Skip site navigation (1)Skip section navigation (2)

FreeBSD Man Pages

Man Page or Keyword Search:
Man Architecture
Apropos Keyword Search (all sections) Output format
home | help
arc4rand(9), arc4random(9), random(9), read_random(9), srandom(9)
supply pseudo-random numbers
arc4random(3), arc4random_buf(3), arc4random_uniform(3), arc4random_stir(3), arc4random_addrandom(3)
arc4 random number generator
drand48(3), erand48(3), lrand48(3), nrand48(3), mrand48(3), jrand48(3), srand48(3), seed48(3), lcong48(3)
pseudo random number generators and initialization routines
fsirand(8)
randomize inode generation numbers
genrandom(8)
generate a file containing random data
jot(1)
print sequential or random data
krb5_c_block_size(3), krb5_c_decrypt(3), krb5_c_encrypt(3), krb5_c_encrypt_length(3), krb5_c_enctype_compare(3), krb5_c_get_checksum(3), krb5_c_is_coll_proof_cksum(3), krb5_c_is_keyed_cksum(3), krb5_c_keylength(3), krb5_c_make_checksum(3), krb5_c_make_random_key(3), krb5_c_set_checksum(3), krb5_c_valid_cksumtype(3), krb5_c_valid_enctype(3), krb5_c_verify_checksum(3), krb5_c_checksum_length(3)
Kerberos 5 crypto API
krb5_generate_random_block(3)
Kerberos 5 random functions
krb5_keyblock(3), krb5_keyblock_get_enctype(3), krb5_copy_keyblock(3), krb5_copy_keyblock_contents(3), krb5_free_keyblock(3), krb5_free_keyblock_contents(3), krb5_generate_random_keyblock(3), krb5_generate_subkey(3), krb5_generate_subkey_extended(3), krb5_keyblock_init(3), krb5_keyblock_zero(3), krb5_random_to_key(3)
Kerberos 5 key handling functions
rand(3), srand(3), sranddev(3), rand_r(3)
bad random number generator
random(3), srandom(3), srandomdev(3), initstate(3), setstate(3)
better random number generator; routines for changing generators
random(4)
the entropy device
random_harvest(9)
gather entropy from the kernel for the entropy device
rndtest(4)
FIPS 140-2 random number generator test monitor
BN_rand(3), BN_pseudo_rand(3)
generate pseudo-random number
DES_random_key(3), DES_set_key(3), DES_key_sched(3), DES_set_key_checked(3), DES_set_key_unchecked(3), DES_set_odd_parity(3), DES_is_weak_key(3), DES_ecb_encrypt(3), DES_ecb2_encrypt(3), DES_ecb3_encrypt(3), DES_ncbc_encrypt(3), DES_cfb_encrypt(3), DES_ofb_encrypt(3), DES_pcbc_encrypt(3), DES_cfb64_encrypt(3), DES_ofb64_encrypt(3), DES_xcbc_encrypt(3), DES_ede2_cbc_encrypt(3), DES_ede2_cfb64_encrypt(3), DES_ede2_ofb64_encrypt(3), DES_ede3_cbc_encrypt(3), DES_ede3_cbcm_encrypt(3), DES_ede3_cfb64_encrypt(3), DES_ede3_ofb64_encrypt(3), DES_cbc_cksum(3), DES_quad_cksum(3), DES_string_to_key(3), DES_string_to_2keys(3), DES_fcrypt(3), DES_crypt(3), DES_enc_read(3), DES_enc_write(3)
DES encryption
RAND_bytes(3), RAND_pseudo_bytes(3)
generate random data
rand(1)
generate pseudo-random bytes
rand(3)
pseudo-random number generator
BN_rand(3), BN_pseudo_rand(3)
generate pseudo-random number
DES_random_key(3), DES_set_key(3), DES_key_sched(3), DES_set_key_checked(3), DES_set_key_unchecked(3), DES_set_odd_parity(3), DES_is_weak_key(3), DES_ecb_encrypt(3), DES_ecb2_encrypt(3), DES_ecb3_encrypt(3), DES_ncbc_encrypt(3), DES_cfb_encrypt(3), DES_ofb_encrypt(3), DES_pcbc_encrypt(3), DES_cfb64_encrypt(3), DES_ofb64_encrypt(3), DES_xcbc_encrypt(3), DES_ede2_cbc_encrypt(3), DES_ede2_cfb64_encrypt(3), DES_ede2_ofb64_encrypt(3), DES_ede3_cbc_encrypt(3), DES_ede3_cbcm_encrypt(3), DES_ede3_cfb64_encrypt(3), DES_ede3_ofb64_encrypt(3), DES_cbc_cksum(3), DES_quad_cksum(3), DES_string_to_key(3), DES_string_to_2keys(3), DES_fcrypt(3), DES_crypt(3), DES_enc_read(3), DES_enc_write(3)
DES encryption
HPL_dmatgen(3)
random matrix generator
HPL_jumpit(3)
jump into the random sequence
HPL_pdmatgen(3)
Parallel random matrix generator
HPL_rand(3)
random number generator
HPL_setran(3)
Manage the random number generator
HPL_xjumpm(3)
Compute constants to jump in the random sequence
RAND_bytes(3), RAND_pseudo_bytes(3)
generate random data
Random(n)
Pseudo-random number generators (PRNG)
Random.State(n)
no description
RandomBitErrors(n)
Click element; changes packet data with some probability
RandomSample(n)
Click element; samples packets with some probability
RandomSource(n)
Click element; generates random packets whenever scheduled
RandomSwitch(n)
Click element; sends packets to random outputs
SetRandIPAddress(n)
