diff options
author | Rich Trott <rtrott@gmail.com> | 2016-01-30 15:43:38 -0800 |
---|---|---|
committer | James M Snell <jasnell@gmail.com> | 2016-02-01 08:51:28 -0800 |
commit | 2c97bd47e40aedf932f7f4392f446da63d679d1a (patch) | |
tree | 38f0f488d3320d6f2abbe4659f976cd5e36b0b1f /test/parallel/test-crypto-binary-default.js | |
parent | f7feab5b3b6dfe9c7ce28a651d3318cfe5f71412 (diff) | |
download | android-node-v8-2c97bd47e40aedf932f7f4392f446da63d679d1a.tar.gz android-node-v8-2c97bd47e40aedf932f7f4392f446da63d679d1a.tar.bz2 android-node-v8-2c97bd47e40aedf932f7f4392f446da63d679d1a.zip |
test: remove var redeclarations in test-crypto-*
PR-URL: https://github.com/nodejs/node/pull/4981
Reviewed-By: Brian White <mscdex@mscdex.net>
Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test/parallel/test-crypto-binary-default.js')
-rw-r--r-- | test/parallel/test-crypto-binary-default.js | 46 |
1 files changed, 23 insertions, 23 deletions
diff --git a/test/parallel/test-crypto-binary-default.js b/test/parallel/test-crypto-binary-default.js index 1ce64a40c8..3cb98db80a 100644 --- a/test/parallel/test-crypto-binary-default.js +++ b/test/parallel/test-crypto-binary-default.js @@ -46,11 +46,11 @@ assert.throws(function() { }, 'not enough data'); // Test HMAC -var h1 = crypto.createHmac('sha1', 'Node') - .update('some data') - .update('to hmac') - .digest('hex'); -assert.equal(h1, '19fd6e1ba73d9ed2224dd5094a71babe85d9a892', 'test HMAC'); +const hmacHash = crypto.createHmac('sha1', 'Node') + .update('some data') + .update('to hmac') + .digest('hex'); +assert.equal(hmacHash, '19fd6e1ba73d9ed2224dd5094a71babe85d9a892', 'test HMAC'); // Test HMAC-SHA-* (rfc 4231 Test Cases) var rfc4231 = [ @@ -199,7 +199,7 @@ var rfc4231 = [ } ]; -for (var i = 0, l = rfc4231.length; i < l; i++) { +for (let i = 0, l = rfc4231.length; i < l; i++) { for (var hash in rfc4231[i]['hmac']) { var result = crypto.createHmac(hash, rfc4231[i]['key']) .update(rfc4231[i]['data']) @@ -322,7 +322,7 @@ var rfc2202_sha1 = [ } ]; -for (var i = 0, l = rfc2202_md5.length; i < l; i++) { +for (let i = 0, l = rfc2202_md5.length; i < l; i++) { if (!common.hasFipsCrypto) { assert.equal(rfc2202_md5[i]['hmac'], crypto.createHmac('md5', rfc2202_md5[i]['key']) @@ -331,7 +331,7 @@ for (var i = 0, l = rfc2202_md5.length; i < l; i++) { 'Test HMAC-MD5 : Test case ' + (i + 1) + ' rfc 2202'); } } -for (var i = 0, l = rfc2202_sha1.length; i < l; i++) { +for (let i = 0, l = rfc2202_sha1.length; i < l; i++) { assert.equal(rfc2202_sha1[i]['hmac'], crypto.createHmac('sha1', rfc2202_sha1[i]['key']) .update(rfc2202_sha1[i]['data']) @@ -394,29 +394,29 @@ assert.throws(function() { var s1 = crypto.createSign('RSA-SHA1') .update('Test123') .sign(keyPem, 'base64'); -var verified = crypto.createVerify('RSA-SHA1') - .update('Test') - .update('123') - .verify(certPem, s1, 'base64'); -assert.strictEqual(verified, true, 'sign and verify (base 64)'); +var s1Verified = crypto.createVerify('RSA-SHA1') + .update('Test') + .update('123') + .verify(certPem, s1, 'base64'); +assert.strictEqual(s1Verified, true, 'sign and verify (base 64)'); var s2 = crypto.createSign('RSA-SHA256') .update('Test123') .sign(keyPem); // binary -var verified = crypto.createVerify('RSA-SHA256') - .update('Test') - .update('123') - .verify(certPem, s2); // binary -assert.strictEqual(verified, true, 'sign and verify (binary)'); +var s2Verified = crypto.createVerify('RSA-SHA256') + .update('Test') + .update('123') + .verify(certPem, s2); // binary +assert.strictEqual(s2Verified, true, 'sign and verify (binary)'); var s3 = crypto.createSign('RSA-SHA1') .update('Test123') .sign(keyPem, 'buffer'); -var verified = crypto.createVerify('RSA-SHA1') - .update('Test') - .update('123') - .verify(certPem, s3); -assert.strictEqual(verified, true, 'sign and verify (buffer)'); +var s3Verified = crypto.createVerify('RSA-SHA1') + .update('Test') + .update('123') + .verify(certPem, s3); +assert.strictEqual(s3Verified, true, 'sign and verify (buffer)'); function testCipher1(key) { |