mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-04 07:45:05 -04:00
luksFormat: drop arguments that are already the default
This commit is contained in:
parent
cc00196539
commit
4fb0f0c851
1 changed files with 1 additions and 1 deletions
|
@ -65,7 +65,7 @@ In theory, you can still use file-based disk images ("file" pool driver), but it
|
||||||
Assuming the secondary hard disk is at /dev/sdb (it will be completely erased), you can set it up for encryption by doing in a dom0 terminal (use the same passphrase as the main Qubes disk to avoid a second password prompt at boot):
|
Assuming the secondary hard disk is at /dev/sdb (it will be completely erased), you can set it up for encryption by doing in a dom0 terminal (use the same passphrase as the main Qubes disk to avoid a second password prompt at boot):
|
||||||
|
|
||||||
```
|
```
|
||||||
sudo cryptsetup luksFormat --sector-size=512 --hash=sha512 --key-size=512 --cipher=aes-xts-plain64 --verify-passphrase /dev/sdb
|
sudo cryptsetup luksFormat --sector-size=512 --hash=sha512 /dev/sdb
|
||||||
sudo blkid /dev/sdb
|
sudo blkid /dev/sdb
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue