Automatically generated by Pod::Man 4.09 (Pod::Simple 3.35) Standard preamble: ========================================================================
NAMECrypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access
use Crypt::OpenSSL::Random; Crypt::OpenSSL::Random::random_seed($good_random_data); Crypt::OpenSSL::Random::random_egd("/tmp/entropy"); Crypt::OpenSSL::Random::random_status() or die "Unable to sufficiently seed the random number generator". my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10); my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTION"Crypt::OpenSSL::Random" provides the ability to seed and query the OpenSSL and LibreSSL library's pseudo-random number generators.
Note: On LibreSSL "random_egd()" is not defined.
None by default.
- random_bytes (IVnum_bytes)
This function, returns a specified number of cryptographically strong
pseudo-random bytes from the PRNG.If thePRNGhas not been seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned.
- random_pseudo_bytes (IVnum_bytes)
- This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc.
- random_seed (PVrandom_bytes_string)
This function seeds the PRNGwith a supplied string of bytes. It returns true if thePRNGhas sufficient seeding. Note: calling this function with non-random bytes is of limited value at best!
- random_egd (PVegd_string)
This function seeds the PRNGwith data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon on success, or "-1" if not enough bytes were read, or if the connection to the daemon failed.
"libressl" considers this function insecure, so with libressl this function does not exist.
- random_status ()
This function returns true if the PRNGhas sufficient seeding.
BUGSBecause of the internal workings of OpenSSL's random library, the pseudo-random number generator (
PRNG) accessed by Crypt::OpenSSL::Random will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to seed the
PRNGused there from one used here. This class is still advantageous, however, as it centralizes other methods, such as "random_egd", in one place.
AUTHORIan Robertson, "email@example.com"
Now maintained by Reini Urban, "firstname.lastname@example.org"
LICENSEThis module is available under the same licences as perl, the Artistic license and the