diff options
author | khriztianmoreno <khriztianmoreno@gmail.com> | 2019-06-21 17:15:06 -0500 |
---|---|---|
committer | ZYSzys <zyszys98@gmail.com> | 2019-06-26 16:20:50 +0800 |
commit | a10962187f3885e691e053839402ccf7a40e852c (patch) | |
tree | c5db958bbbe46e48e3bd3691ef60bc75c73cb144 /test | |
parent | 23416936bc3fd4c3d3d49e4025e82d42dc18036f (diff) | |
download | android-node-v8-a10962187f3885e691e053839402ccf7a40e852c.tar.gz android-node-v8-a10962187f3885e691e053839402ccf7a40e852c.tar.bz2 android-node-v8-a10962187f3885e691e053839402ccf7a40e852c.zip |
test: eliminate duplicate statements
PR-URL: https://github.com/nodejs/node/pull/28342
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Rich Trott <rtrott@gmail.com>
Reviewed-By: Yongsheng Zhang <zyszys98@gmail.com>
Reviewed-By: Ruben Bridgewater <ruben@bridgewater.de>
Reviewed-By: Trivikram Kamat <trivikr.dev@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test')
-rw-r--r-- | test/parallel/test-crypto-rsa-dsa.js | 15 |
1 files changed, 8 insertions, 7 deletions
diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js index 120a9f1f94..ab5ed544d4 100644 --- a/test/parallel/test-crypto-rsa-dsa.js +++ b/test/parallel/test-crypto-rsa-dsa.js @@ -38,6 +38,7 @@ const decryptError = { { const input = 'I AM THE WALRUS'; const bufferToEncrypt = Buffer.from(input); + const bufferPassword = Buffer.from('password'); let encryptedBuffer = crypto.publicEncrypt(rsaPubPem, bufferToEncrypt); @@ -66,12 +67,12 @@ const decryptError = { encryptedBuffer = crypto.privateEncrypt({ key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, bufferToEncrypt); decryptedBufferWithPassword = crypto.publicDecrypt({ key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, encryptedBuffer); assert.strictEqual(decryptedBufferWithPassword.toString(), input); @@ -79,20 +80,20 @@ const decryptError = { encryptedBuffer = crypto.privateEncrypt({ padding: crypto.constants.RSA_PKCS1_PADDING, key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, bufferToEncrypt); decryptedBufferWithPassword = crypto.publicDecrypt({ padding: crypto.constants.RSA_PKCS1_PADDING, key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, encryptedBuffer); assert.strictEqual(decryptedBufferWithPassword.toString(), input); // Omitting padding should be okay because RSA_PKCS1_PADDING is the default. decryptedBufferWithPassword = crypto.publicDecrypt({ key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, encryptedBuffer); assert.strictEqual(decryptedBufferWithPassword.toString(), input); @@ -101,13 +102,13 @@ const decryptError = { encryptedBuffer = crypto.privateEncrypt({ padding: crypto.constants.RSA_NO_PADDING, key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, Buffer.from(plaintext)); decryptedBufferWithPassword = crypto.publicDecrypt({ padding: crypto.constants.RSA_NO_PADDING, key: rsaKeyPemEncrypted, - passphrase: Buffer.from('password') + passphrase: bufferPassword }, encryptedBuffer); assert.strictEqual(decryptedBufferWithPassword.toString(), plaintext); |