Skip to content

Commit 1829853

Browse files
committed
formatting
1 parent 458900c commit 1829853

File tree

3 files changed

+92
-124
lines changed

3 files changed

+92
-124
lines changed

src/encryptEngines/js.js

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,24 +6,25 @@ module.exports = function (keyPair, options) {
66

77
return {
88
encrypt: function (buffer, usePrivate) {
9+
var m, c;
910
if (usePrivate) {
10-
var m = new BigInteger(pkcs1Scheme.encPad(buffer, {type: 1}));
11-
var c = keyPair.$doPrivate(m);
11+
m = new BigInteger(pkcs1Scheme.encPad(buffer, {type: 1}));
12+
c = keyPair.$doPrivate(m);
1213
} else {
13-
var m = new BigInteger(keyPair.encryptionScheme.encPad(buffer));
14-
var c = keyPair.$doPublic(m);
14+
m = new BigInteger(keyPair.encryptionScheme.encPad(buffer));
15+
c = keyPair.$doPublic(m);
1516
}
1617
return c.toBuffer(keyPair.encryptedDataLength);
1718
},
1819

1920
decrypt: function (buffer, usePublic) {
20-
var c = new BigInteger(buffer);
21+
var m, c = new BigInteger(buffer);
2122

2223
if (usePublic) {
23-
var m = keyPair.$doPublic(c);
24+
m = keyPair.$doPublic(c);
2425
return pkcs1Scheme.encUnPad(m.toBuffer(keyPair.encryptedDataLength), {type: 1});
2526
} else {
26-
var m = keyPair.$doPrivate(c);
27+
m = keyPair.$doPrivate(c);
2728
return keyPair.encryptionScheme.encUnPad(m.toBuffer(keyPair.encryptedDataLength));
2829
}
2930
}

src/schemes/pkcs1.js

Lines changed: 3 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -45,36 +45,20 @@ module.exports.makeScheme = function (key, options) {
4545
*/
4646
Scheme.prototype.encPad = function (buffer, options) {
4747
options = options || {};
48+
var filled;
4849
if (buffer.length > this.key.maxMessageLength) {
4950
throw new Error("Message too long for RSA (n=" + this.key.encryptedDataLength + ", l=" + buffer.length + ")");
5051
}
5152

5253
if (options.type === 1) {
53-
var filled = new Buffer(this.key.encryptedDataLength - buffer.length - 1);
54+
filled = new Buffer(this.key.encryptedDataLength - buffer.length - 1);
5455
filled.fill(0xff, 0, filled.length - 1);
5556
filled[0] = 1;
5657
filled[filled.length - 1] = 0;
5758

5859
return Buffer.concat([filled, buffer]);
5960
} else {
60-
/*// random padding
61-
// TODO: make n-length buffer
62-
var ba = Array.prototype.slice.call(buffer, 0);
63-
ba.unshift(0);
64-
var rand = crypt.randomBytes(this.key.encryptedDataLength - ba.length - 2);
65-
for (var i = 0; i < rand.length; i++) {
66-
var r = rand[i];
67-
while (r === 0) { // non-zero only
68-
r = crypt.randomBytes(1)[0];
69-
}
70-
ba.unshift(r);
71-
}
72-
ba.unshift(2);
73-
ba.unshift(0);
74-
// return ba;
75-
*/
76-
77-
var filled = new Buffer(this.key.encryptedDataLength - buffer.length);
61+
filled = new Buffer(this.key.encryptedDataLength - buffer.length);
7862
filled[0] = 0;
7963
filled[1] = 2;
8064
var rand = crypt.randomBytes(filled.length - 3);
@@ -126,30 +110,6 @@ module.exports.makeScheme = function (key, options) {
126110
}
127111
}
128112
return buffer.slice(i + 1, buffer.length);
129-
/*var i = 0;
130-
131-
while (i < buffer.length && buffer[i] === 0) {
132-
++i;
133-
}
134-
135-
if (buffer.length - i != this.key.encryptedDataLength - 1 || buffer[i] != 2) {
136-
return null;
137-
}
138-
139-
++i;
140-
while (buffer[i] !== 0) {
141-
if (++i >= buffer.length) {
142-
return null;
143-
}
144-
}
145-
146-
var c = 0;
147-
var res = new Buffer(buffer.length - i - 1);
148-
while (++i < buffer.length) {
149-
res[c++] = buffer[i] & 255;
150-
}*/
151-
152-
return res;
153113
};
154114

