@@ -65,7 +65,7 @@ common.expectsError(
65
65
. update ( 'Test' )
66
66
. update ( '123' )
67
67
. verify ( certPem , s1 , 'base64' ) ;
68
- assert . strictEqual ( verified , true , 'sign and verify (base 64)' ) ;
68
+ assert . strictEqual ( verified , true ) ;
69
69
}
70
70
71
71
{
@@ -81,14 +81,14 @@ common.expectsError(
81
81
. update ( 'Test' )
82
82
. update ( '123' )
83
83
. verify ( certPem , s2 , 'latin1' ) ;
84
- assert . strictEqual ( verified , true , 'sign and verify (latin1)' ) ;
84
+ assert . strictEqual ( verified , true ) ;
85
85
86
86
const verStream = crypto . createVerify ( 'SHA256' ) ;
87
87
verStream . write ( 'Tes' ) ;
88
88
verStream . write ( 't12' ) ;
89
89
verStream . end ( '3' ) ;
90
90
verified = verStream . verify ( certPem , s2 , 'latin1' ) ;
91
- assert . strictEqual ( verified , true , 'sign and verify (stream)' ) ;
91
+ assert . strictEqual ( verified , true ) ;
92
92
}
93
93
94
94
{
@@ -99,14 +99,14 @@ common.expectsError(
99
99
. update ( 'Test' )
100
100
. update ( '123' )
101
101
. verify ( certPem , s3 ) ;
102
- assert . strictEqual ( verified , true , 'sign and verify (buffer)' ) ;
102
+ assert . strictEqual ( verified , true ) ;
103
103
104
104
const verStream = crypto . createVerify ( 'SHA1' ) ;
105
105
verStream . write ( 'Tes' ) ;
106
106
verStream . write ( 't12' ) ;
107
107
verStream . end ( '3' ) ;
108
108
verified = verStream . verify ( certPem , s3 ) ;
109
- assert . strictEqual ( verified , true , 'sign and verify (stream)' ) ;
109
+ assert . strictEqual ( verified , true ) ;
110
110
}
111
111
112
112
// Special tests for RSA_PKCS1_PSS_PADDING
@@ -177,7 +177,7 @@ common.expectsError(
177
177
} , s4 ) ;
178
178
const saltLengthCorrect = getEffectiveSaltLength ( signSaltLength ) ===
179
179
getEffectiveSaltLength ( verifySaltLength ) ;
180
- assert . strictEqual ( verified , saltLengthCorrect , 'verify (PSS)' ) ;
180
+ assert . strictEqual ( verified , saltLengthCorrect ) ;
181
181
} ) ;
182
182
183
183
// Verification using RSA_PSS_SALTLEN_AUTO should always work
@@ -188,7 +188,7 @@ common.expectsError(
188
188
padding : crypto . constants . RSA_PKCS1_PSS_PADDING ,
189
189
saltLength : crypto . constants . RSA_PSS_SALTLEN_AUTO
190
190
} , s4 ) ;
191
- assert . strictEqual ( verified , true , 'verify (PSS with SALTLEN_AUTO)' ) ;
191
+ assert . strictEqual ( verified , true ) ;
192
192
193
193
// Verifying an incorrect message should never work
194
194
verified = crypto . createVerify ( algo )
@@ -198,7 +198,7 @@ common.expectsError(
198
198
padding : crypto . constants . RSA_PKCS1_PSS_PADDING ,
199
199
saltLength : crypto . constants . RSA_PSS_SALTLEN_AUTO
200
200
} , s4 ) ;
201
- assert . strictEqual ( verified , false , 'verify (PSS, incorrect)' ) ;
201
+ assert . strictEqual ( verified , false ) ;
202
202
}
203
203
} ) ;
204
204
}
@@ -219,7 +219,7 @@ common.expectsError(
219
219
padding : crypto . constants . RSA_PKCS1_PSS_PADDING ,
220
220
saltLength : vector . salt . length / 2
221
221
} , vector . signature , 'hex' ) ;
222
- assert . strictEqual ( verified , true , 'verify (PSS)' ) ;
222
+ assert . strictEqual ( verified , true ) ;
223
223
}
224
224
225
225
const examples = JSON . parse ( fixtures . readSync ( 'pss-vectors.json' , 'utf8' ) ) ;
0 commit comments