Skip to content
This repository has been archived by the owner. It is now read-only.
Permalink
Browse files

Fix Engrish in error messages.

  • Loading branch information...
bnoordhuis committed Mar 27, 2012
1 parent db0a1dc commit 17524432ff50c7e2ba53aa71b61c2f7409d5e02a
Showing with 6 additions and 6 deletions.
  1. +4 −4 src/node_crypto.cc
  2. +1 −1 src/node_file.cc
  3. +1 −1 src/node_http_parser.cc
@@ -1015,7 +1015,7 @@ Handle<Value> Connection::EncIn(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

int bytes_written = BIO_write(ss->bio_read_, buffer_data + off, len);
@@ -1054,7 +1054,7 @@ Handle<Value> Connection::ClearOut(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

if (!SSL_is_init_finished(ss->ssl_)) {
@@ -1127,7 +1127,7 @@ Handle<Value> Connection::EncOut(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

int bytes_read = BIO_read(ss->bio_write_, buffer_data + off, len);
@@ -1167,7 +1167,7 @@ Handle<Value> Connection::ClearIn(const Arguments& args) {
size_t len = args[2]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

if (!SSL_is_init_finished(ss->ssl_)) {
@@ -730,7 +730,7 @@ static Handle<Value> Write(const Arguments& args) {
ssize_t len = args[3]->Int32Value();
if (off + len > buffer_length) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

ASSERT_OFFSET(args[4]);
@@ -406,7 +406,7 @@ class Parser : public ObjectWrap {
size_t len = args[2]->Int32Value();
if (off+len > buffer_len) {
return ThrowException(Exception::Error(
String::New("Length is extends beyond buffer")));
String::New("off + len > buffer.length")));
}

// Assign 'buffer_' while we parse. The callbacks will access that varible.

0 comments on commit 1752443

Please sign in to comment.
You can’t perform that action at this time.