ErrLineTooLong = errors.New("header line too long")
		chunked.go#L81: 		cr.err = errors.New("chunked encoding contains too much non-data")
		chunked.go#L108: 					cr.err = errors.New("malformed chunked encoding")
		chunked.go#L174: 		return nil, errors.New("chunked line ends with bare LF")
		chunked.go#L176: 		return nil, errors.New("invalid CR in chunked line")
		chunked.go#L280: 		return 0, errors.New("empty hex number for chunk length")
		chunked.go#L291: 			return 0, errors.New("invalid byte in chunk length")
		chunked.go#L294: 			return 0, errors.New("http chunk length too large")

	net/netip
		netip.go#L679: 		return Prefix{}, errors.New("negative Prefix bits")
		netip.go#L687: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv4")
		netip.go#L692: 			return Prefix{}, errors.New("prefix length " + itoa.Itoa(b) + " too large for IPv6")
		netip.go#L1065: 	return errors.New("unexpected slice size")
		netip.go#L1092: 		return "", "", false, errors.New("not an ip:port")
		netip.go#L1097: 		return "", "", false, errors.New("no IP")
		netip.go#L1100: 		return "", "", false, errors.New("no port")
		netip.go#L1104: 			return "", "", false, errors.New("missing ]")
		netip.go#L1125: 		return ipp, errors.New("invalid port " + strconv.Quote(port) + " parsing " + strconv.Quote(s))
		netip.go#L1133: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", square brackets can only be used with IPv6 addresses")
		netip.go#L1135: 		return AddrPort{}, errors.New("invalid ip:port " + strconv.Quote(s) + ", IPv6 addresses must be surrounded by square brackets")
		netip.go#L1273: 		return errors.New("unexpected slice size")
		netip.go#L1578: 		return errors.New("unexpected slice size")

	net/textproto
		reader.go#L22: var errMessageTooLarge = errors.New("message too large")

	net/url
		url.go#L457: 				return "", "", errors.New("missing protocol scheme")
		url.go#L513: 		return nil, errors.New("net/url: invalid control character in URL")
		url.go#L517: 		return nil, errors.New("empty url")
		url.go#L547: 			return nil, errors.New("invalid URI for request")
		url.go#L558: 			return nil, errors.New("first path segment in URL cannot contain colon")
		url.go#L603: 		return nil, "", errors.New("net/url: invalid userinfo")
		url.go#L631: 			return "", errors.New("missing ']' in host")

	os
		exec.go#L18: var ErrProcessDone = errors.New("os: process already finished")
		exec_unix.go#L84: 		return errors.New("os: unsupported signal type")
		exec_unix.go#L102: 		return errors.New("os: process already released")
		exec_unix.go#L105: 		return errors.New("os: process not initialized")
		exec_unix.go#L115: 		return errors.New("os: process already released")
		executable_procfs.go#L19: 		return "", errors.New("Executable not implemented for " + runtime.GOOS)
		file.go#L138: 		return 0, &PathError{Op: "readat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L212: var errWriteAtInAppendMode = errors.New("os: invalid use of WriteAt on file opened with O_APPEND")
		file.go#L228: 		return 0, &PathError{Op: "writeat", Path: f.name, Err: errors.New("negative offset")}
		file.go#L401: var errPathEscapes = errors.New("path escapes from parent")
		file.go#L494: 			return "", errors.New("%LocalAppData% is not defined")
		file.go#L500: 			return "", errors.New("$HOME is not defined")
		file.go#L507: 			return "", errors.New("$home is not defined")
		file.go#L516: 				return "", errors.New("neither $XDG_CACHE_HOME nor $HOME are defined")
		file.go#L520: 			return "", errors.New("path in $XDG_CACHE_HOME is relative")
		file.go#L547: 			return "", errors.New("%AppData% is not defined")
		file.go#L553: 			return "", errors.New("$HOME is not defined")
		file.go#L560: 			return "", errors.New("$home is not defined")
		file.go#L569: 				return "", errors.New("neither $XDG_CONFIG_HOME nor $HOME are defined")
		file.go#L573: 			return "", errors.New("path in $XDG_CONFIG_HOME is relative")
		file.go#L606: 	return "", errors.New(enverr + " is not defined")
		file.go#L783: 		return "", errors.New("os: DirFS with empty root")
		pidfd_linux.go#L127: 		return errors.New("os: process already released")
		root.go#L112: 		return nil, &PathError{Op: "openat", Path: name, Err: errors.New("unsupported file mode")}
		root.go#L138: 		return &PathError{Op: "mkdirat", Path: name, Err: errors.New("unsupported file mode")}
		root.go#L192: 		return nil, "", errors.New("empty path")
		root_unix.go#L42: 		return nil, &PathError{Op: "open", Path: name, Err: errors.New("not a directory")}
		tempfile.go#L60: var errPatternHasSeparator = errors.New("pattern contains path separator")

