From 44bd074d703aeca12859f4a6cec0a662d1893234 Mon Sep 17 00:00:00 2001 From: nia Date: Tue, 23 Jun 2020 13:23:56 +0000 Subject: [PATCH] cgdconfig.8: remove references to using cgd for swap this is potentially misleading now that the kernel does swap encryption --- sbin/cgdconfig/cgdconfig.8 | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/sbin/cgdconfig/cgdconfig.8 b/sbin/cgdconfig/cgdconfig.8 index dc8d9cc96ca0..25ddf37cb50b 100644 --- a/sbin/cgdconfig/cgdconfig.8 +++ b/sbin/cgdconfig/cgdconfig.8 @@ -1,4 +1,4 @@ -.\" $NetBSD: cgdconfig.8,v 1.45 2020/06/23 13:20:14 nia Exp $ +.\" $NetBSD: cgdconfig.8,v 1.46 2020/06/23 13:23:56 nia Exp $ .\" .\" Copyright (c) 2002, The NetBSD Foundation, Inc. .\" All rights reserved. @@ -178,7 +178,7 @@ The method simply reads and uses the resulting bits as the key. It does not require a passphrase to be entered. This method is typically used to present disk devices that do not -need to survive a reboot, such as the swap partition. +need to survive a reboot. It is also handy to facilitate overwriting the contents of a disk volume with meaningless data prior to use. .It urandomkey @@ -188,8 +188,7 @@ and uses the resulting bits as the key. This is similar to the .Pa randomkey method, but it guarantees that cgdconfig will not stall waiting for 256 -bits of entropy from a hardware RNG or seed (useful when configuring a -cgd for swap at boot time). +bits of entropy from a hardware RNG or seed. .It shell_cmd This method executes a shell command via .Xr popen 3