@@ -494,7 +494,7 @@ void SecureContext::SetKey(const FunctionCallbackInfo<Value>& args) {
494
494
495
495
unsigned int len = args.Length ();
496
496
if (len < 1 ) {
497
- return env-> ThrowError ( " Private key argument is mandatory" );
497
+ return THROW_ERR_MISSING_ARGS (env, " Private key argument is mandatory" );
498
498
}
499
499
500
500
if (len > 2 ) {
@@ -692,7 +692,7 @@ void SecureContext::SetCert(const FunctionCallbackInfo<Value>& args) {
692
692
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
693
693
694
694
if (args.Length () != 1 ) {
695
- return env-> ThrowTypeError ( " Certificate argument is mandatory" );
695
+ return THROW_ERR_MISSING_ARGS (env, " Certificate argument is mandatory" );
696
696
}
697
697
698
698
BIO* bio = LoadBIO (env, args[0 ]);
@@ -766,7 +766,7 @@ void SecureContext::AddCACert(const FunctionCallbackInfo<Value>& args) {
766
766
ClearErrorOnReturn clear_error_on_return;
767
767
768
768
if (args.Length () != 1 ) {
769
- return env-> ThrowTypeError ( " CA certificate argument is mandatory" );
769
+ return THROW_ERR_MISSING_ARGS (env, " CA certificate argument is mandatory" );
770
770
}
771
771
772
772
BIO* bio = LoadBIO (env, args[0 ]);
@@ -797,7 +797,7 @@ void SecureContext::AddCRL(const FunctionCallbackInfo<Value>& args) {
797
797
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
798
798
799
799
if (args.Length () != 1 ) {
800
- return env-> ThrowTypeError ( " CRL argument is mandatory" );
800
+ return THROW_ERR_MISSING_ARGS (env, " CRL argument is mandatory" );
801
801
}
802
802
803
803
ClearErrorOnReturn clear_error_on_return;
@@ -900,7 +900,7 @@ void SecureContext::SetCiphers(const FunctionCallbackInfo<Value>& args) {
900
900
ClearErrorOnReturn clear_error_on_return;
901
901
902
902
if (args.Length () != 1 ) {
903
- return env-> ThrowTypeError ( " Ciphers argument is mandatory" );
903
+ return THROW_ERR_MISSING_ARGS (env, " Ciphers argument is mandatory" );
904
904
}
905
905
906
906
THROW_AND_RETURN_IF_NOT_STRING (env, args[0 ], " Ciphers" );
@@ -916,7 +916,7 @@ void SecureContext::SetECDHCurve(const FunctionCallbackInfo<Value>& args) {
916
916
Environment* env = sc->env ();
917
917
918
918
if (args.Length () != 1 )
919
- return env-> ThrowTypeError ( " ECDH curve name argument is mandatory" );
919
+ return THROW_ERR_MISSING_ARGS (env, " ECDH curve name argument is mandatory" );
920
920
921
921
THROW_AND_RETURN_IF_NOT_STRING (env, args[0 ], " ECDH curve name" );
922
922
@@ -939,7 +939,7 @@ void SecureContext::SetDHParam(const FunctionCallbackInfo<Value>& args) {
939
939
// Auto DH is not supported in openssl 1.0.1, so dhparam needs
940
940
// to be specified explicitly
941
941
if (args.Length () != 1 )
942
- return env-> ThrowTypeError ( " DH argument is mandatory" );
942
+ return THROW_ERR_MISSING_ARGS (env, " DH argument is mandatory" );
943
943
944
944
// Invalid dhparam is silently discarded and DHE is no longer used.