Click element; sets destination IP address annotations randomly
Tspi_TPM_GetRandom(3)
generate a random number on the TPM
Tspi_TPM_StirRandom(3)
add entropy to the TPM random number generator
apg(1)
generates several random passwords
apgd(8)
server that generates several random passwords
barcode(6)
draws a random sequence of barcodes for the products you enjoy
bp_mutate.pl(1), mutate.pl(1)
randomly mutagenize a single protein or DNA sequence
braid(6)
draws random color-cycling braids around a circle
cattag(1)
Print a random tagline
cwgen(1)
generate groups of random characters for Morse code practice
dictzip(1), dictunzip(1)
compress (or expand) files, allowing random access
dieharder(1)
A testing and benchmarking tool for random number generators
echoping_random(1)
echoping plugin which just sleeps a random time
fileshuffle(1), R shuffle(1)
rearrange lines in random order
fracplanet(1)
Create and view random fractal terrain and planets
gen_at_graph(1)
generates a random graph for use in algotutor
genconf(1)
multiplies a conformation in 'random' orientations VERSION 4.6.3
generate(1)
random sentence generator from a grammar
generate-ngram(1)
random sentence generator from N-gram
generate_randfile(1)
a program to generate a file of random data
genrandom(8)
generate a file containing random data
gensig(1)
Generate signatures with random taglines on a FIFO
gentest(1)
Run random generic SMB operations against two SMB servers and show the differences in behavior
gp_randseq(1)
generate random DNA sequences from a master sequence
greynetic(6)
draw random stippled/color rectangles
gsasl_random(3)
API function
gsasl_randomize(3)
API function
gshuf(1), shuf(1)
generate random permutations
gsl-randist(1)
generate random samples from various distributions
ipbt(1)
play back tty recording files with random access
irandstream(3bobcat), FBB::IRandStream(3bobcat)
Istream producing random numbers
krb5_c_block_size(3), krb5_c_decrypt(3), krb5_c_encrypt(3), krb5_c_encrypt_length(3), krb5_c_enctype_compare(3), krb5_c_get_checksum(3), krb5_c_is_coll_proof_cksum(3), krb5_c_is_keyed_cksum(3), krb5_c_keylength(3), krb5_c_make_checksum(3), krb5_c_make_random_key(3), krb5_c_set_checksum(3), krb5_c_valid_cksumtype(3), krb5_c_valid_enctype(3), krb5_c_verify_checksum(3), krb5_c_checksum_length(3)
Kerberos 5 crypto API
krb5_generate_random_block(3)
Kerberos 5 random functions
largeprimes(1)
-- generate large, random primes using Crypt::Primes
layingsiege(7), Siege(7)
An HTTP/HTTPS stress tester was designed orignally as a internet usage simulator. In short, its role was to simulate the activity of many simultaneous users hitting a HTTP server. We were debugging some java code and during that process we arrived at a point where the code could withstand an acceptable number of users hitting a single URL but it could not withstand the seemingly random activity that characterizes many users hitting many URLs on a webserver. In order to debug the problem in a lab environment, I developed a program that simply read a bunch of URLs ( we used images, scripts, static html, jsps, etc. ) into memory and hit them randomly. The result was a success. We were able to break the code in the lab, an occurance which ultimately allowed us to fix it and put it into production. As the developers code improved, siege improved until we ultimately had good java code and a pretty decent regression tool. It was helpful for us, I hope it is helpful to you. In order to feel comfortable putting code into production, you need a way to measure its performance and to determine its threshold for failure. If you break your database pool at 250 simultaneous users and you average less then one-hundred simultaneous users and the code performs favorably, you can feel good about putting it into production. At the same time, if you should monitor trends in your site's activity and prepare for the moment when your traffic starts to near your threshold for failure. As a webdeveloper or websystems administrator you have little to no control over your user group. They can visit your site anytime day or night. Your domain name could resemble a popular site, yoohoo.com? And when was the last time marketing informed you about an approaching advertising blitz? You must be prepared for anything. That is why stress and performance testing is so important. I would not recommend putting anything into production until you have a good feel for how it will perform under duress
