diff options
Diffstat (limited to 'src/boost/libs/random/example/password.cpp')
-rw-r--r-- | src/boost/libs/random/example/password.cpp | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/src/boost/libs/random/example/password.cpp b/src/boost/libs/random/example/password.cpp new file mode 100644 index 000000000..273b4c817 --- /dev/null +++ b/src/boost/libs/random/example/password.cpp @@ -0,0 +1,49 @@ +// password.cpp +// +// Copyright (c) 2010 +// Steven Watanabe +// +// Distributed under the Boost Software License, Version 1.0. (See +// accompanying file LICENSE_1_0.txt or copy at +// http://www.boost.org/LICENSE_1_0.txt) + +//[password +/*` + For the source of this example see + [@boost://libs/random/example/password.cpp password.cpp]. + + This example demonstrates generating a random 8 character + password. + */ + + +#include <boost/random/random_device.hpp> +#include <boost/random/uniform_int_distribution.hpp> +#include <iostream> + +int main() { + /*<< We first define the characters that we're going + to allow. This is pretty much just the characters + on a standard keyboard. + >>*/ + std::string chars( + "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ" + "1234567890" + "!@#$%^&*()" + "`~-_=+[{]}\\|;:'\",<.>/? "); + /*<< We use __random_device as a source of entropy, since we want + passwords that are not predictable. + >>*/ + boost::random::random_device rng; + /*<< Finally we select 8 random characters from the + string and print them to cout. + >>*/ + boost::random::uniform_int_distribution<> index_dist(0, chars.size() - 1); + for(int i = 0; i < 8; ++i) { + std::cout << chars[index_dist(rng)]; + } + std::cout << std::endl; +} + +//] |