	os/exec
		exec.go#L127: var ErrWaitDelay = errors.New("exec: WaitDelay expired before I/O complete")
		exec.go#L639: 		return errors.New("exec: already started")
		exec.go#L654: 		c.Err = errors.New("exec: no command")
		exec.go#L692: 		return errors.New("exec: command with a non-nil Cancel was not created with CommandContext")
		exec.go#L916: 		return errors.New("exec: not started")
		exec.go#L919: 		return errors.New("exec: Wait was already called")
		exec.go#L1008: 		return nil, errors.New("exec: Stdout already set")
		exec.go#L1031: 		return nil, errors.New("exec: Stdout already set")
		exec.go#L1034: 		return nil, errors.New("exec: Stderr already set")
		exec.go#L1051: 		return nil, errors.New("exec: Stdin already set")
		exec.go#L1054: 		return nil, errors.New("exec: StdinPipe after process started")
		exec.go#L1076: 		return nil, errors.New("exec: Stdout already set")
		exec.go#L1079: 		return nil, errors.New("exec: StdoutPipe after process started")
		exec.go#L1101: 		return nil, errors.New("exec: Stderr already set")
		exec.go#L1104: 		return nil, errors.New("exec: StderrPipe after process started")
		exec.go#L1262: 			err = errors.New("exec: environment variable contains NUL")
		exec.go#L1330: var ErrDot = errors.New("cannot run executable found relative to current directory")
		lp_unix.go#L20: var ErrNotFound = errors.New("executable file not found in $PATH")

	path
		match.go#L14: var ErrBadPattern = errors.New("syntax error in pattern")

	path/filepath
		match.go#L18: var ErrBadPattern = errors.New("syntax error in pattern")
		path.go#L205: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		path.go#L231: 		return "", errors.New("Rel: can't make " + targpath + " relative to " + basepath)
		symlink.go#L101: 			return "", errors.New("EvalSymlinks: too many links")

	reflect
		value.go#L1335: 					return Value{}, errors.New("reflect: indirection through nil pointer to embedded struct field " + nameFor(v.typ().Elem()))

	runtime/pprof
		elf.go#L15: 	errBadELF    = errors.New("malformed ELF binary")
		elf.go#L16: 	errNoBuildID = errors.New("no NT_GNU_BUILD_ID found in ELF binary")
		proto_other.go#L29: 	return 0, 0, "", "", errors.New("not implemented")

	strconv
		atoi.go#L21: var ErrRange = errors.New("value out of range")
		atoi.go#L24: var ErrSyntax = errors.New("invalid syntax")
		atoi.go#L56: 	return &NumError{fn, stringslite.Clone(str), errors.New("invalid base " + Itoa(base))}
		atoi.go#L60: 	return &NumError{fn, stringslite.Clone(str), errors.New("invalid bit size " + Itoa(bitSize))}

	strings
		reader.go#L53: 		return 0, errors.New("strings.Reader.ReadAt: negative offset")
		reader.go#L79: 		return errors.New("strings.Reader.UnreadByte: at beginning of string")
		reader.go#L105: 		return errors.New("strings.Reader.UnreadRune: at beginning of string")
		reader.go#L108: 		return errors.New("strings.Reader.UnreadRune: previous operation was not ReadRune")
		reader.go#L127: 		return 0, errors.New("strings.Reader.Seek: invalid whence")
		reader.go#L130: 		return 0, errors.New("strings.Reader.Seek: negative position")