libdieharder(3)
A testing and benchmarking library for random number generators
llvm-stress(1)
generate random .ll files
llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
lorem(1)
Generate random Latin looking text using Text::Lorem
lsh-make-seed(1)
Creates random seed file for the YARROW pseudorandomnessgenerator
macof(8)
flood a switched LAN with random MAC addresses
mav_random(3), Header "NAME" mav_random(3)
Random number functions
maze(6)
an automated X11 demo repeatedly creating and solving a random maze
memshuffle(3)
make an array be in random order
mountain(6)
random 3D plots that look vaguely mountainous
nonsense(6)
generates random text from datafiles and templates
openvas-mkrand(1)
Creates a file with random bytes
pacman(6)
simulates a game of Pac-Man on a randomly-created level
pad(1), PAD(1)
Random pad utility
page_rand(3)
RAND - random number See the library functions here: RAND crypto functions
page_rsa(3)
RSA - public-key cryptography RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000. Speed for RSA in seconds no key blinding 1000 iteration, same rsa keys (1024 and 2048) operation performed each eteration sign, verify, encrypt, decrypt on a random bit pattern name 1024 2048 4098 ================================= gmp: 0.73 6.60 44.80 tfm: 2.45 -- -- ltm: 3.79 20.74 105.41 (default in hcrypto) openssl: 4.04 11.90 82.59 cdsa: 15.89 102.89 721.40 imath: 40.62 -- -- See the library functions here: RSA functions
polygraph-rng-test(1)
random number generator test
quiz(6)
random knowledge tests
rand(1)
randomize the order of a stream
rand(3)
pseudo-random number generator
randbuffer(3bobcat), FBB::RandBuffer(3bobcat)
std::streambuf generating random numbers
random(3)
a random string generator for shell-include
random(n)
Create and manipulate randomizer channels
randpkt(1)
Random Packet Generator
randseq(1)
randomly shuffle a protein or DNA sequence
ranpwd(1)
generate random passwords
rectangle-coverage.pl(1)
Find the dot maximally covered by (random) rectangles
rl(1)
Randomize Lines
rlenoise(1)
Add random noise to an image
rndpassw(1)
generate random passwords
run(1)
run a command on a machine at random
scrub-files(1)
securely erase files by filling with random data first
sex(6), Sex(6)
spout silly, random porn-like text
shishi_authenticator_add_random_subkey(3)
API function
shishi_authenticator_add_random_subkey_etype(3)
API function
shishi_cipher_randomlen(3)
API function
shishi_key_from_random(3)
API function
shishi_key_random(3)
API function
shishi_random_to_key(3)
API function
shishi_randomize(3)
API function
shuffle(1)
print a random permutation of the command line arguments
snobol4random(3)
SNOBOL4 random number functions
strshuffle(3)
make the characters in a string be in random order
triangle(6)
random mountains using iterative subdivision of triangles
uuid_generate(3), uuid_generate_random(3), uuid_generate_time(3)
create a new unique UUID value
vidwhacker(6)
grab images and apply random filters to them
voronoi(6)
draws a randomly-colored Voronoi tessellation
wander(6)
colorful random-walk
webcollage(6)
decorate the screen with random images from the web
xscreensaver-getimage(1)
put some randomly-selected image on the root window
xscreensaver-getimage-file(1)
put a randomly-selected image on the root window
BN_rand(3), BN_pseudo_rand(3)
generate pseudo-random number
DES_random_key(3), DES_set_key(3), DES_key_sched(3), DES_set_key_checked(3), DES_set_key_unchecked(3), DES_set_odd_parity(3), DES_is_weak_key(3), DES_ecb_encrypt(3), DES_ecb2_encrypt(3), DES_ecb3_encrypt(3), DES_ncbc_encrypt(3), DES_cfb_encrypt(3), DES_ofb_encrypt(3), DES_pcbc_encrypt(3), DES_cfb64_encrypt(3), DES_ofb64_encrypt(3), DES_xcbc_encrypt(3), DES_ede2_cbc_encrypt(3), DES_ede2_cfb64_encrypt(3), DES_ede2_ofb64_encrypt(3), DES_ede3_cbc_encrypt(3), DES_ede3_cbcm_encrypt(3), DES_ede3_cfb64_encrypt(3), DES_ede3_ofb64_encrypt(3), DES_cbc_cksum(3), DES_quad_cksum(3), DES_string_to_key(3), DES_string_to_2keys(3), DES_fcrypt(3), DES_crypt(3), DES_enc_read(3), DES_enc_write(3)
DES encryption
