Searched hist:1.1033 (Results 1 - 13 of 13) sorted by relevance
| /src/sys/dev/pci/ | ||
| H A D | pcidevs.h | 1.1033 Fri Jul 02 08:25:30 GMT 2010 mrg regen. |
| H A D | pcidevs_data.h | 1.1033 Tue Jul 06 00:04:21 GMT 2010 msaitoh regen. |
| H A D | pcidevs | 1.1033 Tue Jun 08 04:58:03 GMT 2010 mrg add two pciids for the satalink driver, from the linux driver, for PR#32577. |
| /src/doc/ | ||
| H A D | 3RDPARTY | 1.1033 Thu Apr 11 17:50:23 GMT 2013 christos new libevent |
| H A D | CHANGES | 1.1033 Sat Mar 22 09:06:34 GMT 2008 mlelstv document the import of Heimdal-1.1 |
| /src/sys/arch/i386/conf/ | ||
| H A D | GENERIC | 1.1033 Tue Jun 14 13:59:23 GMT 2011 jruoho Try to attach hpet(4) also via a specific HPET table. Fixes PR kern/43702. |
| /src/distrib/sets/lists/base/ | ||
| H A D | mi | 1.1033 Fri Jun 21 21:09:34 GMT 2013 roy Add the timezone hook |
| /src/distrib/sets/lists/man/ | ||
| H A D | mi | 1.1033 Fri Nov 09 21:18:24 GMT 2007 plunky Add a new utility 'btkey' for managment of Bluetooth Link Keys stored in the NetBSD key cache (/var/db/bthcid.keys) and Bluetooth controller memory. |
| /src/distrib/sets/lists/tests/ | ||
| H A D | mi | 1.1033 Tue Mar 23 21:19:08 GMT 2021 rillig tests/lint: test initialization using string literals The errors in line 74 and 75 of the test are wrong. Everything is fine there. The bug lies in init_array_using_string, try to see if you can spot it, neither GCC 9.3.0 nor Clang 8.0.1 could. |
| /src/share/mk/ | ||
| H A D | bsd.own.mk | 1.1033 Sun Feb 11 03:44:53 GMT 2018 christos switch amd64 to gcc-6. Thanks mrg for all the work! |
| /src/usr.bin/make/ | ||
| H A D | var.c | 1.1033 Tue Sep 27 17:46:58 GMT 2022 rillig make: set WARNS to 6, from the default 5 No binary change on x86_64. |
| /src/sys/conf/ | ||
| H A D | files | 1.1033 Sat Dec 17 20:05:38 GMT 2011 tls Separate /dev/random pseudodevice implemenation from kernel entropy pool implementation. Rewrite pseudodevice code to use cprng_strong(9). The new pseudodevice is cloning, so each caller gets bits from a stream generated with its own key. Users of /dev/urandom get their generators keyed on a "best effort" basis -- the kernel will rekey generators whenever the entropy pool hits the high water mark -- while users of /dev/random get their generators rekeyed every time key-length bits are output. The underlying cprng_strong API can use AES-256 or AES-128, but we use AES-128 because of concerns about related-key attacks on AES-256. This improves performance (and reduces entropy pool depletion) significantly for users of /dev/urandom but does cause users of /dev/random to rekey twice as often. Also fixes various bugs (including some missing locking and a reseed-counter overflow in the CTR_DRBG code) found while testing this. For long reads, this generator is approximately 20 times as fast as the old generator (dd with bs=64K yields 53MB/sec on 2Ghz Core2 instead of 2.5MB/sec) and also uses a separate mutex per instance so concurrency is greatly improved. For reads of typical key sizes for modern cryptosystems (16-32 bytes) performance is about the same as the old code: a little better for 32 bytes, a little worse for 16 bytes. |
| /src/distrib/sets/lists/comp/ | ||
| H A D | mi | 1.1033 Sun Jun 17 00:47:40 GMT 2007 rmind - Add aio_fsync(3) manual page. Reviewed and improved by <wiz>. - Also, fix the accident duplicate of aio_suspend(3) entry. |
Completed in 1198 milliseconds