Skip site navigation (1)Skip section navigation (2)

FreeBSD Man Pages

Man Page or Keyword Search:
Man Architecture
Apropos Keyword Search (all sections) Output format
home | help
BN_rand(3), BN_pseudo_rand(3)
generate pseudo-random number
BN_rand(3), BN_pseudo_rand(3), BN_rand_range(3), BN_pseudo_rand_range(3)
generate pseudo-random number
CURLOPT_RANDOM_FILE(3)
specify a source for random data
DES_random_key(3), DES_set_key(3), DES_key_sched(3), DES_set_key_checked(3), DES_set_key_unchecked(3), DES_set_odd_parity(3), DES_is_weak_key(3), DES_ecb_encrypt(3), DES_ecb2_encrypt(3), DES_ecb3_encrypt(3), DES_ncbc_encrypt(3), DES_cfb_encrypt(3), DES_ofb_encrypt(3), DES_pcbc_encrypt(3), DES_cfb64_encrypt(3), DES_ofb64_encrypt(3), DES_xcbc_encrypt(3), DES_ede2_cbc_encrypt(3), DES_ede2_cfb64_encrypt(3), DES_ede2_ofb64_encrypt(3), DES_ede3_cbc_encrypt(3), DES_ede3_cbcm_encrypt(3), DES_ede3_cfb64_encrypt(3), DES_ede3_ofb64_encrypt(3), DES_cbc_cksum(3), DES_quad_cksum(3), DES_string_to_key(3), DES_string_to_2keys(3), DES_fcrypt(3), DES_crypt(3), DES_enc_read(3), DES_enc_write(3)
DES encryption
HPL_dmatgen(3)
random matrix generator
HPL_jumpit(3)
jump into the random sequence
HPL_pdmatgen(3)
Parallel random matrix generator
HPL_rand(3)
random number generator
HPL_setran(3)
Manage the random number generator
HPL_xjumpm(3)
Compute constants to jump in the random sequence
RAND_bytes(3), RAND_pseudo_bytes(3)
generate random data
Random(3o)
Pseudo-random number generators (PRNG)
Random.State(3o)
no description
Tspi_TPM_GetRandom(3)
generate a random number on the TPM
Tspi_TPM_StirRandom(3)
add entropy to the TPM random number generator
apg(1)
generates several random passwords
apgd(8)
server that generates several random passwords
barcode(6)
draws a random sequence of barcodes for the products you enjoy
bp_mutate.pl(1)
randomly mutagenize a single protein or DNA sequence
braid(6)
draws random color-cycling braids around a circle
cattag(1)
Print a random tagline
cwgen(1)
generate groups of random characters for Morse code practice
dictzip(1), dictunzip(1)
compress (or expand) files, allowing random access
dieharder(1)
A testing and benchmarking tool for random number generators
echoping_random(1)
echoping plugin which just sleeps a random time
fracplanet(1)
Create and view random fractal terrain and planets
fst-generate(1)
randomly generate strings of character pairs from a transducer
gen_at_graph(1)
generates a random graph for use in algotutor
generate(1)
random sentence generator from a grammar
generate-ngram(1)
random sentence generator from N-gram
generate_randfile(1)
a program to generate a file of random data
genrandom(8)
generate a file containing random data
gensig(1)
Generate signatures with random taglines on a FIFO
gentest(1)
Run random generic SMB operations against two SMB servers and show the differences in behavior
gmx-genconf(1)
Multiply a conformation in 'random' orientations
gnutls_handshake_set_random(3)
API function
gnutls_ocsp_req_randomize_nonce(3)
API function
gnutls_pkcs11_token_get_random(3)
API function
gnutls_random_art(3)
API function
gnutls_session_get_random(3)
API function
greynetic(6)
draw random stippled/color rectangles
gsasl_random(3)
API function
gsasl_randomize(3)
API function
gshuf(1), shuf(1)
generate random permutations
gsl-randist(1)
generate random samples from various distributions
hmmsim(1)
collect score distributions on random sequences
ipbt(1)
play back tty recording files with random access
irandstream(3bobcat), FBB::IRandStream(3bobcat)
Istream producing random numbers
krb5_c_block_size(3), krb5_c_decrypt(3), krb5_c_encrypt(3), krb5_c_encrypt_length(3), krb5_c_enctype_compare(3), krb5_c_get_checksum(3), krb5_c_is_coll_proof_cksum(3), krb5_c_is_keyed_cksum(3), krb5_c_keylength(3), krb5_c_make_checksum(3), krb5_c_make_random_key(3), krb5_c_set_checksum(3), krb5_c_valid_cksumtype(3), krb5_c_valid_enctype(3), krb5_c_verify_checksum(3), krb5_c_checksum_length(3)
Kerberos 5 crypto API
krb5_generate_random_block(3)
Kerberos 5 random functions
largeprimes(1)
-- generate large, random primes using Crypt::Primes
layingsiege(7), Siege(7)
