1 .\" $NetBSD: usbhidctl.1,v 1.8 1999/05/11 21:03:58 augustss Exp $
4 .\" Copyright (c) 1998 The NetBSD Foundation, Inc.
5 .\" All rights reserved.
7 .\" This code is derived from software contributed to The NetBSD Foundation
8 .\" by Lennart Augustsson.
10 .\" Redistribution and use in source and binary forms, with or without
11 .\" modification, are permitted provided that the following conditions
13 .\" 1. Redistributions of source code must retain the above copyright
14 .\" notice, this list of conditions and the following disclaimer.
15 .\" 2. Redistributions in binary form must reproduce the above copyright
16 .\" notice, this list of conditions and the following disclaimer in the
17 .\" documentation and/or other materials provided with the distribution.
18 .\" 3. All advertising materials mentioning features or use of this software
19 .\" must display the following acknowledgement:
20 .\" This product includes software developed by the NetBSD
21 .\" Foundation, Inc. and its contributors.
22 .\" 4. Neither the name of The NetBSD Foundation nor the names of its
23 .\" contributors may be used to endorse or promote products derived
24 .\" from this software without specific prior written permission.
26 .\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 .\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 .\" POSSIBILITY OF SUCH DAMAGE.
43 .Nd manipulate USB HID devices
76 utility can be used to dump and modify the state of a USB HID (Human
85 attempts to set the specified items to the given values.
87 The options are as follows:
90 Show all items and their current values if device returns.
92 Specify a path name for the device to operate on.
94 Loop and dump the device data every time it changes.
96 Suppress printing of the item name.
98 Dump the report descriptor.
100 Specify a path name for the HID usage table file.
105 Only 'output' and 'feature' kinds can be set with this option.
107 Dump data in hexadecimal as well as decimal.
109 Reset reports to zero before processing
111 arguments. If not specified, current values will be requested from device.
115 compares the names of items specified on the command line against the human
116 interface items reported by the USB device.
117 Each human interface item is mapped from its native form to a human readable
118 name, using the HID usage table file.
119 Command line items are compared with the generated item names,
120 and the USB HID device is operated on when a match is found.
122 Each human interface item is named by the
126 within that page, and the list of
129 Each collection in turn is also identified by page, and
130 the usage within that page.
134 command line the page name is separated from the usage name with the character
136 The collections are separated by the character
139 Some devices give the same name to more than one item.
141 supports isolating each item by appending a
143 character and a decimal item instance number, starting at zero.
145 .Pa /usr/share/misc/usb_hid_usages
146 The default HID usage table.