Commit Graph

13897 Commits

Author SHA1 Message Date
wiz
642a95b35f Sort SEE ALSO. 2012-01-19 09:25:51 +00:00
rkujawa
9c4fe41206 Update the p5pb(4) page to reflect the recent changes in this driver. 2012-01-19 00:30:31 +00:00
njoly
761f943535 Remove bad indent keyword. 2012-01-17 22:18:54 +00:00
njoly
1d7281ae96 For xkb_base, do not use ${libdir} (xkeyboard-config.pc does not define
it) but its value ${prefix}/lib instead.
2012-01-17 19:40:08 +00:00
wiz
202095a66e Dd wants full months.
Use Rs/Re for reference (only title filled in for now, more would be nice).
2012-01-17 17:27:32 +00:00
jakllsch
6fe6fbbce6 Update based on recent changes to uslsa(4). 2012-01-17 17:24:02 +00:00
cegger
a02b2c29fa fix secmodel implementation of CPU_UCODE.
ok wiz@ for the manpages
ok elad@
2012-01-17 10:47:26 +00:00
wiz
185b329ee7 Bump date for previous. 2012-01-17 08:23:40 +00:00
wiz
e80c7409db New sentence, new line. Bump date for previous. Sort SEE ALSO. 2012-01-17 08:20:58 +00:00
mbalmer
0d7eed0028 Remove trailing whitespace. Reported by Brad Harder. 2012-01-17 07:04:08 +00:00
christos
fc5fe3c352 PR/45850: Pierre Pronchery: USB multi-touch panels are not supported 2012-01-17 03:49:19 +00:00
drochner
769741476b move kame_ipsec.4 almost completely into ipsec.4 because it is valid
for fast_ipsec as well
2012-01-16 16:27:59 +00:00
wiz
9ac11c40f8 Bump date for previous. 2012-01-15 20:27:58 +00:00
phx
ab290269c1 Introduce nhpow(4) man page. 2012-01-15 14:40:15 +00:00
phx
255a91ac60 Extend the list of supported NAS products for satmgr(4).
Describe the sysctl(8) variables for Iomega StorCenter.
2012-01-15 14:35:56 +00:00
jmcneill
ce4646dd28 PR# install/44593: Please give release ISO's more meaningful names
Change release ISO filenames, what was once 'i386cd.iso' will now look
like 'NetBSD-5.99.60-i386.iso'.

ok snj@
2012-01-14 22:56:30 +00:00
wiz
7af0bef7e5 Use more markup. Increase table width since longest string changed. 2012-01-13 23:12:32 +00:00
wiz
c18fbdcf42 New sentence, new line. Use more markup. Bump date for previous. 2012-01-13 23:09:51 +00:00
macallan
be47469bba document some rasops_info flags that have been added recently ( and not so
recently )
2012-01-13 16:50:28 +00:00
macallan
19ea84bf71 document recent changes 2012-01-13 16:06:20 +00:00
cegger
a3f6c06746 Support CPU microcode loading via cpuctl(8).
Implemented and enabled via CPU_UCODE kernel config option
for x86 and Xen Dom0.
Tested on different AMD machines with different
CPU families.

