From mboxrd@z Thu Jan 1 00:00:00 1970 From: Henry Noack Subject: encryption Date: Mon, 16 Feb 2015 18:19:04 +0100 Message-ID: <54E22688.2050002@reventix.de> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit To: kvm@vger.kernel.org Return-path: Received: from lion.reventix.de ([212.87.38.45]:34889 "EHLO lion.reventix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753463AbbBPRlo (ORCPT ); Mon, 16 Feb 2015 12:41:44 -0500 Received: from [172.27.106.163] (ANT.reventix [172.27.106.163]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by lion.reventix.de (Postfix) with ESMTP id A8D1A2FC05C for ; Mon, 16 Feb 2015 18:19:03 +0100 (CET) Sender: kvm-owner@vger.kernel.org List-ID: Hello you guys, it is possible to decrypt a kvm volume only by using the command line after starting it? Best regards Henry