NAME
Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries
Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator
SYNOPSIS
use Crypt::OpenSSL::Random;
DESCRIPTION
Crypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator
EXPORT
None by default.
Static Methods
- random_bytes
-
This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned.
- random_pseudo_bytes
-
This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc.
- random_seed
-
This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this function with non-random bytes is of limited value at best!
- random_egd
-
This function seeds the PRNG with data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon on succes, or -1 if not enough bytes were read, or if the connection to the daemon failed.
- random_status
-
This function returns true if the PRNG has sufficient seeding.
AUTHOR
Ian Robertson, iroberts@cpan.com
SEE ALSO
perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).
2 POD Errors
The following errors were encountered while parsing the POD:
- Around line 57:
'=item' outside of any '=over'
- Around line 89:
You forgot a '=back' before '=head1'