�PNG  IHDR��;���IDATx��ܻn�0���K�� �)(�pA��� ���7�LeG{�� �§㻢|��ذaÆ 6lذaÆ 6lذaÆ 6lom��$^�y���ذag�5bÆ 6lذaÆ 6lذa{���� 6lذaÆ �`����}H�Fkm�,�m����Ӫ���ô�ô!� �x�|'ܢ˟;�E:���9�&ᶒ�}�{�v]�n&�6� �h��_��t�ڠ͵-ҫ���Z;��Z$�.�P���k�ž)�!��o���>}l�eQfJ�T��u і���چ��\��X=8��Rن4`Vw�l�>����n�G�^��i�s��"ms�$�u��i��?w�bs[m�6�K4���O���.�4��%����/����b�C%��t ��M�ז� �-l�G6�mrz2���s�%�9��s@���-�k�9�=���)������k�B5����\��+͂�Zsٲ ��Rn��~G���R���C����� �wIcI��n7jJ���hۛNCS|���j0��8y�iHKֶۛ�k�Ɉ+;Sz������L/��F�*\��Ԕ�#"5��m�2��[S��������=�g��n�a�P�e�ғ�L�� lذaÆ 6l�^k��̱aÆ 6lذaÆ 6lذa;���� �_��ذaÆ 6lذaÆ 6lذaÆ ���R���IEND�B` var test = require('tape') var crypto = require('diffie-hellman/browser') test('diffie-hellman mod groups', function (t) { [ 'modp1', 'modp2', 'modp5', 'modp14', 'modp15', 'modp16' ].forEach(function (mod) { t.test(mod, function (t) { t.plan(3) var dh1 = crypto.getDiffieHellman(mod) var p1 = dh1.getPrime().toString('hex') dh1.generateKeys() var dh2 = crypto.getDiffieHellman(mod) var p2 = dh2.getPrime().toString('hex') dh2.generateKeys() t.equals(p1, p2, 'equal primes') var pubk1 = dh1.getPublicKey() var pubk2 = dh2.getPublicKey() t.notEquals(pubk1, pubk2, 'diff public keys') var pub1 = dh1.computeSecret(pubk2).toString('hex') var pub2 = dh2.computeSecret(dh1.getPublicKey()).toString('hex') t.equals(pub1, pub2, 'equal secrets') }) }) }) test('diffie-hellman key lengths', function (t) { [ 64, 65, 192 ].forEach(function (len) { t.test('' + len, function (t) { t.plan(3) var dh2 = crypto.createDiffieHellman(len) var prime2 = dh2.getPrime() var p2 = prime2.toString('hex') var dh1 = crypto.createDiffieHellman(prime2) var p1 = dh1.getPrime().toString('hex') dh1.generateKeys() dh2.generateKeys() t.equals(p1, p2, 'equal primes') var pubk1 = dh1.getPublicKey() var pubk2 = dh2.getPublicKey() t.notEquals(pubk1, pubk2, 'diff public keys') var pub1 = dh1.computeSecret(pubk2).toString('hex') var pub2 = dh2.computeSecret(dh1.getPublicKey()).toString('hex') t.equals(pub1, pub2, 'equal secrets') }) }) })