Searched hist:1.1033 (Results 1 - 13 of 13) sorted by relevance

/src/sys/dev/pci/
H A Dpcidevs.h1.1033 Fri Jul 02 08:25:30 GMT 2010 mrg regen.
H A Dpcidevs_data.h1.1033 Tue Jul 06 00:04:21 GMT 2010 msaitoh regen.
H A Dpcidevs1.1033 Tue Jun 08 04:58:03 GMT 2010 mrg add two pciids for the satalink driver, from the linux driver, for PR#32577.
/src/doc/
H A D3RDPARTY1.1033 Thu Apr 11 17:50:23 GMT 2013 christos new libevent
H A DCHANGES1.1033 Sat Mar 22 09:06:34 GMT 2008 mlelstv document the import of Heimdal-1.1
/src/sys/arch/i386/conf/
H A DGENERIC1.1033 Tue Jun 14 13:59:23 GMT 2011 jruoho Try to attach hpet(4) also via a specific HPET table. Fixes PR kern/43702.
/src/distrib/sets/lists/base/
H A Dmi1.1033 Fri Jun 21 21:09:34 GMT 2013 roy Add the timezone hook
/src/distrib/sets/lists/man/
H A Dmi1.1033 Fri Nov 09 21:18:24 GMT 2007 plunky Add a new utility 'btkey' for managment of Bluetooth Link Keys stored
in the NetBSD key cache (/var/db/bthcid.keys) and Bluetooth controller
memory.
/src/distrib/sets/lists/tests/
H A Dmi1.1033 Tue Mar 23 21:19:08 GMT 2021 rillig tests/lint: test initialization using string literals

The errors in line 74 and 75 of the test are wrong. Everything is fine
there. The bug lies in init_array_using_string, try to see if you can
spot it, neither GCC 9.3.0 nor Clang 8.0.1 could.
/src/share/mk/
H A Dbsd.own.mk1.1033 Sun Feb 11 03:44:53 GMT 2018 christos switch amd64 to gcc-6. Thanks mrg for all the work!
/src/usr.bin/make/
H A Dvar.c1.1033 Tue Sep 27 17:46:58 GMT 2022 rillig make: set WARNS to 6, from the default 5

No binary change on x86_64.
/src/sys/conf/
H A Dfiles1.1033 Sat Dec 17 20:05:38 GMT 2011 tls Separate /dev/random pseudodevice implemenation from kernel entropy pool
implementation. Rewrite pseudodevice code to use cprng_strong(9).

The new pseudodevice is cloning, so each caller gets bits from a stream
generated with its own key. Users of /dev/urandom get their generators
keyed on a "best effort" basis -- the kernel will rekey generators
whenever the entropy pool hits the high water mark -- while users of
/dev/random get their generators rekeyed every time key-length bits
are output.

The underlying cprng_strong API can use AES-256 or AES-128, but we use
AES-128 because of concerns about related-key attacks on AES-256. This
improves performance (and reduces entropy pool depletion) significantly
for users of /dev/urandom but does cause users of /dev/random to rekey
twice as often.

Also fixes various bugs (including some missing locking and a reseed-counter
overflow in the CTR_DRBG code) found while testing this.

For long reads, this generator is approximately 20 times as fast as the
old generator (dd with bs=64K yields 53MB/sec on 2Ghz Core2 instead of
2.5MB/sec) and also uses a separate mutex per instance so concurrency
is greatly improved. For reads of typical key sizes for modern
cryptosystems (16-32 bytes) performance is about the same as the old
code: a little better for 32 bytes, a little worse for 16 bytes.
/src/distrib/sets/lists/comp/
H A Dmi1.1033 Sun Jun 17 00:47:40 GMT 2007 rmind - Add aio_fsync(3) manual page. Reviewed and improved by <wiz>.
- Also, fix the accident duplicate of aio_suspend(3) entry.

Completed in 1198 milliseconds