Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator using the openSSL libraries |
Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator using the openSSL libraries
use Crypt::OpenSSL::Random;
Crypt::OpenSSL::Random::random_seed($good_random_data); Crypt::OpenSSL::Random::random_egd("/tmp/entropy"); Crypt::OpenSSL::Random::random_status() or die "Unable to sufficiently seed the random number generator".
my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10); my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
Crypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator.
None by default.
-1
if not enough bytes were read, or if the connection to
the daemon failed.
Because of the internal workings of OpenSSL's random library, the
pseudo-random number generator (PRNG) accessed by
Crypt::OpenSSL::Random will be different than the one accessed by any
other perl module. Hence, to use a module such as
Crypt::OpenSSL::Random, you will need to seed the PRNG used there from
one used here. This class is still advantageous, however, as it
centralizes other methods, such as random_egd
, in one place.
Ian Robertson, iroberts@cpan.com
Now maintained by Reini Urban, rurban@cpan.org
This module is available under the same licences as perl, the Artistic license and the GPL.
perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).
Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator using the openSSL libraries |