155115
Scheme.prototype.sign = function (buffer) {

test/tests.js

Lines changed: 81 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ var assert = require("chai").assert;
77
var _ = require("lodash");
88
var NodeRSA = require("../src/NodeRSA");
99

10-
describe("NodeRSA", function(){
10+
describe("NodeRSA", function () {
1111
var keySizes = [
1212
{b: 512, e: 3},
1313
{b: 512, e: 5},
@@ -47,11 +47,11 @@ describe("NodeRSA", function(){
4747
encoding: "buffer"
4848
},
4949
"json object": {
50-
data: {str: "string", arr: ["a","r","r", "a", "y", true, "⑨"], int: 42, nested: {key: {key: 1}}},
50+
data: {str: "string", arr: ["a", "r", "r", "a", "y", true, "⑨"], int: 42, nested: {key: {key: 1}}},
5151
encoding: "json"
5252
},
5353
"json array": {
54-
data: [1,2,3,4,5,6,7,8,9,[10,11,12,[13],14,15,[16,17,[18]]]],
54+
data: [1, 2, 3, 4, 5, 6, 7, 8, 9, [10, 11, 12, [13], 14, 15, [16, 17, [18]]]],
5555
encoding: "json"
5656
}
5757
};
@@ -60,7 +60,7 @@ describe("NodeRSA", function(){
6060
var privateNodeRSA = null;
6161
var publicNodeRSA = null;
6262

63-
describe("Setup options", function(){
63+
describe("Setup options", function () {
6464
it("should use browser environment", function () {
6565
assert.equal((new NodeRSA(null, {environment: 'browser'})).$options.environment, 'browser');
6666
});
@@ -141,7 +141,7 @@ describe("NodeRSA", function(){
141141
assert.equal(key.$options.signingScheme, 'pkcs1');
142142
assert.equal(key.$options.signingSchemeOptions.hash, 'sha256');
143143

144-
assert.throw(function(){
144+
assert.throw(function () {
145145
key.setOptions({
146146
environment: 'browser',
147147
signingScheme: 'md4'
@@ -150,8 +150,8 @@ describe("NodeRSA", function(){
150150
});
151151
});
152152

153-
describe("Work with keys", function() {
154-
describe("Generating keys", function() {
153+
describe("Work with keys", function () {
154+
describe("Generating keys", function () {
155155
for (var size in keySizes) {
156156
(function (size) {
157157
it("should make key pair " + size.b + "-bit length and public exponent is " + (size.e ? size.e : size.e + " and should be 65537"), function () {
@@ -166,69 +166,69 @@ describe("NodeRSA", function(){
166166
}
167167
});
168168

