summaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorkhriztianmoreno <khriztianmoreno@gmail.com>2019-06-21 17:15:06 -0500
committerZYSzys <zyszys98@gmail.com>2019-06-26 16:20:50 +0800
commita10962187f3885e691e053839402ccf7a40e852c (patch)
treec5db958bbbe46e48e3bd3691ef60bc75c73cb144 /test
parent23416936bc3fd4c3d3d49e4025e82d42dc18036f (diff)
downloadandroid-node-v8-a10962187f3885e691e053839402ccf7a40e852c.tar.gz
android-node-v8-a10962187f3885e691e053839402ccf7a40e852c.tar.bz2
android-node-v8-a10962187f3885e691e053839402ccf7a40e852c.zip
test: eliminate duplicate statements
PR-URL: https://github.com/nodejs/node/pull/28342 Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Yongsheng Zhang <zyszys98@gmail.com> Reviewed-By: Ruben Bridgewater <ruben@bridgewater.de> Reviewed-By: Trivikram Kamat <trivikr.dev@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test')
-rw-r--r--test/parallel/test-crypto-rsa-dsa.js15
1 files changed, 8 insertions, 7 deletions
diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js
index 120a9f1f94..ab5ed544d4 100644
--- a/test/parallel/test-crypto-rsa-dsa.js
+++ b/test/parallel/test-crypto-rsa-dsa.js
@@ -38,6 +38,7 @@ const decryptError = {
{
const input = 'I AM THE WALRUS';
const bufferToEncrypt = Buffer.from(input);
+ const bufferPassword = Buffer.from('password');
let encryptedBuffer = crypto.publicEncrypt(rsaPubPem, bufferToEncrypt);
@@ -66,12 +67,12 @@ const decryptError = {
encryptedBuffer = crypto.privateEncrypt({
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, bufferToEncrypt);
decryptedBufferWithPassword = crypto.publicDecrypt({
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, encryptedBuffer);
assert.strictEqual(decryptedBufferWithPassword.toString(), input);
@@ -79,20 +80,20 @@ const decryptError = {
encryptedBuffer = crypto.privateEncrypt({
padding: crypto.constants.RSA_PKCS1_PADDING,
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, bufferToEncrypt);
decryptedBufferWithPassword = crypto.publicDecrypt({
padding: crypto.constants.RSA_PKCS1_PADDING,
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, encryptedBuffer);
assert.strictEqual(decryptedBufferWithPassword.toString(), input);
// Omitting padding should be okay because RSA_PKCS1_PADDING is the default.
decryptedBufferWithPassword = crypto.publicDecrypt({
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, encryptedBuffer);
assert.strictEqual(decryptedBufferWithPassword.toString(), input);
@@ -101,13 +102,13 @@ const decryptError = {
encryptedBuffer = crypto.privateEncrypt({
padding: crypto.constants.RSA_NO_PADDING,
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, Buffer.from(plaintext));
decryptedBufferWithPassword = crypto.publicDecrypt({
padding: crypto.constants.RSA_NO_PADDING,
key: rsaKeyPemEncrypted,
- passphrase: Buffer.from('password')
+ passphrase: bufferPassword
}, encryptedBuffer);
assert.strictEqual(decryptedBufferWithPassword.toString(), plaintext);