%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const tls = require('tls'); // We could get the `tlsSocket.servername` even if the event of "tlsClientError" // is emitted. const serverOptions = { requestCert: true, rejectUnauthorized: false, SNICallback: function(servername, callback) { if (servername === 'c.another.com') { callback(null, {}); } else { callback(new Error('Invalid SNI context'), null); } } }; function test(options) { const server = tls.createServer(serverOptions, common.mustNotCall()); server.on('tlsClientError', common.mustCall((err, socket) => { assert.strictEqual(err.message, 'Invalid SNI context'); // The `servername` should match. assert.strictEqual(socket.servername, options.servername); })); server.listen(0, () => { options.port = server.address().port; const client = tls.connect(options, common.mustNotCall()); client.on('error', common.mustCall((err) => { assert.strictEqual(err.message, 'Client network socket' + ' disconnected before secure TLS connection was established'); })); client.on('close', common.mustCall(() => server.close())); }); } test({ port: undefined, servername: 'c.another.com', rejectUnauthorized: false }); test({ port: undefined, servername: 'c.wrong.com', rejectUnauthorized: false });