169-
describe("Imprt/Export keys", function(){
170-
var privateKeyPKCS1 = "-----BEGIN RSA PRIVATE KEY-----\n"+
171-
"MIIFwgIBAAKCAUEAsE1edyfToZRv6cFOkB0tAJ5qJor4YF5CccJAL0fS/o1Yk10V\n"+
172-
"SXH4Xx4peSJgYQKkO0HqO1hAz6k9dFQB4U1CnWtRjtNEcIfycqrZrhu6you5syb6\n"+
173-
"ScV3Zu/9bm7/DyaLlx/gJhUPR1OxOzaqsEvlu7hbDhNLIYo1zKFb/aUBbD6+UcaG\n"+
174-
"xH2BfFNdzVAtVSVpc/s2Y3sboMN7rByUj7937iQlaMINvVjyasynYuzHNw6ZRP9J\n"+
175-
"P9fwxrCyaxnTPWxVl0qvVaQO2+TtFMtDXH2OVZtWWeLHAL8cildw0G+u2qVqTqIG\n"+
176-
"EwNyJlsAHykaPFAMW0xLueumrSlB+JUJPrRvvw4nBCd4GOrNSlPCE/xlk1Cb8JaI\n"+
177-
"CTLvDUcYc3ZqL3jqAueBhkpw2uCz8xVJeOA1KY4kQIIx8JEBsAYzgyP2iy0CAwEA\n"+
178-
"AQKCAUAjBcudShkdgRpWSmNr94/IDrAxpeu/YRo79QXBHriIftW4uIYRCAX6B0jf\n"+
179-
"2ndg7iBn8Skxzs9ZMVqW8FVLR4jTMs2J3Og8npUIOG5zyuhpciZas4SHASY+GbCz\n"+
180-
"rnMWtGaIh/mENyzI05RimfKAgSNLDk1wV17Wc9lKJEfc9Fl7Al/WaOS+xdviMcFx\n"+
181-
"ltrajksLkjz0uDD917eKskbE45lULfGqeI0kYDadWp88pw6ikXJln2p3Y1PNQF3e\n"+
182-
"y2cN+Snzd0jx/c5fD9B1zxKYv5bUo+UnTzBxV81e9xCJfkdXv+6D5qDn1gGLdZZa\n"+
183-
"5FxtZbRgVh/ZlqP9xYr72as/WFmIA20wRgHPgWvLyHsh0XThqZf2/O3R8KmFv8aT\n"+
184-
"+kmc5is6sVItIIi7ltorVapTkJai3zz/VSMBBaL+ytFN9jVl4QKBoQDfL8TMeZXu\n"+
185-
"gBTN7yq6zZWN8+60MUaxz0/lKdzmo35z32rpVKdsYd922pmcsNYaoj/H9L3j/NP4\n"+
186-
"9z+SHfYpWvTa7AvJfNlXYc3BRXIarpfnXsm65IzKzHaF9i2xdXxkfTEYIvOQDMLF\n"+
187-
"SiiObWJMV+QqUxb3luu3/CR3IcbgeTOpdiC/T/Zl/YYl17JqZTHmLFZPq7xewttg\n"+
188-
"zQorDRWIFDtlAoGhAMo4+uM9f4BpOHSmayhLhHArIGs4386BkXSeOLeQitaQJ/2c\n"+
189-
"zb459O87XoCAonZbq+dI7XRnBU3toQvEsZgrtGkOFXCZJMWAQxD5BQ5vEYT6c86h\n"+
190-
"uGpX6h3ODlJ6UGi+5CWyMQ1cFlBkfffFAarjSYTVlyj736sOeDuJWX133z5VQBQ8\n"+
191-
"1xSH23kNF95vxB4I1fXG8WL11YZU7VEwSLC4aCkCgaAKRj+wDhTZ4umSRWVZLiep\n"+
192-
"XkZp4y7W9q095nx13abvnKRmU3BVq/fGl++kZ/ujRD7dbKXlPflgJ7m0d06ivr4w\n"+
193-
"6dbtEqNKw4TeVd0X31u82f89bFIS7/Cw4BFgbwEn+x9sdgdyZTP+MxjE3cI9s3oc\n"+
194-
"fLC8+ySk1qWzGkn2gX3gWkDNrdexAEfRrClZfokaiIX8qvJEBoJk5WuHadXI6u2F\n"+
195-
"AoGgByidOQ4kRVd0OCzr/jEuLwpXy3Pn+Fd93rL7LwRe5dmUkNXMMr+6e/2OCt6C\n"+
196-
"4c28+CMMxOIgvfF7kf8Uil6BtHZbK/E/6/3uYdtu4mPsKtjy4I25CYqzLvrsZt8N\n"+
197-
"maeoS+1S7zYjVBU6oFrJBFOndpxZDYpdEKEigHkMQfTMYliCPDUrJ/7nNhHQln8+\n"+
198-
"YhHOATVZtjcdp/O5svYSnK7qgQKBoDd3lFWrPatgxpF1JXMEFFbaIRdNxHkKA4YY\n"+
199-
"gMTM4MPgViunYX/yJ7SaX8jWnC231A9uVn4+kb+DvKjc+ZuTQvnIUK2u6LvIinVF\n"+
200-
"snDEA+BbXwehAtwdHDMDtqYFdx4hvCWQwBNn4p3J0OO2tbYVMtvM5aOEfRSYagfm\n"+
201-
"RywhDUAjW8U0RBnzlmXhQQ6B9bjqooS2MsRrJrS5CU682fb3hBo=\n"+
169+
describe("Imprt/Export keys", function () {
