SNOBOL4RANDOM(3) | CSNOBOL4B 2.3.2 | Janurary 1, 2024
NAME
snobol4random – SNOBOL4 random number functions
SYNOPSIS
-INCLUDE 'random.sno'
SRANDOM(number)
SRANDOMDEV()
number = RANDOM()
DESCRIPTION
The functions described in this manual page are not cryptographically secure.
The RANDOM() function uses a non-linear additive feedback random
number generator employing a default table of size 31 long integers to
return successive pseudo-random numbers in the range from 0 to
(2**31)-1. The period of this random number generator is very large,
approximately 16*((2**31)-1).
-
SRANDOM()
-
takes its INTEGER argument as the seed for a new sequence of
pseudo-random numbers to be returned by RANDOM(). These sequences
are repeatable by calling SRANDOM() with the same seed value.
RANDOM() will by default produce a sequence of numbers that can be
duplicated by calling SRANDOM() with 1 as the seed.
-
SRANDOMDEV()
-
initializes a state array using the random(4) random number device
(if available) which returns good random numbers, suitable for
cryptographic use. Note that this particular seeding procedure can
generate states which are impossible to reproduce by calling
SRANDOM() with any value, since the succeeding terms in the state
buffer are no longer derived from the LC algorithm applied to a fixed
seed. Data from the random(4) device may be precious, and repeated
calls to SRANDOMDEV() should be avoided. When the random(4)
device is not available, a 32-bit seed will be generated using time,
process id, and an element of the process stack.
SEE ALSO
snobol4(1), random(3), random(4).
AUTHORS
Earl T. Cohen
Jacob S. Rosenberg
Philip L. Budne