945
945
BIO* bio = LoadBIO (env, args[0 ]);
@@ -994,7 +994,8 @@ void SecureContext::SetSessionIdContext(
994
994
Environment* env = sc->env ();
995
995
996
996
if (args.Length () != 1 ) {
997
- return env->ThrowTypeError (" Session ID context argument is mandatory" );
997
+ return THROW_ERR_MISSING_ARGS (
998
+ env, " Session ID context argument is mandatory" );
998
999
}
999
1000
1000
1001
THROW_AND_RETURN_IF_NOT_STRING (env, args[0 ], " Session ID context" );
@@ -1065,7 +1066,7 @@ void SecureContext::LoadPKCS12(const FunctionCallbackInfo<Value>& args) {
1065
1066
ClearErrorOnReturn clear_error_on_return;
1066
1067
1067
1068
if (args.Length () < 1 ) {
1068
- return env-> ThrowTypeError ( " PFX certificate argument is mandatory" );
1069
+ return THROW_ERR_MISSING_ARGS (env, " PFX certificate argument is mandatory" );
1069
1070
}
1070
1071
1071
1072
in = LoadBIO (env, args[0 ]);
@@ -1198,7 +1199,7 @@ void SecureContext::SetTicketKeys(const FunctionCallbackInfo<Value>& args) {
1198
1199
Environment* env = wrap->env ();
1199
1200
1200
1201
if (args.Length () < 1 ) {
1201
- return env-> ThrowTypeError ( " Ticket keys argument is mandatory" );
1202
+ return THROW_ERR_MISSING_ARGS (env, " Ticket keys argument is mandatory" );
1202
1203
}
1203
1204
1204
1205
THROW_AND_RETURN_IF_NOT_BUFFER (env, args[0 ], " Ticket keys" );
@@ -1951,7 +1952,7 @@ void SSLWrap<Base>::SetSession(const FunctionCallbackInfo<Value>& args) {
1951
1952
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
1952
1953
1953
1954
if (args.Length () < 1 ) {
1954
- return env-> ThrowError ( " Session argument is mandatory" );
1955
+ return THROW_ERR_MISSING_ARGS (env, " Session argument is mandatory" );
1955
1956
}
1956
1957
1957
1958
THROW_AND_RETURN_IF_NOT_BUFFER (env, args[0 ], " Session" );
@@ -2076,7 +2077,7 @@ void SSLWrap<Base>::SetOCSPResponse(
2076
2077
Environment* env = w->env ();
2077
2078
2078
2079
if (args.Length () < 1 )
2079
- return env-> ThrowTypeError ( " OCSP response argument is mandatory" );
2080
+ return THROW_ERR_MISSING_ARGS (env, " OCSP response argument is mandatory" );
2080
2081
2081
2082
THROW_AND_RETURN_IF_NOT_BUFFER (env, args[0 ], " OCSP response" );
2082
2083
@@ -4084,7 +4085,7 @@ void DiffieHellman::DiffieHellmanGroup(
4084
4085
DiffieHellman* diffieHellman = new DiffieHellman (env, args.This ());
4085
4086
4086
4087
if (args.Length () != 1 ) {
4087
- return env-> ThrowError ( " Group name argument is mandatory" );
4088
+ return THROW_ERR_MISSING_ARGS (env, " Group name argument is mandatory" );
4088
4089
}
4089
4090
4090
4091
THROW_AND_RETURN_IF_NOT_STRING (env, args[0 ], " Group name" );
@@ -4234,7 +4235,8 @@ void DiffieHellman::ComputeSecret(const FunctionCallbackInfo<Value>& args) {
4234
4235
BIGNUM* key = nullptr ;
4235
4236
4236
4237
if (args.Length () == 0 ) {
4237
- return env->ThrowError (" Other party's public key argument is mandatory" );
4238
+ return THROW_ERR_MISSING_ARGS (
4239
+ env, " Other party's public key argument is mandatory" );
4238
4240
} else {
4239
4241
THROW_AND_RETURN_IF_NOT_BUFFER (env, args[0 ], " Other party's public key" );
4240
4242
key = BN_bin2bn (
@@ -4304,7 +4306,7 @@ void DiffieHellman::SetKey(const v8::FunctionCallbackInfo<v8::Value>& args,
4304
4306
4305
4307
if (args.Length () == 0 ) {
4306
4308
snprintf (errmsg, sizeof (errmsg), " %s argument is mandatory" , what);
4307
- return env-> ThrowError ( errmsg);
4309
+ return THROW_ERR_MISSING_ARGS (env, errmsg);
4308
4310
}
4309
4311
4310
4312
if (!Buffer::HasInstance (args[0 ])) {
0 commit comments