diff options
Diffstat (limited to 'networking/ether-wake.c')
-rw-r--r-- | networking/ether-wake.c | 78 |
1 files changed, 39 insertions, 39 deletions
diff --git a/networking/ether-wake.c b/networking/ether-wake.c index 9ea5c03..7d5f79b 100644 --- a/networking/ether-wake.c +++ b/networking/ether-wake.c @@ -14,53 +14,53 @@ /* full usage according Donald Becker * usage: ether-wake [-i <ifname>] [-p aa:bb:cc:dd[:ee:ff]] 00:11:22:33:44:55\n" * - * This program generates and transmits a Wake-On-LAN (WOL)\n" - * \"Magic Packet\", used for restarting machines that have been\n" - * soft-powered-down (ACPI D3-warm state).\n" - * It currently generates the standard AMD Magic Packet format, with\n" - * an optional password appended.\n" + * This program generates and transmits a Wake-On-LAN (WOL)\n" + * \"Magic Packet\", used for restarting machines that have been\n" + * soft-powered-down (ACPI D3-warm state).\n" + * It currently generates the standard AMD Magic Packet format, with\n" + * an optional password appended.\n" * - * The single required parameter is the Ethernet MAC (station) address\n" - * of the machine to wake or a host ID with known NSS 'ethers' entry.\n" - * The MAC address may be found with the 'arp' program while the target\n" - * machine is awake.\n" + * The single required parameter is the Ethernet MAC (station) address\n" + * of the machine to wake or a host ID with known NSS 'ethers' entry.\n" + * The MAC address may be found with the 'arp' program while the target\n" + * machine is awake.\n" * - * Options:\n" - * -b Send wake-up packet to the broadcast address.\n" - * -D Increase the debug level.\n" - * -i ifname Use interface IFNAME instead of the default 'eth0'.\n" - * -p <pw> Append the four or six byte password PW to the packet.\n" - * A password is only required for a few adapter types.\n" - * The password may be specified in ethernet hex format\n" - * or dotted decimal (Internet address)\n" - * -p 00:22:44:66:88:aa\n" - * -p 192.168.1.1\n"; - * + * Options:\n" + * -b Send wake-up packet to the broadcast address.\n" + * -D Increase the debug level.\n" + * -i ifname Use interface IFNAME instead of the default 'eth0'.\n" + * -p <pw> Append the four or six byte password PW to the packet.\n" + * A password is only required for a few adapter types.\n" + * The password may be specified in ethernet hex format\n" + * or dotted decimal (Internet address)\n" + * -p 00:22:44:66:88:aa\n" + * -p 192.168.1.1\n"; + * + * + * This program generates and transmits a Wake-On-LAN (WOL) "Magic Packet", + * used for restarting machines that have been soft-powered-down + * (ACPI D3-warm state). It currently generates the standard AMD Magic Packet + * format, with an optional password appended. + * + * This software may be used and distributed according to the terms + * of the GNU Public License, incorporated herein by reference. + * Contact the author for use under other terms. + * + * This source file was originally part of the network tricks package, and + * is now distributed to support the Scyld Beowulf system. + * Copyright 1999-2003 Donald Becker and Scyld Computing Corporation. + * + * The author may be reached as becker@scyld, or C/O + * Scyld Computing Corporation + * 914 Bay Ridge Road, Suite 220 + * Annapolis MD 21403 * - * This program generates and transmits a Wake-On-LAN (WOL) "Magic Packet", - * used for restarting machines that have been soft-powered-down - * (ACPI D3-warm state). It currently generates the standard AMD Magic Packet - * format, with an optional password appended. - * - * This software may be used and distributed according to the terms - * of the GNU Public License, incorporated herein by reference. - * Contact the author for use under other terms. - * - * This source file was originally part of the network tricks package, and - * is now distributed to support the Scyld Beowulf system. - * Copyright 1999-2003 Donald Becker and Scyld Computing Corporation. - * - * The author may be reached as becker@scyld, or C/O - * Scyld Computing Corporation - * 914 Bay Ridge Road, Suite 220 - * Annapolis MD 21403 - * * Notes: * On some systems dropping root capability allows the process to be * dumped, traced or debugged. * If someone traces this program, they get control of a raw socket. * Linux handles this safely, but beware when porting this program. - * + * * An alternative to needing 'root' is using a UDP broadcast socket, however * doing so only works with adapters configured for unicast+broadcast Rx * filter. That configuration consumes more power. |