mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-03 23:35:05 -04:00
luksFormat: drop arguments that are already the default
This commit is contained in:
parent
cc00196539
commit
4fb0f0c851
1 changed files with 1 additions and 1 deletions
|
@ -65,7 +65,7 @@ In theory, you can still use file-based disk images ("file" pool driver), but it
|
|||
Assuming the secondary hard disk is at /dev/sdb (it will be completely erased), you can set it up for encryption by doing in a dom0 terminal (use the same passphrase as the main Qubes disk to avoid a second password prompt at boot):
|
||||
|
||||
```
|
||||
sudo cryptsetup luksFormat --sector-size=512 --hash=sha512 --key-size=512 --cipher=aes-xts-plain64 --verify-passphrase /dev/sdb
|
||||
sudo cryptsetup luksFormat --sector-size=512 --hash=sha512 /dev/sdb
|
||||
sudo blkid /dev/sdb
|
||||
```
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue