Random questions LinuxWorld.com, NJ - 16 minutes ago Why did the early Unix hackers use two-letter commands (rm, cp, mv...) but leave the one-letter command names alone? Was it so that you can use the ...
Need to use dd to generate a large file from a sample file of random data. This is because I don't have /dev/urandom.
I create a named pipe then:
dd if=mynamed.fifo do=myfile.fifo bs=1024 count=1024
but when I cat a file to the fifo that's 1024 random bytes:
cat randomfile.txt >... (7 Replies)
Hi
I am new to expect. Please if any one can help on my issue its really appreciable. here is my issue:
I want expect script for random passwords and random commands generation.
please can anyone help me?
Many Thanks in advance (0 Replies)
I have a couple questions about mainly Linux, probobly Unix in general. I'd really appreciate it if you could answer as many as you can.
1) TAR files, Tar.bz files... What are they? Come kind of compression? How can I use them via command lind? Why should I use them?
2) What is a book or... (4 Replies)
LinuxWorld Expo is going on this week at the Moscone Center in San Francisco, CA. I'll be there Tues, Weds, Thurs. Anyone else from the forums planning to attend? (0 Replies)
Random(3) User Contributed Perl Documentation Random(3)NAME
Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries
Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator
SYNOPSIS
use Crypt::OpenSSL::Random;
Crypt::OpenSSL::Random::random_seed($good_random_data);
Crypt::OpenSSL::Random::random_egd("/tmp/entropy");
Crypt::OpenSSL::Random::random_status() or
die "Unable to sufficiently seed the random number generator".
my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10);
my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTION
Crypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator
EXPORT
None by default.
Static Methods
random_bytes
This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been
seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned.
random_pseudo_bytes
This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used
for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc.
random_seed
This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this
function with non-random bytes is of limited value at best!
random_egd
This function seeds the PRNG with data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon
on succes, or -1 if not enough bytes were read, or if the connection to the daemon failed.
random_status
This function returns true if the PRNG has sufficient seeding.
BUGS
Because of the internal workings of OpenSSL's random library, the pseudo-random number generator (PRNG) accessed by Crypt::OpenSSL::Random
will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to
seed the PRNG used there from one used here. This class is still advantageous, however, as it centralizes other methods, such as
random_egd, in one place.
AUTHOR
Ian Robertson, iroberts@cpan.com
SEE ALSO perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).
POD ERRORS
Hey! The above document had some coding errors, which are explained below:
Around line 62:
'=item' outside of any '=over'
Around line 93:
You forgot a '=back' before '=head1'
perl v5.16.3 2007-05-20 Random(3)