%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; const common = require('../common'); const assert = require('assert'); if (!common.hasCrypto) common.skip('missing crypto'); const https = require('https'); const fixtures = require('../common/fixtures'); const options = { key: fixtures.readKey('agent1-key.pem'), // NOTE: Certificate Common Name is 'agent1' cert: fixtures.readKey('agent1-cert.pem'), // NOTE: TLS 1.3 creates new session ticket **after** handshake so // `getSession()` output will be different even if the session was reused // during the handshake. secureProtocol: 'TLSv1_2_method' }; const ca = [ fixtures.readKey('ca1-cert.pem') ]; const server = https.createServer(options, function(req, res) { res.end('ok'); }).listen(0, common.mustCall(function() { const port = this.address().port; const req = https.get({ port, path: '/', ca, servername: 'nodejs.org', }, common.mustNotCall(() => {})); req.on('error', common.mustCall((err) => { assert.strictEqual( err.message, 'Hostname/IP does not match certificate\'s altnames: ' + 'Host: nodejs.org. is not cert\'s CN: agent1'); const second = https.get({ port, path: '/', ca, servername: 'nodejs.org', }, common.mustNotCall(() => {})); second.on('error', common.mustCall((err) => { server.close(); assert.strictEqual( err.message, 'Hostname/IP does not match certificate\'s altnames: ' + 'Host: nodejs.org. is not cert\'s CN: agent1'); })); })); }));