SYNOPSIS
use Crypt::OpenSSL::Random;
Crypt::OpenSSL::Random::random_seed($good_random_data);
Crypt::OpenSSL::Random::random_egd("/tmp/entropy");
Crypt::OpenSSL::Random::random_status() or
die "Unable to sufficiently seed the random number generator".
my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10);
my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTION
"Crypt::OpenSSL::Random" provides the ability to seed and query the OpenSSL and LibreSSL library's pseudo-random number generators.Note: On LibreSSL "random_egd()" is not defined.
EXPORT
None by default.Static Methods
- random_bytes (IV num_bytes)
- This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned.
- random_pseudo_bytes (IV num_bytes)
- This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc.
- random_seed (PV random_bytes_string)
- This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this function with non-random bytes is of limited value at best!
- random_egd (PV egd_string)
-
This function seeds the PRNG with data from the specified entropy
gathering daemon. Returns the number of bytes read from the daemon on
success, or "-1" if not enough bytes were read, or if the connection to
the daemon failed.
"libressl" considers this function insecure, so with libressl this function does not exist.
- random_status ()
- This function returns true if the PRNG has sufficient seeding.