170+
var privateKeyPKCS1 = "-----BEGIN RSA PRIVATE KEY-----\n" +
171+
"MIIFwgIBAAKCAUEAsE1edyfToZRv6cFOkB0tAJ5qJor4YF5CccJAL0fS/o1Yk10V\n" +
172+
"SXH4Xx4peSJgYQKkO0HqO1hAz6k9dFQB4U1CnWtRjtNEcIfycqrZrhu6you5syb6\n" +
173+
"ScV3Zu/9bm7/DyaLlx/gJhUPR1OxOzaqsEvlu7hbDhNLIYo1zKFb/aUBbD6+UcaG\n" +
174+
"xH2BfFNdzVAtVSVpc/s2Y3sboMN7rByUj7937iQlaMINvVjyasynYuzHNw6ZRP9J\n" +
175+
"P9fwxrCyaxnTPWxVl0qvVaQO2+TtFMtDXH2OVZtWWeLHAL8cildw0G+u2qVqTqIG\n" +
176+
"EwNyJlsAHykaPFAMW0xLueumrSlB+JUJPrRvvw4nBCd4GOrNSlPCE/xlk1Cb8JaI\n" +
177+
"CTLvDUcYc3ZqL3jqAueBhkpw2uCz8xVJeOA1KY4kQIIx8JEBsAYzgyP2iy0CAwEA\n" +
178+
"AQKCAUAjBcudShkdgRpWSmNr94/IDrAxpeu/YRo79QXBHriIftW4uIYRCAX6B0jf\n" +
179+
"2ndg7iBn8Skxzs9ZMVqW8FVLR4jTMs2J3Og8npUIOG5zyuhpciZas4SHASY+GbCz\n" +
180+
"rnMWtGaIh/mENyzI05RimfKAgSNLDk1wV17Wc9lKJEfc9Fl7Al/WaOS+xdviMcFx\n" +
181+
"ltrajksLkjz0uDD917eKskbE45lULfGqeI0kYDadWp88pw6ikXJln2p3Y1PNQF3e\n" +
182+
"y2cN+Snzd0jx/c5fD9B1zxKYv5bUo+UnTzBxV81e9xCJfkdXv+6D5qDn1gGLdZZa\n" +
183+
"5FxtZbRgVh/ZlqP9xYr72as/WFmIA20wRgHPgWvLyHsh0XThqZf2/O3R8KmFv8aT\n" +
184+
"+kmc5is6sVItIIi7ltorVapTkJai3zz/VSMBBaL+ytFN9jVl4QKBoQDfL8TMeZXu\n" +
185+
"gBTN7yq6zZWN8+60MUaxz0/lKdzmo35z32rpVKdsYd922pmcsNYaoj/H9L3j/NP4\n" +
186+
"9z+SHfYpWvTa7AvJfNlXYc3BRXIarpfnXsm65IzKzHaF9i2xdXxkfTEYIvOQDMLF\n" +
187+
"SiiObWJMV+QqUxb3luu3/CR3IcbgeTOpdiC/T/Zl/YYl17JqZTHmLFZPq7xewttg\n" +
188+
"zQorDRWIFDtlAoGhAMo4+uM9f4BpOHSmayhLhHArIGs4386BkXSeOLeQitaQJ/2c\n" +
189+
"zb459O87XoCAonZbq+dI7XRnBU3toQvEsZgrtGkOFXCZJMWAQxD5BQ5vEYT6c86h\n" +
190+
"uGpX6h3ODlJ6UGi+5CWyMQ1cFlBkfffFAarjSYTVlyj736sOeDuJWX133z5VQBQ8\n" +
191+
"1xSH23kNF95vxB4I1fXG8WL11YZU7VEwSLC4aCkCgaAKRj+wDhTZ4umSRWVZLiep\n" +
192+
"XkZp4y7W9q095nx13abvnKRmU3BVq/fGl++kZ/ujRD7dbKXlPflgJ7m0d06ivr4w\n" +
193+
"6dbtEqNKw4TeVd0X31u82f89bFIS7/Cw4BFgbwEn+x9sdgdyZTP+MxjE3cI9s3oc\n" +
194+
"fLC8+ySk1qWzGkn2gX3gWkDNrdexAEfRrClZfokaiIX8qvJEBoJk5WuHadXI6u2F\n" +
195+
"AoGgByidOQ4kRVd0OCzr/jEuLwpXy3Pn+Fd93rL7LwRe5dmUkNXMMr+6e/2OCt6C\n" +
196+
"4c28+CMMxOIgvfF7kf8Uil6BtHZbK/E/6/3uYdtu4mPsKtjy4I25CYqzLvrsZt8N\n" +
197+
"maeoS+1S7zYjVBU6oFrJBFOndpxZDYpdEKEigHkMQfTMYliCPDUrJ/7nNhHQln8+\n" +
198+
"YhHOATVZtjcdp/O5svYSnK7qgQKBoDd3lFWrPatgxpF1JXMEFFbaIRdNxHkKA4YY\n" +
199+
"gMTM4MPgViunYX/yJ7SaX8jWnC231A9uVn4+kb+DvKjc+ZuTQvnIUK2u6LvIinVF\n" +
200+
"snDEA+BbXwehAtwdHDMDtqYFdx4hvCWQwBNn4p3J0OO2tbYVMtvM5aOEfRSYagfm\n" +
201+
"RywhDUAjW8U0RBnzlmXhQQ6B9bjqooS2MsRrJrS5CU682fb3hBo=\n" +
202202
"-----END RSA PRIVATE KEY-----";
203203

