diff --git a/src/node_crypto.cc b/src/node_crypto.cc index fa4c1e97669..d86a15fbfa6 100644 --- a/src/node_crypto.cc +++ b/src/node_crypto.cc @@ -1015,7 +1015,7 @@ Handle Connection::EncIn(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } int bytes_written = BIO_write(ss->bio_read_, buffer_data + off, len); @@ -1054,7 +1054,7 @@ Handle Connection::ClearOut(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } if (!SSL_is_init_finished(ss->ssl_)) { @@ -1127,7 +1127,7 @@ Handle Connection::EncOut(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } int bytes_read = BIO_read(ss->bio_write_, buffer_data + off, len); @@ -1167,7 +1167,7 @@ Handle Connection::ClearIn(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } if (!SSL_is_init_finished(ss->ssl_)) { diff --git a/src/node_file.cc b/src/node_file.cc index 6febc5768bc..60c094b243a 100644 --- a/src/node_file.cc +++ b/src/node_file.cc @@ -730,7 +730,7 @@ static Handle Write(const Arguments& args) { ssize_t len = args[3]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } ASSERT_OFFSET(args[4]); diff --git a/src/node_http_parser.cc b/src/node_http_parser.cc index a6c77bca16f..82cb9aa8ae9 100644 --- a/src/node_http_parser.cc +++ b/src/node_http_parser.cc @@ -406,7 +406,7 @@ public: size_t len = args[2]->Int32Value(); if (off+len > buffer_len) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } // Assign 'buffer_' while we parse. The callbacks will access that varible.