Skip to content
This repository has been archived by the owner on Apr 22, 2023. It is now read-only.

Commit

Permalink
Fix Engrish in error messages.
Browse files Browse the repository at this point in the history
  • Loading branch information
bnoordhuis committed Mar 30, 2012
1 parent db0a1dc commit 1752443
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 6 deletions.
8 changes: 4 additions & 4 deletions src/node_crypto.cc
Expand Up @@ -1015,7 +1015,7 @@ Handle<Value> Connection::EncIn(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

int bytes_written = BIO_write(ss->bio_read_, buffer_data + off, len);
Expand Down Expand Up @@ -1054,7 +1054,7 @@ Handle<Value> Connection::ClearOut(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

if (!SSL_is_init_finished(ss->ssl_)) {
Expand Down Expand Up @@ -1127,7 +1127,7 @@ Handle<Value> Connection::EncOut(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

int bytes_read = BIO_read(ss->bio_write_, buffer_data + off, len);
Expand Down Expand Up @@ -1167,7 +1167,7 @@ Handle<Value> Connection::ClearIn(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

if (!SSL_is_init_finished(ss->ssl_)) {
Expand Down
2 changes: 1 addition & 1 deletion src/node_file.cc
Expand Up @@ -730,7 +730,7 @@ static Handle<Value> Write(const Arguments& args) {
ssize_t len = args[3]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

ASSERT_OFFSET(args[4]);
Expand Down
2 changes: 1 addition & 1 deletion src/node_http_parser.cc
Expand Up @@ -406,7 +406,7 @@ class Parser : public ObjectWrap {
size_t len = args[2]->Int32Value();
if (off+len > buffer_len) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

// Assign 'buffer_' while we parse. The callbacks will access that varible.
Expand Down

0 comments on commit 1752443

Please sign in to comment.