HPL_dmatgen(3)
random matrix generator
HPL_jumpit(3)
jump into the random sequence
HPL_pdmatgen(3)
Parallel random matrix generator
HPL_rand(3)
random number generator
HPL_setran(3)
Manage the random number generator
HPL_xjumpm(3)
Compute constants to jump in the random sequence
RAND_bytes(3), RAND_pseudo_bytes(3)
generate random data
Random(n)
Pseudo-random number generators (PRNG)
Random.State(n)
no description
RandomBitErrors(n)
Click element; changes packet data with some probability
RandomSample(n)
Click element; samples packets with some probability
RandomSource(n)
Click element; generates random packets whenever scheduled
RandomSwitch(n)
Click element; sends packets to random outputs
SetRandIPAddress(n)
Click element; sets destination IP address annotations randomly
Tspi_TPM_GetRandom(3)
generate a random number on the TPM
Tspi_TPM_StirRandom(3)
add entropy to the TPM random number generator
apg(1)
generates several random passwords
apgd(8)
server that generates several random passwords
barcode(6)
draws a random sequence of barcodes for the products you enjoy
bp_mutate.pl(1), mutate.pl(1)
randomly mutagenize a single protein or DNA sequence
braid(6)
draws random color-cycling braids around a circle
cattag(1)
Print a random tagline
cwgen(1)
generate groups of random characters for Morse code practice
dictzip(1), dictunzip(1)
compress (or expand) files, allowing random access
dieharder(1)
A testing and benchmarking tool for random number generators
echoping_random(1)
echoping plugin which just sleeps a random time
fileshuffle(1), R shuffle(1)
rearrange lines in random order
fracplanet(1)
Create and view random fractal terrain and planets
gen_at_graph(1)
generates a random graph for use in algotutor
genconf(1)
multiplies a conformation in 'random' orientations VERSION 4.6.3
generate(1)
random sentence generator from a grammar
generate-ngram(1)
random sentence generator from N-gram
generate_randfile(1)
a program to generate a file of random data
genrandom(8)
generate a file containing random data
gensig(1)
Generate signatures with random taglines on a FIFO
gentest(1)
Run random generic SMB operations against two SMB servers and show the differences in behavior
gp_randseq(1)
generate random DNA sequences from a master sequence
greynetic(6)
draw random stippled/color rectangles
gsasl_random(3)
API function
gsasl_randomize(3)
API function
gshuf(1), shuf(1)
generate random permutations
gsl-randist(1)
generate random samples from various distributions
ipbt(1)
play back tty recording files with random access
irandstream(3bobcat), FBB::IRandStream(3bobcat)
Istream producing random numbers
krb5_c_block_size(3), krb5_c_decrypt(3), krb5_c_encrypt(3), krb5_c_encrypt_length(3), krb5_c_enctype_compare(3), krb5_c_get_checksum(3), krb5_c_is_coll_proof_cksum(3), krb5_c_is_keyed_cksum(3), krb5_c_keylength(3), krb5_c_make_checksum(3), krb5_c_make_random_key(3), krb5_c_set_checksum(3), krb5_c_valid_cksumtype(3), krb5_c_valid_enctype(3), krb5_c_verify_checksum(3), krb5_c_checksum_length(3)
Kerberos 5 crypto API
krb5_generate_random_block(3)
Kerberos 5 random functions
largeprimes(1)
-- generate large, random primes using Crypt::Primes
layingsiege(7), Siege(7)
An HTTP/HTTPS stress tester was designed orignally as a internet usage simulator. In short, its role was to simulate the activity of many simultaneous users hitting a HTTP server. We were debugging some java code and during that process we arrived at a point where the code could withstand an acceptable number of users hitting a single URL but it could not withstand the seemingly random activity that characterizes many users hitting many URLs on a webserver. In order to debug the problem in a lab environment, I developed a program that simply read a bunch of URLs ( we used images, scripts, static html, jsps, etc. ) into memory and hit them randomly. The result was a success. We were able to break the code in the lab, an occurance which ultimately allowed us to fix it and put it into production. As the developers code improved, siege improved until we ultimately had good java code and a pretty decent regression tool. It was helpful for us, I hope it is helpful to you. In order to feel comfortable putting code into production, you need a way to measure