%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); // Test interaction of compiled-in CAs with user-provided CAs. const assert = require('assert'); const fs = require('fs'); const fixtures = require('../common/fixtures'); const tls = require('tls'); function filenamePEM(n) { return fixtures.path('keys', `${n}.pem`); } function loadPEM(n) { return fs.readFileSync(filenamePEM(n)); } const caCert = loadPEM('ca1-cert'); const opts = { host: 'www.nodejs.org', port: 443, rejectUnauthorized: true }; // Success relies on the compiled in well-known root CAs tls.connect(opts, common.mustCall(end)); // The .ca option replaces the well-known roots, so connection fails. opts.ca = caCert; tls.connect(opts, fail).on('error', common.mustCall((err) => { assert.strictEqual(err.message, 'unable to get local issuer certificate'); })); function fail() { assert.fail('should fail to connect'); } // New secure contexts have the well-known root CAs. opts.secureContext = tls.createSecureContext(); tls.connect(opts, common.mustCall(end)); // Explicit calls to addCACert() add to the default well-known roots, instead // of replacing, so connection still succeeds. opts.secureContext.context.addCACert(caCert); tls.connect(opts, common.mustCall(end)); function end() { this.end(); }