Security Advisories (1)
CVE-2018-25107

In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.

NAME

Crypt::Random::Source - Get weak or strong random data from pluggable sources

VERSION

version 0.08

SYNOPSIS

use Crypt::Random::Source qw(get_strong);

# get 10 cryptographically strong random bytes from an available source
my $bytes = get_strong(10);

DESCRIPTION

This module provides implementations for a number of byte oriented sources of random data.

See Crypt::Random::Source::Factory for a more powerful way to locate sources, and the various sources for specific implementations.

EXPORTS

get
get_weak
get_strong

These functions delegate to a source chosen by an instance of Crypt::Random::Source::Factory, calling get

SEE ALSO

Crypt::Random, Crypt::Util

AUTHOR

יובל קוג'מן (Yuval Kogman) <nothingmuch@woobling.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2008 by Yuval Kogman.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.

CONTRIBUTORS

  • David Pottage <spudsoup@cpan.org>

  • Florian Ragwitz <rafl@debian.org>

  • Karen Etheridge <ether@cpan.org>

  • Max Kanat-Alexander <mkanat@es-compy.(none)>

  • Yuval Kogman <nothingmuch@woobling.org>