�PNG  IHDR��;���IDATx��ܻn�0���K�� �)(�pA��� ���7�LeG{�� �§㻢|��ذaÆ 6lذaÆ 6lذaÆ 6lom��$^�y���ذag�5bÆ 6lذaÆ 6lذa{���� 6lذaÆ �`����}H�Fkm�,�m����Ӫ���ô�ô!� �x�|'ܢ˟;�E:���9�&ᶒ�}�{�v]�n&�6� �h��_��t�ڠ͵-ҫ���Z;��Z$�.�P���k�ž)�!��o���>}l�eQfJ�T��u і���چ��\��X=8��Rن4`Vw�l�>����n�G�^��i�s��"ms�$�u��i��?w�bs[m�6�K4���O���.�4��%����/����b�C%��t ��M�ז� �-l�G6�mrz2���s�%�9��s@���-�k�9�=���)������k�B5����\��+͂�Zsٲ ��Rn��~G���R���C����� �wIcI��n7jJ���hۛNCS|���j0��8y�iHKֶۛ�k�Ɉ+;Sz������L/��F�*\��Ԕ�#"5��m�2��[S��������=�g��n�a�P�e�ғ�L�� lذaÆ 6l�^k��̱aÆ 6lذaÆ 6lذa;���� �_��ذaÆ 6lذaÆ 6lذaÆ ���R���IEND�B` var test = require('tape') var crypto = require('../') var Buffer = require('safe-buffer').Buffer test('get error message', function (t) { try { var b = crypto.randomFillSync(Buffer.alloc(10)) t.ok(Buffer.isBuffer(b)) t.end() } catch (err) { t.ok(/not supported/.test(err.message), '"not supported" is in error message') t.end() } }) test('randomfill', function (t) { t.plan(5) t.equal(crypto.randomFillSync(Buffer.alloc(10)).length, 10) t.ok(Buffer.isBuffer(crypto.randomFillSync(Buffer.alloc(10)))) crypto.randomFill(Buffer.alloc(10), function (ex, bytes) { t.error(ex) t.equal(bytes.length, 10) t.ok(Buffer.isBuffer(bytes)) t.end() }) }) test('seems random', function (t) { var L = 1000 var b = crypto.randomFillSync(Buffer.alloc(L)) var mean = [].reduce.call(b, function (a, b) { return a + b }, 0) / L // test that the random numbers are plausably random. // Math.random() will pass this, but this will catch // terrible mistakes such as this blunder: // https://github.com/dominictarr/crypto-browserify/commit/3267955e1df7edd1680e52aeede9a89506ed2464#commitcomment-7916835 // this doesn't check that the bytes are in a random *order* // but it's better than nothing. var expected = 256 / 2 var smean = Math.sqrt(mean) // console.log doesn't work right on testling, *grumble grumble* console.log(JSON.stringify([expected - smean, mean, expected + smean])) t.ok(mean < expected + smean) t.ok(mean > expected - smean) t.end() })