%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const fixtures = require('../common/fixtures'); const assert = require('assert'); const tls = require('tls'); const options = { key: fixtures.readKey('agent1-key.pem'), // NOTE: Certificate Common Name is 'agent1' cert: fixtures.readKey('agent1-cert.pem'), // NOTE: TLS 1.3 creates new session ticket **after** handshake so // `getSession()` output will be different even if the session was reused // during the handshake. secureProtocol: 'TLSv1_2_method' }; const server = tls.createServer(options, common.mustCall((socket) => { socket.end(); })).listen(0, common.mustCall(() => { let connected = false; let session = null; const client = tls.connect({ rejectUnauthorized: false, port: server.address().port, }, common.mustCall(() => { assert(!connected); assert(!session); connected = true; })); client.on('session', common.mustCall((newSession) => { assert(connected); assert(!session); session = newSession; client.end(); server.close(); })); }));