Module Name:    src
Committed By:   nia
Date:           Tue Jun 23 13:23:56 UTC 2020

Modified Files:
        src/sbin/cgdconfig: cgdconfig.8

Log Message:
cgdconfig.8: remove references to using cgd for swap

this is potentially misleading now that the kernel does swap encryption


To generate a diff of this commit:
cvs rdiff -u -r1.45 -r1.46 src/sbin/cgdconfig/cgdconfig.8

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sbin/cgdconfig/cgdconfig.8
diff -u src/sbin/cgdconfig/cgdconfig.8:1.45 src/sbin/cgdconfig/cgdconfig.8:1.46
--- src/sbin/cgdconfig/cgdconfig.8:1.45	Tue Jun 23 13:20:14 2020
+++ src/sbin/cgdconfig/cgdconfig.8	Tue Jun 23 13:23:56 2020
@@ -1,4 +1,4 @@
-.\" $NetBSD: cgdconfig.8,v 1.45 2020/06/23 13:20:14 nia Exp $
+.\" $NetBSD: cgdconfig.8,v 1.46 2020/06/23 13:23:56 nia Exp $
 .\"
 .\" Copyright (c) 2002, The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -178,7 +178,7 @@ The method simply reads
 and uses the resulting bits as the key.
 It does not require a passphrase to be entered.
 This method is typically used to present disk devices that do not
-need to survive a reboot, such as the swap partition.
+need to survive a reboot.
 It is also handy to facilitate overwriting the contents of
 a disk volume with meaningless data prior to use.
 .It urandomkey
@@ -188,8 +188,7 @@ and uses the resulting bits as the key.
 This is similar to the
 .Pa randomkey
 method, but it guarantees that cgdconfig will not stall waiting for 256
-bits of entropy from a hardware RNG or seed (useful when configuring a
-cgd for swap at boot time).
+bits of entropy from a hardware RNG or seed.
 .It shell_cmd
 This method executes a shell command via
 .Xr popen 3

Reply via email to