From 17524432ff50c7e2ba53aa71b61c2f7409d5e02a Mon Sep 17 00:00:00 2001 From: Ben Noordhuis Date: Wed, 28 Mar 2012 01:56:17 +0200 Subject: [PATCH] Fix Engrish in error messages. --- src/node_crypto.cc | 8 ++++---- src/node_file.cc | 2 +- src/node_http_parser.cc | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/src/node_crypto.cc b/src/node_crypto.cc index fa4c1e97669..d86a15fbfa6 100644 --- a/src/node_crypto.cc +++ b/src/node_crypto.cc @@ -1015,7 +1015,7 @@ Handle Connection::EncIn(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } int bytes_written = BIO_write(ss->bio_read_, buffer_data + off, len); @@ -1054,7 +1054,7 @@ Handle Connection::ClearOut(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } if (!SSL_is_init_finished(ss->ssl_)) { @@ -1127,7 +1127,7 @@ Handle Connection::EncOut(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } int bytes_read = BIO_read(ss->bio_write_, buffer_data + off, len); @@ -1167,7 +1167,7 @@ Handle Connection::ClearIn(const Arguments& args) { size_t len = args[2]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } if (!SSL_is_init_finished(ss->ssl_)) { diff --git a/src/node_file.cc b/src/node_file.cc index 6febc5768bc..60c094b243a 100644 --- a/src/node_file.cc +++ b/src/node_file.cc @@ -730,7 +730,7 @@ static Handle Write(const Arguments& args) { ssize_t len = args[3]->Int32Value(); if (off + len > buffer_length) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } ASSERT_OFFSET(args[4]); diff --git a/src/node_http_parser.cc b/src/node_http_parser.cc index a6c77bca16f..82cb9aa8ae9 100644 --- a/src/node_http_parser.cc +++ b/src/node_http_parser.cc @@ -406,7 +406,7 @@ public: size_t len = args[2]->Int32Value(); if (off+len > buffer_len) { return ThrowException(Exception::Error( - String::New("Length is extends beyond buffer"))); + String::New("off + len > buffer.length"))); } // Assign 'buffer_' while we parse. The callbacks will access that varible.