	syscall
		exec_linux.go#L796: 		return errpkg.New("clone(CLONE_PIDFD) failed to return pidfd")
		exec_unix.go#L193: 		return 0, errorspkg.New("both Setctty and Foreground set in SysProcAttr")
		exec_unix.go#L196: 		return 0, errorspkg.New("Setctty set but Ctty not valid in child")

	testing
		fuzz.go#L391: 				return errors.New(buf.String())
		testing.go#L1640: var errNilPanicOrGoexit = errors.New("test executed panic(nil) or runtime.Goexit")
		testing.go#L1943: var errMain = errors.New("testing: unexpected use of func Main")

	testing/iotest
		reader.go#L74: var ErrTimeout = errors.New("timeout")

	text/template
		exec.go#L255: 	walkBreak    = errors.New("break")
		exec.go#L256: 	walkContinue = errors.New("continue")
		funcs.go#L411: 	errBadComparisonType = errors.New("invalid type for comparison")
		funcs.go#L412: 	errBadComparison     = errors.New("incompatible types for comparison")
		funcs.go#L413: 	errNoComparison      = errors.New("missing argument for comparison")

	time
		format.go#L468: var errAtoi = errors.New("time: invalid number")
		format.go#L838: var errBad = errors.New("bad value for field") // placeholder not passed to user
		format.go#L1551: var errLeadingInt = errors.New("time: bad [0-9]*") // never printed
		format.go#L1640: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1652: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1658: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1672: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1684: 			return 0, errors.New("time: missing unit in duration " + quote(orig))
		format.go#L1690: 			return 0, errors.New("time: unknown unit " + quote(u) + " in duration " + quote(orig))
		format.go#L1694: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1703: 				return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1708: 			return 0, errors.New("time: invalid duration " + quote(orig))
		format.go#L1715: 		return 0, errors.New("time: invalid duration " + quote(orig))
		format_rfc3339.go#L72: 		return b, errors.New("year outside of range [0,9999]")
		format_rfc3339.go#L76: 			return b, errors.New("timezone hour outside of range [0,23]")
		sys_unix.go#L55: 				return errors.New("short read")
		time.go#L1479: 			return b, errors.New("Time.MarshalBinary: unexpected zone offset")
		time.go#L1522: 		return errors.New("Time.UnmarshalBinary: no data")
		time.go#L1527: 		return errors.New("Time.UnmarshalBinary: unsupported version")
		time.go#L1535: 		return errors.New("Time.UnmarshalBinary: invalid length")
		time.go#L1590: 		return nil, errors.New("Time.MarshalJSON: " + err.Error())
		time.go#L1603: 		return errors.New("Time.UnmarshalJSON: input is not a JSON string")
		time.go#L1614: 		return nil, errors.New(errPrefix + err.Error())
		zoneinfo.go#L643: var errLocation = errors.New("time: invalid location name")
		zoneinfo_read.go#L112: var errBadData = errors.New("malformed time zone information")
		zoneinfo_read.go#L421: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L429: 		return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L471: 			return nil, errors.New("unsupported compression for " + name + " in " + zipfile)
		zoneinfo_read.go#L496: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L502: 			return nil, errors.New("corrupt zip file " + zipfile)
		zoneinfo_read.go#L568: 	return nil, errors.New("unknown time zone " + name)

	vendor/golang.org/x/crypto/chacha20
		chacha_generic.go#L82: 		return nil, errors.New("chacha20: wrong key size")
		chacha_generic.go#L93: 		return nil, errors.New("chacha20: wrong nonce size")
		chacha_generic.go#L354: 		return nil, errors.New("chacha20: wrong HChaCha20 key size")
		chacha_generic.go#L357: 		return nil, errors.New("chacha20: wrong HChaCha20 nonce size")

