diff --git a/docs/formatstorageencryption.html.in b/docs/formatstorageencryption.html.in index 380763e99e..f2b0ffdf12 100644 --- a/docs/formatstorageencryption.html.in +++ b/docs/formatstorageencryption.html.in @@ -68,6 +68,60 @@ be used as the passphrase to decrypt the volume. Since 2.1.0.
++ For volume creation, it is possible to specify the encryption + algorithm used to encrypt the luks volume. The following two + optional elements may be provided for that purpose. It is hypervisor + dependent as to which algorithms are supported. The default algorithm + used by the storage driver backend when using qemu-img to create + the volume is 'aes-256-cbc' using 'essiv' for initialization vector + generation and 'sha256' hash algorithm for both the cipher and the + initialization vector generation. +
+ +cipher
name
size
mode
hash
ivgen
cipher
. If the cipher
is not provided,
+ then an error will be generated by the parser.
+ name
hash
- Here is a simple example, specifying use of the luks
format
- where it's assumed that a secret
has been defined using a
- usage
element with a id
of "luks_example":
+ Assuming a
+ luks secret
is already defined using a
+ usage
element with an name
of "luks_example",
+ a simple example specifying use of the luks
format
+ for either volume creation without a specific cipher being defined or
+ as part of a domain volume definition:
<encryption format='luks'> @@ -91,5 +148,25 @@ </encryption>+
+ Here is an example, specifying use of the luks
format for
+ a specific cipher algorihm for volume creation:
+
+ <volume> + <name>twofish.luks</name> + <capacity unit='G'>5</capacity> + <target> + <path>/var/lib/libvirt/images/demo.luks</path> + <format type='luks'/> + <encryption format='luks'> + <secret type='passphrase' usage='luks_example'/> + <cipher name='twofish' size='256' mode='cbc' hash='sha256'/> + <ivgen name='plain64' hash='sha256'/> + </encryption> + </target> + </volume> ++