Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

crypt::random::source::base(3pm) [debian man page]

Crypt::Random::Source::Base(3pm)			User Contributed Perl Documentation			  Crypt::Random::Source::Base(3pm)

NAME
Crypt::Random::Source::Base - Abstract base class for Crypt::Random::Source classes SYNOPSIS
use Moose; extends qw(Crypt::Random::Source::Base); DESCRIPTION
This is an abstract base class. In the future it will be a role. METHODS
get $n, %args Gets $n random bytes and returns them as a string. This method may produce fatal errors if the source was unable to provide enough data. read $buf, $n, [ $off ] This method is cannibalized from IO::Scalar. It provides an IO::Handle work-alike. Note that subclasses override this to operate on a real handle directly if available. seed @stuff On supporting sources this method will add @stuff, whatever it may be, to the random seed. Some sources may not support this, so be careful. available This is a class method, such that when it returns true calling "new" without arguments on the class should provide a working source of random data. This is use by Crypt::Random::Source::Factory. rank This is a class method, with some futz value for a ranking, to help known good sources be tried before known bad (slower, less available) sources. get_data %Params Provided for compatibility with Crypt::Random AUTHOR
Yuval Kogman <nothingmuch@woobling.org> COPYRIGHT AND LICENSE
This software is copyright (c) 2011 by Yuval Kogman. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. perl v5.14.2 2011-01-05 Crypt::Random::Source::Base(3pm)

Check Out this Related Man Page

Random(3)						User Contributed Perl Documentation						 Random(3)

NAME
Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator SYNOPSIS
use Crypt::OpenSSL::Random; Crypt::OpenSSL::Random::random_seed($good_random_data); Crypt::OpenSSL::Random::random_egd("/tmp/entropy"); Crypt::OpenSSL::Random::random_status() or die "Unable to sufficiently seed the random number generator". my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10); my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10); DESCRIPTION
Crypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator EXPORT None by default. Static Methods random_bytes This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned. random_pseudo_bytes This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. random_seed This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this function with non-random bytes is of limited value at best! random_egd This function seeds the PRNG with data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon on succes, or -1 if not enough bytes were read, or if the connection to the daemon failed. random_status This function returns true if the PRNG has sufficient seeding. BUGS
Because of the internal workings of OpenSSL's random library, the pseudo-random number generator (PRNG) accessed by Crypt::OpenSSL::Random will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to seed the PRNG used there from one used here. This class is still advantageous, however, as it centralizes other methods, such as random_egd, in one place. AUTHOR
Ian Robertson, iroberts@cpan.com SEE ALSO
perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3). POD ERRORS
Hey! The above document had some coding errors, which are explained below: Around line 62: '=item' outside of any '=over' Around line 93: You forgot a '=back' before '=head1' perl v5.18.2 2007-05-20 Random(3)
Man Page