An HTTP/HTTPS stress tester was designed orignally as a internet usage simulator. In short, its role was to simulate the activity of many simultaneous users hitting a HTTP server. We were debugging some java code and during that process we arrived at a point where the code could withstand an acceptable number of users hitting a single URL but it could not withstand the seemingly random activity that characterizes many users hitting many URLs on a webserver. In order to debug the problem in a lab environment, I developed a program that simply read a bunch of URLs ( we used images, scripts, static html, jsps, etc. ) into memory and hit them randomly. The result was a success. We were able to break the code in the lab, an occurance which ultimately allowed us to fix it and put it into production. As the developers code improved, siege improved until we ultimately had good java code and a pretty decent regression tool. It was helpful for us, I hope it is helpful to you. In order to feel comfortable putting code into production, you need a way to measure its performance and to determine its threshold for failure. If you break your database pool at 250 simultaneous users and you average less then one-hundred simultaneous users and the code performs favorably, you can feel good about putting it into production. At the same time, if you should monitor trends in your site's activity and prepare for the moment when your traffic starts to near your threshold for failure. As a webdeveloper or websystems administrator you have little to no control over your user group. They can visit your site anytime day or night. Your domain name could resemble a popular site, yoohoo.com? And when was the last time marketing informed you about an approaching advertising blitz? You must be prepared for anything. That is why stress and performance testing is so important. I would not recommend putting anything into production until you have a good feel for how it will perform under duress
libdieharder(3)
A testing and benchmarking library for random number generators
llvm-stress-devel(1), llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
llvm-stress32(1), llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
llvm-stress33(1), llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
llvm-stress34(1), llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
llvm-stress35(1), llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
lorem(1)
Generate random Latin looking text using Text::Lorem
lsh-make-seed(1)
Creates random seed file for the YARROW pseudorandomnessgenerator
macof(8)
flood a switched LAN with random MAC addresses
maze(6)
an automated X11 demo repeatedly creating and solving a random maze
memshuffle(3)
make an array be in random order
mountain(6)
random 3D plots that look vaguely mountainous
nessus-mkrand(1)
Creates a file with random bytes
nonsense(6)
generates random text from datafiles and templates
openvas-mkrand(1)
Creates a file with random bytes
pacman(6)
simulates a game of Pac-Man on a randomly-created level
pad(1), PAD(1)
Random pad utility
polygraph-rng-test(1)
random number generator test
pwmake(1)
simple tool for generating random relatively easily pronounceable passwords
quiz(6)
random knowledge tests
rahash2(1), hasher2(1)
block based hashing utility Apr 2, 2013 SYNOPSIS hasher2 Fl hBrkv Fl a Ar algorithm Fl b Ar size Fl s Ar string Fl i Ar iterations Fl S Ar seed Fl f Ar from Fl t Ar to [file] ... DESCRIPTION This program is part of the radare project. Hasher allows you to calculate, check and show the hash values of each block of a target file. The block size is 32768 bytes by default. It's allowed to hash from stdin using '-' as a target file. You can hash big files by hashing each block and later determine what part of it has been modified. Useful for filesystem analysis. This command can be used to calculate hashes of a certain part of a file or a command line passed string. This is the command used by the '#' command of radare. -tag -width Fl Fl a Ar algo Select an algorithm for the hashing. Valid values are md5, crc32 and sha1 Fl b Ar blocksize Define the block size Fl i Ar iters