Crypt::OpenSSL::Random5.12 man page on Darwin

Man page or keyword search:  
man Server   23457 pages
apropos Keyword Search (all sections)
Output format
Darwin logo
[printable version]

Random(3)	      User Contributed Perl Documentation	     Random(3)

NAME
       Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL
       libraries

       Crypt::OpenSSL::Random - Routines for accessing the OpenSSL
       pseudo-random number generator

SYNOPSIS
	 use Crypt::OpenSSL::Random;

	 Crypt::OpenSSL::Random::random_seed($good_random_data);
	 Crypt::OpenSSL::Random::random_egd("/tmp/entropy");
	 Crypt::OpenSSL::Random::random_status() or
	   die "Unable to sufficiently seed the random number generator".

	 my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10);
	 my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);

DESCRIPTION
       Crypt::OpenSSL::Random provides the ability to seed and query the
       OpenSSL library's pseudo-random number generator

   EXPORT
       None by default.

Static Methods
       random_bytes
	   This function, returns a specified number of cryptographically
	   strong pseudo-random bytes from the PRNG.  If the PRNG has not been
	   seeded with enough randomness to ensure an unpredictable byte
	   sequence, then a false value is returned.

       random_pseudo_bytes
	   This function, is similar to c<random_bytes>, but the resulting
	   sequence of bytes are not necessarily unpredictable.	 They can be
	   used for non-cryptographic purposes and for certain purposes in
	   cryptographic protocols, but usually not for key generation etc.

       random_seed
	   This function seeds the PRNG with a supplied string of bytes.  It
	   returns true if the PRNG has sufficient seeding.  Note: calling
	   this function with non-random bytes is of limited value at best!

       random_egd
	   This function seeds the PRNG with data from the specified entropy
	   gathering daemon.  Returns the number of bytes read from the daemon
	   on succes, or -1 if not enough bytes were read, or if the
	   connection to the daemon failed.

       random_status
	   This function returns true if the PRNG has sufficient seeding.

BUGS
       Because of the internal workings of OpenSSL's random library, the
       pseudo-random number generator (PRNG) accessed by
       Crypt::OpenSSL::Random will be different than the one accessed by any
       other perl module.  Hence, to use a module such as
       Crypt::OpenSSL::Random, you will need to seed the PRNG used there from
       one used here.  This class is still advantageous, however, as it
       centralizes other methods, such as random_egd, in one place.

AUTHOR
       Ian Robertson, iroberts@cpan.com

SEE ALSO
       perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).

POD ERRORS
       Hey! The above document had some coding errors, which are explained
       below:

       Around line 62:
	   '=item' outside of any '=over'

       Around line 93:
	   You forgot a '=back' before '=head1'

perl v5.12.5			  2007-05-20			     Random(3)
[top]

List of man pages available for Darwin

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net