its performance and to determine its threshold for failure. If you break your database pool at 250 simultaneous users and you average less then one-hundred simultaneous users and the code performs favorably, you can feel good about putting it into production. At the same time, if you should monitor trends in your site's activity and prepare for the moment when your traffic starts to near your threshold for failure. As a webdeveloper or websystems administrator you have little to no control over your user group. They can visit your site anytime day or night. Your domain name could resemble a popular site, yoohoo.com? And when was the last time marketing informed you about an approaching advertising blitz? You must be prepared for anything. That is why stress and performance testing is so important. I would not recommend putting anything into production until you have a good feel for how it will perform under duress
libdieharder(3)
A testing and benchmarking library for random number generators
llvm-stress(1)
generate random .ll files
llvm-stress(1)
generate random .ll files rst2man-indent-level 0 1 rstReportMargin \$1
lorem(1)
Generate random Latin looking text using Text::Lorem
lsh-make-seed(1)
Creates random seed file for the YARROW pseudorandomnessgenerator
macof(8)
flood a switched LAN with random MAC addresses
mav_random(3), Header "NAME" mav_random(3)
Random number functions
maze(6)
an automated X11 demo repeatedly creating and solving a random maze
memshuffle(3)
make an array be in random order
mountain(6)
random 3D plots that look vaguely mountainous
nonsense(6)
generates random text from datafiles and templates
openvas-mkrand(1)
Creates a file with random bytes
pacman(6)
simulates a game of Pac-Man on a randomly-created level
pad(1), PAD(1)
Random pad utility
page_rand(3)
RAND - random number See the library functions here: RAND crypto functions
page_rsa(3)
RSA - public-key cryptography RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000. Speed for RSA in seconds no key blinding 1000 iteration, same rsa keys (1024 and 2048) operation performed each eteration sign, verify, encrypt, decrypt on a random bit pattern name 1024 2048 4098 ================================= gmp: 0.73 6.60 44.80 tfm: 2.45 -- -- ltm: 3.79 20.74 105.41 (default in hcrypto) openssl: 4.04 11.90 82.59 cdsa: 15.89 102.89 721.40 imath: 40.62 -- -- See the library functions here: RSA functions
polygraph-rng-test(1)
random number generator test
quiz(6)
random knowledge tests
rand(1)
randomize the order of a stream
rand(3)
pseudo-random number generator
randbuffer(3bobcat), FBB::RandBuffer(3bobcat)
std::streambuf generating random numbers
random(3)
a random string generator for shell-include
random(n)
Create and manipulate randomizer channels
randpkt(1)
Random Packet Generator
randseq(1)
randomly shuffle a protein or DNA sequence
ranpwd(1)
generate random passwords
rectangle-coverage.pl(1)
Find the dot maximally covered by (random) rectangles
rl(1)
Randomize Lines
rlenoise(1)
Add random noise to an image
rndpassw(1)
generate random passwords
run(1)
run a command on a machine at random
scrub-files(1)
securely erase files by filling with random data first
sex(6), Sex(6)
spout silly, random porn-like text
shishi_authenticator_add_random_subkey(3)
API function
shishi_authenticator_add_random_subkey_etype(3)
API function
shishi_cipher_randomlen(3)
API function
shishi_key_from_random(3)
API function
shishi_key_random(3)
API function
shishi_random_to_key(3)
API function
shishi_randomize(3)
API function
shuffle(1)
print a random permutation of the command line arguments
snobol4random(3)
SNOBOL4 random number functions
strshuffle(3)
make the characters in a string be in random order
triangle(6)
random mountains using iterative subdivision of triangles
uuid_generate(3), uuid_generate_random(3), uuid_generate_time(3)
create a new unique UUID value
vidwhacker(6)
grab images and apply random filters to them
voronoi(6)
draws a randomly-colored Voronoi tessellation
wander(6)
colorful random-walk
webcollage(6)
decorate the screen with random images from the web
xscreensaver-getimage(1)
put some randomly-selected image on the root window
xscreensaver-getimage-file(1)
put a randomly-selected image on the root window
home | help