Blame SOURCES/1495572-mpo-7.6.0-mount.cifs.8.patch

96cc1f
From 785c2a1e47ce8fa251f9355ca760412b22784d28 Mon Sep 17 00:00:00 2001
96cc1f
From: =?UTF-8?q?Nikola=20Forr=C3=B3?= <nforro@redhat.com>
96cc1f
Date: Wed, 20 Jun 2018 11:11:09 +0200
96cc1f
Subject: [PATCH] mount.cifs.8: describe seal option
96cc1f
---
96cc1f
 cifs-utils/man8/mount.cifs.8 | 6 ++++++
96cc1f
 1 file changed, 6 insertions(+)
96cc1f
96cc1f
diff --git a/cifs-utils/man8/mount.cifs.8 b/cifs-utils/man8/mount.cifs.8
96cc1f
index 01579f6..2a751ab 100644
96cc1f
--- a/cifs-utils/man8/mount.cifs.8
96cc1f
+++ b/cifs-utils/man8/mount.cifs.8
96cc1f
@@ -440,6 +440,12 @@ The default in mainline kernel versions prior to v3.8 was sec=ntlm. In v3.8, the
96cc1f
 If the server requires signing during protocol negotiation, then it may be enabled automatically. Packet signing may also be enabled automatically if it's enabled in /proc/fs/cifs/SecurityFlags.
96cc1f
 .RE
96cc1f
 .PP
96cc1f
+seal
96cc1f
+.RS 4
96cc1f
+Request encryption at the SMB layer. Encryption is only supported in
96cc1f
+SMBv3 and above. The encryption algorithm used is AES\-128\-CCM.
96cc1f
+.RE
96cc1f
+.PP
96cc1f
 nobrl
96cc1f
 .RS 4
96cc1f
 Do not send byte range lock requests to the server\&. This is necessary for certain applications that break with cifs style mandatory byte range locks (and most cifs servers do not yet support requesting advisory byte range locks)\&.
96cc1f
-- 
96cc1f
2.17.1
96cc1f