Security Advisories (1)
CVE-2018-25107

In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.

NAME

Crypt::Random::Source::Weak::rand - Use rand to create random bytes.

SYNOPSIS

use Crypt::Random::Source::Weak::rand;

my $p = Crypt::Random::Source::Weak::rand->new;

$p->get(1024);

DESCRIPTION

This is a weak source of random data, that uses Perl's builtin rand function.

METHODS

seed @blah

Sets the random seed to a checksum of the stringified values of @blah.

There is no need to call this method unless you want the random sequence to be identical to a previously run, in which case you should seed with the same value.

get $n

Produces $n random bytes.