Random(3) | User Contributed Perl Documentation | Random(3) |
Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access
use Crypt::OpenSSL::Random; Crypt::OpenSSL::Random::random_seed($good_random_data); Crypt::OpenSSL::Random::random_egd("/tmp/entropy"); Crypt::OpenSSL::Random::random_status() or die "Unable to sufficiently seed the random number generator". my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10); my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
"Crypt::OpenSSL::Random" provides the ability to seed and query the OpenSSL and LibreSSL library's pseudo-random number generators.
Note: On LibreSSL "random_egd()" is not defined.
None by default.
"libressl" considers this function insecure, so with libressl this function does not exist.
Because of the internal workings of OpenSSL's random library, the pseudo-random number generator (PRNG) accessed by Crypt::OpenSSL::Random will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to seed the PRNG used there from one used here. This class is still advantageous, however, as it centralizes other methods, such as "random_egd", in one place.
Ian Robertson, "iroberts@cpan.com"
Now maintained by Reini Urban, "rurban@cpan.org"
This module is available under the same licences as perl, the Artistic license and the GPL.
perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).
2018-04-22 | perl v5.34.0 |