Module Name: src Committed By: nia Date: Tue Jun 23 13:23:56 UTC 2020
Modified Files: src/sbin/cgdconfig: cgdconfig.8 Log Message: cgdconfig.8: remove references to using cgd for swap this is potentially misleading now that the kernel does swap encryption To generate a diff of this commit: cvs rdiff -u -r1.45 -r1.46 src/sbin/cgdconfig/cgdconfig.8 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sbin/cgdconfig/cgdconfig.8 diff -u src/sbin/cgdconfig/cgdconfig.8:1.45 src/sbin/cgdconfig/cgdconfig.8:1.46 --- src/sbin/cgdconfig/cgdconfig.8:1.45 Tue Jun 23 13:20:14 2020 +++ src/sbin/cgdconfig/cgdconfig.8 Tue Jun 23 13:23:56 2020 @@ -1,4 +1,4 @@ -.\" $NetBSD: cgdconfig.8,v 1.45 2020/06/23 13:20:14 nia Exp $ +.\" $NetBSD: cgdconfig.8,v 1.46 2020/06/23 13:23:56 nia Exp $ .\" .\" Copyright (c) 2002, The NetBSD Foundation, Inc. .\" All rights reserved. @@ -178,7 +178,7 @@ The method simply reads and uses the resulting bits as the key. It does not require a passphrase to be entered. This method is typically used to present disk devices that do not -need to survive a reboot, such as the swap partition. +need to survive a reboot. It is also handy to facilitate overwriting the contents of a disk volume with meaningless data prior to use. .It urandomkey @@ -188,8 +188,7 @@ and uses the resulting bits as the key. This is similar to the .Pa randomkey method, but it guarantees that cgdconfig will not stall waiting for 256 -bits of entropy from a hardware RNG or seed (useful when configuring a -cgd for swap at boot time). +bits of entropy from a hardware RNG or seed. .It shell_cmd This method executes a shell command via .Xr popen 3