%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; // Verify that privateDecrypt() does not leave an error on the // openssl error stack that is visible to subsequent operations. const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const { generateKeyPairSync, publicEncrypt, privateDecrypt, } = require('crypto'); const pair = generateKeyPairSync('rsa', { modulusLength: 512 }); const expected = Buffer.from('shibboleth'); const encrypted = publicEncrypt(pair.publicKey, expected); const pkey = pair.privateKey.export({ type: 'pkcs1', format: 'pem' }); const pkeyEncrypted = pair.privateKey.export({ type: 'pkcs1', format: 'pem', cipher: 'aes128', passphrase: 'secret', }); function decrypt(key) { const decrypted = privateDecrypt(key, encrypted); assert.deepStrictEqual(decrypted, expected); } decrypt(pkey); assert.throws(() => decrypt(pkeyEncrypted), common.hasOpenSSL3 ? { message: 'error:07880109:common libcrypto routines::interrupted or ' + 'cancelled' } : { code: 'ERR_MISSING_PASSPHRASE' }); decrypt(pkey); // Should not throw.