ok wiz@ for the manpages
ok releng@
ok core@ via releng@
2012-01-13 16:05:14 +00:00
skrll
cfee3311b5 Real mode is no longer used. 2012-01-12 23:08:50 +00:00
skrll
220a3b7997 Update hp700 key sequences section. 2012-01-12 22:22:10 +00:00
wiz
389cbee608 Remove trailing whitespace; wording. 2012-01-11 19:44:56 +00:00
rkujawa
38e14ec3fe Add man page for cv3dpb driver. 2012-01-11 17:25:19 +00:00
wiz
a866ffaac9 Remove trailing whitespace.
New sentence, new line.
Use more markup.
2012-01-11 10:15:36 +00:00
rkujawa
89e0f2fce5 Update p5pb(4) and bppcsc(4) due to recent changes to Phase5 drivers. Add p5membar(4) page. 2012-01-10 20:41:45 +00:00
skrll
7780856071 Fix NetBSD version in history. 2012-01-09 22:08:12 +00:00
wiz
9bc46f7ca5 Fix another reference to point to kame_ipsec for setup instructions (for now). 2012-01-09 16:35:20 +00:00
drochner
9d939b40a9 fix confusing references, from wiz 2012-01-09 16:17:37 +00:00
skrll
d2845d9eb6 Add a mkboot(8) man page. 2012-01-09 16:04:45 +00:00
drochner
d107562abc Make FAST_IPSEC the default IPSEC implementation which is built
into the kernel if the "IPSEC" kernel option is given.
The old implementation is still available as KAME_IPSEC.
Do some minimal manpage adjustment -- kame_ipsec(4) is a copy
of the old ipsec(4) and the latter is now a copy of fast_ipsec(4).
2012-01-09 15:16:30 +00:00
dholland
eb3306a822 Sentences should verbs. From Snader_LB 2012-01-08 04:01:12 +00:00
yamt
9753d46d1c install tprof related commands and man pages. 2012-01-04 16:25:13 +00:00
yamt
db1f5cf7f2 add a missing comma. 2012-01-04 15:48:54 +00:00
wiz
d6829e5b30 Bump date for previous. Move RCS Id to top of file. 2012-01-02 18:07:21 +00:00
wiz
adca3c43ee New sentence, new line. Bump date for previous. 2012-01-02 18:02:00 +00:00
rkujawa
5ec5041c48 Correct the include path. 2012-01-02 15:41:51 +00:00
phx
c3ed2ca16a Add the description for the "mem:<address>" bootname. 2012-01-01 14:48:40 +00:00
riz
df7c01333c Fix typos and style glitches. Remove outdated info about only
Ethernet, SLIP, and PPP being supported, and no network types with
variable-length headers (such as 802.11).
Document BIOCSRSIG and BIOCGRSIG.

From Guy Harris in PR#40703.
2011-12-31 20:16:41 +00:00
alnsn
209a072285 Document that overflow in P[X+k:n] terminates a filter program.
Based on a discussion with Christos on source-changes-d.
2011-12-30 14:12:15 +00:00
wiz
59200cfca6 Remove duplicate RCS Id. New sentence, new line. 2011-12-27 21:47:04 +00:00
christos
cd61872876 PR/45750: Alexander Nasonov: Type of k in bpf_insn is bpf(9) is different
from sys/net/bpf.h
2011-12-27 21:24:25 +00:00
rmind
32d19c916b Amend previous. 2011-12-23 20:53:31 +00:00
rmind
40947a78e4 Sync with reality a little. 2011-12-23 20:51:50 +00:00
wiz
707b092c0c New sentence, new line. Fix some markup. Bump date for previous. 2011-12-17 21:25:12 +00:00
wiz
1a45da71c8 Use more markup. Bump date for previous. 2011-12-17 21:24:40 +00:00
wiz
612e69e384 New sentence, new line.
Bump date for previous.
2011-12-17 21:21:59 +00:00
tls
6e1dd068e9 Separate /dev/random pseudodevice implemenation from kernel entropy pool
implementation.  Rewrite pseudodevice code to use cprng_strong(9).

The new pseudodevice is cloning, so each caller gets bits from a stream
generated with its own key.  Users of /dev/urandom get their generators
keyed on a "best effort" basis -- the kernel will rekey generators
whenever the entropy pool hits the high water mark -- while users of
/dev/random get their generators rekeyed every time key-length bits
are output.

The underlying cprng_strong API can use AES-256 or AES-128, but we use
AES-128 because of concerns about related-key attacks on AES-256.  This
improves performance (and reduces entropy pool depletion) significantly
for users of /dev/urandom but does cause users of /dev/random to rekey
twice as often.

Also fixes various bugs (including some missing locking and a reseed-counter
overflow in the CTR_DRBG code) found while testing this.

For long reads, this generator is approximately 20 times as fast as the
old generator (dd with bs=64K yields 53MB/sec on 2Ghz Core2 instead of
2.5MB/sec) and also uses a separate mutex per instance so concurrency
is greatly improved.  For reads of typical key sizes for modern
cryptosystems (16-32 bytes) performance is about the same as the old
code: a little better for 32 bytes, a little worse for 16 bytes.
2011-12-17 20:05:38 +00:00
njoly
79579731df Fix title. 2011-12-14 13:24:14 +00:00