The fact that you calling random_seed with the same data, doesn't mean that you will get the same random data. If you look onto Crypt::OpenSSL::Random documentation, it doesn't claim that with the same seed it will produce the same pseudo random sequence. This example demonstrates the opposite, every time you run it it will produce different result:
use 5.012; use warnings; use Crypt::OpenSSL::Random; use MIME::Base64; Crypt::OpenSSL::Random::random_seed("This is not a random seed"); my $random_bytes = Crypt::OpenSSL::Random::random_bytes(20); say encode_base64($random_bytes);
Update:
Crypt::OpenSSL::RSA has new_key_from_parameters method, which generates keypair from the provided parameters. So the only problem you need to solve is to generate key parameters from the password. Have a look onto next_prime from Math::Primality package for generating big primes from the password.
PS: I assume that you know what are you doing
In reply to Re: Generate RSA keypair in perl efficently with custom PRNG
by zwon
in thread Generate RSA keypair in perl efficently with custom PRNG
by sebastiannielsen
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |