1 .\" $NetBSD: usbhidctl.1,v 1.8 1999/05/11 21:03:58 augustss Exp $
4 .\" Copyright (c) 1998 The NetBSD Foundation, Inc.
5 .\" All rights reserved.
7 .\" This code is derived from software contributed to The NetBSD Foundation
8 .\" by Lennart Augustsson.
10 .\" Redistribution and use in source and binary forms, with or without
11 .\" modification, are permitted provided that the following conditions
13 .\" 1. Redistributions of source code must retain the above copyright
14 .\" notice, this list of conditions and the following disclaimer.
15 .\" 2. Redistributions in binary form must reproduce the above copyright
16 .\" notice, this list of conditions and the following disclaimer in the
17 .\" documentation and/or other materials provided with the distribution.
18 .\" 3. All advertising materials mentioning features or use of this software
19 .\" must display the following acknowledgement:
20 .\" This product includes software developed by the NetBSD
21 .\" Foundation, Inc. and its contributors.
22 .\" 4. Neither the name of The NetBSD Foundation nor the names of its
23 .\" contributors may be used to endorse or promote products derived
24 .\" from this software without specific prior written permission.
26 .\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 .\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 .\" POSSIBILITY OF SUCH DAMAGE.
43 .Nd manipulate USB HID devices
78 utility can be used to dump and modify the state of a USB HID (Human
87 attempts to set the specified items to the given values.
89 The options are as follows:
92 Show all items and their current values if device returns.
94 Specify a path name for the device to operate on.
96 Loop and dump the device data every time it changes.
98 Suppress printing of the item name.
100 Dump the report descriptor.
102 Specify a path name for the HID usage table file.
107 Only 'output' and 'feature' kinds can be set with this option.
109 Dump data in hexadecimal as well as decimal.
111 Reset reports to zero before processing other arguments.
112 If not specified, current values will be requested from device.
116 compares the names of items specified on the command line against the human
117 interface items reported by the USB device.
118 Each human interface item is mapped from its native form to a human readable
119 name, using the HID usage table file.
120 Command line items are compared with the generated item names,
121 and the USB HID device is operated on when a match is found.
123 Each human interface item is named by the
127 within that page, and the list of
130 Each collection in turn is also identified by page, and
131 the usage within that page.
135 command line the page name is separated from the usage name with the character
137 The collections are separated by the character
140 Some devices give the same name to more than one item.
142 supports isolating each item by appending a
144 character and a decimal item instance number, starting at zero.
146 .Pa /usr/share/misc/usb_hid_usages
147 The default HID usage table.