Name : perl-Crypt-Random-TESHA2
| |
Version : 0.01
| Vendor : obs://build_opensuse_org/devel:languages:perl
|
Release : lp151.1.1
| Date : 2018-12-03 22:03:01
|
Group : Development/Libraries/Perl
| Source RPM : perl-Crypt-Random-TESHA2-0.01-lp151.1.1.src.rpm
|
Size : 0.05 MB
| |
Packager : (none)
| |
Summary : Random numbers using timer/schedule entropy
|
Description :
Generate random numbers using entropy gathered from timer / scheduler jitter.
This can be used to generate non-pseudorandom data to seed a PRNG (e.g. \'srand\'/\'rand\', Math::Random::MT, etc.) or CSPRNG (e.g. AES-CTR or Math::Random::ISAAC). You may use it directly or as part of a random source module that first checks for O/S randomness sources.
Only Perl CORE modules are used, making this very portable. However, systems must have a high resolution timer and support \'usleep\' from Time::HiRes.
At installation time, measurements are taken of the estimated entropy gathered by the timer differences. If the results indicated we could not get good results, then the module will consider itself \"weak\". On the first use of any of the functions that return randomness (e.g. random_bytes), the module will carp about not being a strong randomness source. However, two special options, \":strong\" and \":weak\" may be given to the importer to change this behavior. If \":strong\" is used, then the module will croak. If \":weak\" is used, then no carp will be generated. The function \'is_strong\' can be used at any time for finer control. Note that this should be an unusual case, and neither flag has any effect if the module considers itself strong.
|
RPM found in directory: /packages/linux-pbone/ftp5.gwdg.de/pub/opensuse/repositories/devel:/languages:/perl/openSUSE_Leap_15.1/noarch |
Hmm ... It's impossible ;-) This RPM doesn't exist on any FTP server
Provides :
perl(Crypt::Random::TESHA2)
perl(Crypt::Random::TESHA2::Config)
perl-Crypt-Random-TESHA2
Requires :