	vendor/golang.org/x/crypto/chacha20poly1305
		chacha20poly1305.go#L42: 		return nil, errors.New("chacha20poly1305: bad key length")
		chacha20poly1305.go#L69: var errOpen = errors.New("chacha20poly1305: message authentication failed")
		xchacha20poly1305.go#L26: 		return nil, errors.New("chacha20poly1305: bad key length")

	vendor/golang.org/x/crypto/cryptobyte
		builder.go#L244: 			b.err = errors.New("pending ASN.1 child too long")
		builder.go#L302: 		b.err = errors.New("cryptobyte: length overflow")
		builder.go#L305: 		b.err = errors.New("cryptobyte: Builder is exceeding its fixed-size buffer")

	vendor/golang.org/x/net/dns/dnsmessage
		message.go#L252: 	ErrNotStarted = errors.New("parsing/packing of this type isn't available yet")
		message.go#L256: 	ErrSectionDone = errors.New("parsing/packing of this section has completed")
		message.go#L258: 	errBaseLen            = errors.New("insufficient data for base length type")
		message.go#L259: 	errCalcLen            = errors.New("insufficient data for calculated length type")
		message.go#L260: 	errReserved           = errors.New("segment prefix is reserved")
		message.go#L261: 	errTooManyPtr         = errors.New("too many pointers (>10)")
		message.go#L262: 	errInvalidPtr         = errors.New("invalid pointer")
		message.go#L263: 	errInvalidName        = errors.New("invalid dns name")
		message.go#L264: 	errNilResouceBody     = errors.New("nil resource body")
		message.go#L265: 	errResourceLen        = errors.New("insufficient data for resource body length")
		message.go#L266: 	errSegTooLong         = errors.New("segment length too long")
		message.go#L267: 	errNameTooLong        = errors.New("name too long")
		message.go#L268: 	errZeroSegLen         = errors.New("zero length segment")
		message.go#L269: 	errResTooLong         = errors.New("resource length too long")
		message.go#L270: 	errTooManyQuestions   = errors.New("too many Questions to pack (>65535)")
		message.go#L271: 	errTooManyAnswers     = errors.New("too many Answers to pack (>65535)")
		message.go#L272: 	errTooManyAuthorities = errors.New("too many Authorities to pack (>65535)")
		message.go#L273: 	errTooManyAdditionals = errors.New("too many Additionals to pack (>65535)")
		message.go#L274: 	errNonCanonicalName   = errors.New("name is not in canonical format (it must end with a .)")
		message.go#L275: 	errStringTooLong      = errors.New("character string exceeds maximum length (255)")

	vendor/golang.org/x/net/http/httpproxy
		proxy.go#L134: 			return nil, errors.New("refusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxy")

	vendor/golang.org/x/net/http2/hpack
		hpack.go#L116: var ErrStringLength = errors.New("hpack: string too long")
		hpack.go#L238: 		return DecodingError{errors.New("truncated headers")}
		hpack.go#L287: var errNeedMore = errors.New("need more data")
		hpack.go#L334: 	return DecodingError{errors.New("invalid encoding")}
		hpack.go#L416: 		return DecodingError{errors.New("dynamic table size update MUST occur at the beginning of a header block")}
		hpack.go#L425: 		return DecodingError{errors.New("dynamic table size update too large")}
		hpack.go#L432: var errVarintOverflow = DecodingError{errors.New("varint integer overflow")}
		huffman.go#L44: var ErrInvalidHuffman = errors.New("hpack: invalid Huffman-encoded data")

	vendor/golang.org/x/text/secure/bidirule
		bidirule.go#L46: var ErrInvalid = errors.New("bidirule: failed Bidi Rule")

	vendor/golang.org/x/text/transform
		transform.go#L21: 	ErrShortDst = errors.New("transform: short destination buffer")
		transform.go#L25: 	ErrShortSrc = errors.New("transform: short source buffer")
		transform.go#L29: 	ErrEndOfSpan = errors.New("transform: input and output are not identical")
		transform.go#L33: 	errInconsistentByteCount = errors.New("transform: inconsistent byte count returned")
		transform.go#L37: 	errShortInternal = errors.New("transform: short internal buffer")