204-
var publicKeyPKCS8 = "-----BEGIN PUBLIC KEY-----\n"+
205-
"MIIBYjANBgkqhkiG9w0BAQEFAAOCAU8AMIIBSgKCAUEAsE1edyfToZRv6cFOkB0t\n"+
206-
"AJ5qJor4YF5CccJAL0fS/o1Yk10VSXH4Xx4peSJgYQKkO0HqO1hAz6k9dFQB4U1C\n"+
207-
"nWtRjtNEcIfycqrZrhu6you5syb6ScV3Zu/9bm7/DyaLlx/gJhUPR1OxOzaqsEvl\n"+
208-
"u7hbDhNLIYo1zKFb/aUBbD6+UcaGxH2BfFNdzVAtVSVpc/s2Y3sboMN7rByUj793\n"+
209-
"7iQlaMINvVjyasynYuzHNw6ZRP9JP9fwxrCyaxnTPWxVl0qvVaQO2+TtFMtDXH2O\n"+
210-
"VZtWWeLHAL8cildw0G+u2qVqTqIGEwNyJlsAHykaPFAMW0xLueumrSlB+JUJPrRv\n"+
211-
"vw4nBCd4GOrNSlPCE/xlk1Cb8JaICTLvDUcYc3ZqL3jqAueBhkpw2uCz8xVJeOA1\n"+
212-
"KY4kQIIx8JEBsAYzgyP2iy0CAwEAAQ==\n"+
204+
var publicKeyPKCS8 = "-----BEGIN PUBLIC KEY-----\n" +
205+
"MIIBYjANBgkqhkiG9w0BAQEFAAOCAU8AMIIBSgKCAUEAsE1edyfToZRv6cFOkB0t\n" +
206+
"AJ5qJor4YF5CccJAL0fS/o1Yk10VSXH4Xx4peSJgYQKkO0HqO1hAz6k9dFQB4U1C\n" +
207+
"nWtRjtNEcIfycqrZrhu6you5syb6ScV3Zu/9bm7/DyaLlx/gJhUPR1OxOzaqsEvl\n" +
208+
"u7hbDhNLIYo1zKFb/aUBbD6+UcaGxH2BfFNdzVAtVSVpc/s2Y3sboMN7rByUj793\n" +
209+
"7iQlaMINvVjyasynYuzHNw6ZRP9JP9fwxrCyaxnTPWxVl0qvVaQO2+TtFMtDXH2O\n" +
210+
"VZtWWeLHAL8cildw0G+u2qVqTqIGEwNyJlsAHykaPFAMW0xLueumrSlB+JUJPrRv\n" +
211+
"vw4nBCd4GOrNSlPCE/xlk1Cb8JaICTLvDUcYc3ZqL3jqAueBhkpw2uCz8xVJeOA1\n" +
212+
"KY4kQIIx8JEBsAYzgyP2iy0CAwEAAQ==\n" +
213213
"-----END PUBLIC KEY-----";
214214

