summaryrefslogtreecommitdiffstats
path: root/man/aeswepd.8.xml.in
diff options
context:
space:
mode:
Diffstat (limited to 'man/aeswepd.8.xml.in')
-rw-r--r--man/aeswepd.8.xml.in32
1 files changed, 17 insertions, 15 deletions
diff --git a/man/aeswepd.8.xml.in b/man/aeswepd.8.xml.in
index 3fb3557..0677219 100644
--- a/man/aeswepd.8.xml.in
+++ b/man/aeswepd.8.xml.in
@@ -1,6 +1,6 @@
<?xml version="1.0" standalone='no'?>
-<!DOCTYPE manpage SYSTEM "man.dtd">
-<?xml-stylesheet type="text/xsl" href="man.xsl" ?>
+<!DOCTYPE manpage SYSTEM "xmltoman.dtd">
+<?xml-stylesheet type="text/xsl" href="xmltoman.xsl" ?>
<!-- $Id$ -->
@@ -22,7 +22,7 @@
Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
-->
- <manpage name="aeswepd" section="8" desc="AES Rekeying Daemon for IEEE 802.11 WEP">
+ <manpage name="aeswepd" section="8" desc="AES Rekeying Daemon for WLAN IEEE 802.11 WEP">
<synopsis>
<cmd>aeswepd [<arg>options</arg>]</cmd>
@@ -65,12 +65,12 @@
<optdesc><p>
Do not use syslog, use stdout instead (for debugging) (default: off).
</p></optdesc>
- </option>
+ </option>
<option>
- <p><opt>-i | --iface=</opt> <arg>IFACE</arg></p>
+ <p><opt>-i | --iface=</opt><arg>IFACE</arg></p>
<optdesc><p>
- Specify ethernet interface (default: eth0)
+ Specify the wireless network interface (default: wlan0)
</p></optdesc>
</option>
@@ -78,35 +78,32 @@
<p><opt>-w | --wait-on-fork</opt></p>
<optdesc><p> When daemonizing, wait until the background
- process finished with the initial link beat detection. When
- this is enabled, the parent process will return the link
- status on exit. 1 means link beat detected, 2 stands for link
- beat not detected, everything else is an error.
+ process finished with the initial key generation.
</p></optdesc>
</option>
<option>
- <p><opt>-t | --rekey-time=</opt> <arg>SEC</arg></p>
+ <p><opt>-t | --rekey-time=</opt><arg>SEC</arg></p>
<optdesc><p>Specify the rekeying interval in seconds.</p></optdesc>
</option>
<option>
- <p><opt>-K | --key</opt> <arg>KEY</arg></p>
+ <p><opt>-K | --key=</opt><arg>KEY</arg></p>
<optdesc><p>Specify the AES key to use. Don't use this options, since users may get access to the key by running <file>ps</file>.</p></optdesc>
</option>
<option>
- <p><opt>-E | --keye-env</opt> <arg>ENV</arg></p>
+ <p><opt>-E | --keye-env=</opt><arg>ENV</arg></p>
<optdesc><p>Specify an environment variable to read the AES key to use from.</p></optdesc>
</option>
<option>
- <p><opt>-F | --key-file</opt> <arg>FILE</arg></p>
+ <p><opt>-F | --key-file=</opt><arg>FILE</arg></p>
<optdesc><p>Specify a file to read the AES key to use from.</p></optdesc>
</option>
<option>
- <p><opt>-m | --max-keys=</opt> <arg>NR</arg></p>
+ <p><opt>-m | --max-keys=</opt><arg>NR</arg></p>
<optdesc><p>Specify how many hardware WEP keys are to be used
by aeswepd. Currently only 1 and 3 are supported. Most 802.11
hardware is capable to use up to four distinct WEP keys
@@ -148,6 +145,11 @@
</options>
+ <section name="Files">
+ <p><file>/var/run/aeswepd.&lt;aeswepdgt;.pid</file>: the pid file
+ for aeswepd.</p>
+ </section>
+
<section name="Signals">
<p><arg>SIGINT, SIGTERM, SIGTQUIT</arg> aeswepd will quit. This is issued by passing -k to aeswepd.</p>
<p><arg>SIGHUP</arg> aeswepd will rekey immediately.</p>