Apply the hash Iters times to itself+seed Fl B Show per-block hash Fl k Show result using OpenSSH's VisualHostKey randomart algorithm Fl s Ar string Hash this string instead of using the 'source' and 'hash-file' arguments. Fl S Ar [^]s:string|hexstr Set seed to hash with, use ^to prefix seed, otherwise its suffixed. Fl f Ar from Start hashing at given address Fl t Ar to Stop hashing at given address Fl r Show output in radare commands Fl v Show version information Fl h Show usage help message. SEE ALSO radare2(1) , rafind2(1) , rahash2(1) , rabin2(1) , radiff2(1) , rasm2(1) , ragg2(1) , rarun2(1) , rax2(1) , AUTHORS pancake <pancake@nopcode.org>, nibble <nibble@develsec.org>
rand(1)
randomize the order of a stream
rand(3)
pseudo-random number generator
randbuffer(3bobcat), FBB::RandBuffer(3bobcat)
std::streambuf generating random numbers
random(n)
Create and manipulate randomizer channels
randpkt(1)
Random Packet Generator
randseq(1)
randomly shuffle a protein or DNA sequence
ranpwd(1)
generate random passwords
rax2(1)
radare base converter Apr 11, 2013 SYNOPSIS rax2 Fl ebBsSvxkh [expr] ... DESCRIPTION This command is part of the radare project. This command allows you to convert values between positive and negative integer, float octal, binary and hexadecimal values. OPTIONS -tag -width Fl Fl b Convert from binary string to caracter (rax2 -b 01000101) Fl B Keep de same base as the input data Fl e Swap endian. Fl k Show randomart key asciiart for values or hexpairs Fl s Convert from hex string to caracter (rax2 -s 43 4a 50) Fl S Convert from hex string to caracter (rax2 -S C J P) Fl u Convert given value to human readable units format Fl v Show program version Fl x Convert a string into a hash Fl h Show usage help message USAGE Available variable types are: int -> hex rax2 10 hex -> int rax2 0xa -int -> hex rax2 -77 -hex -> int rax2 0xffffffb3 int -> bin rax2 b30 bin -> int rax2 1010d float -> hex rax2 3.33f hex -> float rax2 Fx40551ed8 oct -> hex rax2 35o hex -> oct rax2 Ox12 (O is a letter) bin -> hex rax2 1100011b hex -> bin rax2 Bx63 With no arguments, rax2 reads values from stdin. You can pass one or more values as arguments. $ rax2 33 0x41 0101b 0x21 65 0x5 You can do 'unpack' hexpair encoded strings easily. $ rax2 -s 41 42 43 ABC And it supports some math operations. $ rax2 0x5*101b+5 30 It is very useful tool for scripting, so you can read floating point values, or get the integer offset of a jump or a stack delta when analyzing programs. SEE ALSO radare2(1) , rahash2(1) , rafind2(1) , rabin2(1) , radiff2(1) , ragg2(1) , rarun2(1) , rasm2(1) , AUTHORS pancake <pancake@nopcode.org>, nibble <nibble@develsec.org>
rectangle-coverage.pl(1)
Find the dot maximally covered by (random) rectangles
rl(1)
Randomize Lines
rlenoise(1)
Add random noise to an image
rndpassw(1)
generate random passwords
run(1)
run a command on a machine at random
rwrandomizeip(1)
Randomize the IP addresses in a SiLK Flow file
rwrecgenerator(1)
Generate random SiLK Flow records
scrub-files(1)
securely erase files by filling with random data first
sex(6), Sex(6)
spout silly, random porn-like text
shishi_authenticator_add_random_subkey(3)
API function
shishi_authenticator_add_random_subkey_etype(3)
API function
shishi_cipher_randomlen(3)
API function
shishi_key_from_random(3)
API function
shishi_key_random(3)
API function
shishi_random_to_key(3)
API function
shishi_randomize(3)
API function
shuffle(1)
print a random permutation of the command line arguments
snobol4random(3)
SNOBOL4 random number functions
strshuffle(3)
make the characters in a string be in random order
triangle(6)
random mountains using iterative subdivision of triangles
uuid_generate(3), uuid_generate_random(3), uuid_generate_time(3)
create a new unique UUID value
vidwhacker(6)
grab images and apply random filters to them
voronoi(6)
draws a randomly-colored Voronoi tessellation
wander(6)
colorful random-walk
webcollage(6)
decorate the screen with random images from the web
xscreensaver-getimage(1)
put some randomly-selected image on the root window
xscreensaver-getimage-file(1)
put a randomly-selected image on the root window
home | help