215215
var privateKeyPEMNotTrimmed = ' \n\n \n\n ' + privateKeyPKCS1 + '\n \n \n\n ';
216216
var publicKeyPEMNotTrimmed = '\n\n\n\n ' + publicKeyPKCS8 + '\n \n\n\n ';
217217

218-
var fileKeyPKCS1 = "-----BEGIN RSA PRIVATE KEY-----\n"+
219-
"MIICXAIBAAKBgQCCdY+EpDC/vPa335l751SBM8d5Lf4z4QZX4bc+DqTY9zVY/rmP\n"+
220-
"GbTkCueKnIKApuOGMXJOaCwNH9wUftNt7T0foEwjl16uIC8m4hwSjjNL5TKqMVey\n"+
221-
"Syv04oBuidv76u5yNiLC4J85lbmW3WAyYkTCbm/VJZAXNJuqCm7AVWmQMQIDAQAB\n"+
222-
"AoGAEYR3oPfrE9PrzQTZNyn4zuCFCGCEobK1h1dno42T1Q5cu3Z4tB5fi79rF9Gs\n"+
223-
"NFo0cvBwyNZ0E88TXi0pdrlEW6mdPgQFd3CFxrOgKt9AGpOtI1zzVOb1Uddywq/m\n"+
224-
"WBPyETwEKzq7lC2nAcMUr0rlFrrDmUT2dafHeuWnFMZ/1YECQQDCtftsH9/prbgu\n"+
225-
"Q4F2lOWsLz96aix/jnI8FhBmukKmfLMXjCZYYv+Dsr8TIl/iriGqcSgGkBHHoGe1\n"+
226-
"nmLUZ4EHAkEAq4YcB8T9DLIYUeaS+JRWwLOejU6/rYdgxBIaGn2m0Ldp/z7lLM7g\n"+
227-
"b0H5Al+7POajkAdnDclBDhyxqInHO4VvBwJBAJ25jNEpgNhqQKg5RsYoF2RDYchn\n"+
228-
"+WPan+7McLzGZPc4TFrmzKkMiK7GPMHjNokJRXwr7aBjVAPBjEEy7BvjPEECQFOJ\n"+
229-
"4rcKAzEewGeLREObg9Eg6nTqSMLMb52vL1V9ozR+UDrHuDilnXuyhwPX+kqEDl+E\n"+
230-
"q3V0cqHb6c8rI4TizRsCQANIyhoJ33ughNzbCIknkMPKtgvLOUARnbya/bkfRexL\n"+
231-
"icyYzXPNuqZDY8JZQHlshN8cCcZcYjGPYYscd2LKB6o=\n"+
218+
var fileKeyPKCS1 = "-----BEGIN RSA PRIVATE KEY-----\n" +
219+
"MIICXAIBAAKBgQCCdY+EpDC/vPa335l751SBM8d5Lf4z4QZX4bc+DqTY9zVY/rmP\n" +
220+
"GbTkCueKnIKApuOGMXJOaCwNH9wUftNt7T0foEwjl16uIC8m4hwSjjNL5TKqMVey\n" +
221+
"Syv04oBuidv76u5yNiLC4J85lbmW3WAyYkTCbm/VJZAXNJuqCm7AVWmQMQIDAQAB\n" +
222+
"AoGAEYR3oPfrE9PrzQTZNyn4zuCFCGCEobK1h1dno42T1Q5cu3Z4tB5fi79rF9Gs\n" +
223+
"NFo0cvBwyNZ0E88TXi0pdrlEW6mdPgQFd3CFxrOgKt9AGpOtI1zzVOb1Uddywq/m\n" +
224+
"WBPyETwEKzq7lC2nAcMUr0rlFrrDmUT2dafHeuWnFMZ/1YECQQDCtftsH9/prbgu\n" +
225+
"Q4F2lOWsLz96aix/jnI8FhBmukKmfLMXjCZYYv+Dsr8TIl/iriGqcSgGkBHHoGe1\n" +
226+
"nmLUZ4EHAkEAq4YcB8T9DLIYUeaS+JRWwLOejU6/rYdgxBIaGn2m0Ldp/z7lLM7g\n" +
227+
"b0H5Al+7POajkAdnDclBDhyxqInHO4VvBwJBAJ25jNEpgNhqQKg5RsYoF2RDYchn\n" +
228+
"+WPan+7McLzGZPc4TFrmzKkMiK7GPMHjNokJRXwr7aBjVAPBjEEy7BvjPEECQFOJ\n" +
229+
"4rcKAzEewGeLREObg9Eg6nTqSMLMb52vL1V9ozR+UDrHuDilnXuyhwPX+kqEDl+E\n" +
230+
"q3V0cqHb6c8rI4TizRsCQANIyhoJ33ughNzbCIknkMPKtgvLOUARnbya/bkfRexL\n" +
231+
"icyYzXPNuqZDY8JZQHlshN8cCcZcYjGPYYscd2LKB6o=\n" +
232232
"-----END RSA PRIVATE KEY-----";
233233
var keysFolder = __dirname + '/keys/';
234234
var keys_formats = {
@@ -299,8 +299,8 @@ describe("NodeRSA", function(){
299299
describe("Different key formats", function () {
300300
var sampleKey = new NodeRSA(fileKeyPKCS1);
301301

302-
for(var format in keys_formats) {
303-
(function(format) {
302+
for (var format in keys_formats) {
303+
(function (format) {
304304
var options = keys_formats[format];
305305

306306
it("should load from " + options.file + " (" + format + ")", function () {
@@ -330,16 +330,24 @@ describe("NodeRSA", function(){
330330
});
331331

332332
describe("Bad cases", function () {
333-
it("not public key", function(){
333+
it("not public key", function () {
334334
var key = new NodeRSA();
335-
assert.throw(function(){ key.exportKey(); }, Error, "It is not private key");
336-
assert.throw(function(){ key.exportKey('public'); }, Error, "It is not public key");
335+
assert.throw(function () {
336+
key.exportKey();
337+
}, Error, "It is not private key");
338+
assert.throw(function () {
339+
key.exportKey('public');
340+
}, Error, "It is not public key");
337341
});
338342

339-
it("not private key", function(){
343+
it("not private key", function () {
340344
var key = new NodeRSA(publicKeyPKCS8);
341-
assert.throw(function(){ key.exportKey(); }, Error, "It is not private key");
342-
assert.doesNotThrow(function(){ key.exportKey('public'); }, Error, "It is not public key");
345+
assert.throw(function () {
346+
key.exportKey();
347+
}, Error, "It is not private key");
348+
assert.doesNotThrow(function () {
349+
key.exportKey('public');
350+
}, Error, "It is not public key");
343351
});
344352
});
345353
});
@@ -511,7 +519,6 @@ describe("NodeRSA", function(){
511519
})(encryptSchemes[scheme_i]);
512520
}
513521

514-
515522
describe("encryptPrivate & decryptPublic", function () {
516523
var encrypted = {};
517524
var decrypted = {};
@@ -599,7 +606,7 @@ describe("NodeRSA", function(){
599606
});
600607

601608
it("should verify " + i, function () {
602-
if(!key.verify(suit.data, signed[i])) {
609+
if (!key.verify(suit.data, signed[i])) {
603610
key.verify(suit.data, signed[i]);
604611
}
605612
assert(key.verify(suit.data, signed[i]));
@@ -615,7 +622,7 @@ describe("NodeRSA", function(){
615622
environment: env
616623
});
617624
var signed = key.sign('data');
618-
if(!key.verify('data', signed)) {
625+
if (!key.verify('data', signed)) {
619626
key.verify('data', signed);
620627
}
621628
assert(key.verify('data', signed));

0 commit comments

Comments
 (0)