Download Henning Driver
Hennig free download - Maria Hennig, Henniges Benefits, Lassen & Hennigs, and many more programs. Windows 3.x drivers for PCTALK. PCTALK was an 8-bit, 8 kHz sound card. Fine value for money for its time, but its time had mostly passed by the time I was hired to do a driver for it. Henning@makholm.net Front page software.
Download: UTFT.zip (Filesize is 2577.14 KiB. Downloaded 358711 times) Some demos showcasing most of the functions are included in the download. This is a multi-platform library that will work with several different development board types. By means of the LiftPC Mobile Diagnosis Henning GmbH has created a modern diagnosis system which enables you for the first time to observe the lift ride quality and ride comfort during the ride, online on the screen of the laptop. Moreover, the data can immediately be evaluated and documented from which the maintenance condition monitoring. How to Retopologize a Full Character with Henning and Morten Free Download Latest. It is of How to Retopologize a Full Character with Henning and Morten free download.
The keyman64 is a programmable keyboard interceptor and hardwarecontrol system for computers equipped with a simple 64-key matrixkeyboard.
It is installed between the keyboard and the computer, continuallyscanning the keyboard matrix and relaying the keyboard state to thecomputer using a crosspoint switch. To the computer, the crosspointswitch matrix looks just like a physical keyboard, while the keyman64gains the ability to intercept keystrokes and control the matrix seenby the computer.
The keyman64 can be configured to intercept special key combinationsand invoke arbitrary sequences of commands to alter the state ofsixteen general purpose control lines provided on the board. Theselines can be used to control additional hardware instead of usingphysical buttons or switches.
Thus the keyman64 eliminates the need to install physical switches orbuttons into the computer case.
Additional features include the ability to send predefined keyboardmacros or to redefine the keyboard layout. Commands can also be sentfrom a remote PC via USB, or send on simple serial wire interface,allowing remote control from either a PC or another microcontroller orsimilar device.
For some concrete examples of what the keyman64 can do, see theconfiguration examples.
Documentation is available in both english and german.
Basic mode of operation
During normal operation, the device simply relays all keyboard eventsto the computer, except when a special key defined as the meta key isheld down. As long as this key is held down, any additional keypresses invoke the user-defined command sequences bound to therespective key. When the meta key is released again, the devicecontinues to relay keyboard events to the computer.
If no special key has been pressed while the meta key was down, apress of the meta key itself is simulated on the matrix seen by thecomputer. This way the meta key is not lost, it can still be pressedas usual in order to type the associated character. The onlydifference is that the computer will notice the simulated key down andup events only after the physical key has been released.
This scheme works well if the meta key only needs to be pressed once,but not if the meta key is supposed to be held down for a longerperiod of time. But this can still be accomplished by using a keycombination invoking the down command for the meta keyitself, for example:
Assuming that the arrow-left key is used as the meta key, this bindingcan be invoked by holding down arrow-left and pressing m
. Thevirtual arrow-left key now appears held down to the computer as longas the physical meta key is kept down. Once the physical meta key isreleased, the device beings scanning and relaying the physicalkeyboard state again, effectively releasing the virtual meta key seenby the computer.
The meta key defaults to the arrow-left key. To change it to adifferent key, use the meta command described below.
Software
A simple commandline configuration and control utility isprovided. Its main purpose is to convert a plain text configurationfile into a binary format. The binary configuration file is flashed tothe Atmegas EEPROM Memory. See Configuration fordetails.
In addition, the utility allows remote control of the keyman64 viaUSB. Arbitrary commands can be send via USB and will be immediatelyexecuted on the keyman64.
Hardware design
The device is based on an Atmega1284p, a crosspoint switch IC and somediscrete 74xx logic ICs. Supported crosspoint switches are theCD74HC22106 or the MT8808 in either DIP or PLCC package. A USB socketis provided to allow easy configuration and firmware updates using aUSB bootloader preinstalled on the Atmega. Please see design documentsin the source distribution and the relevant sections in this documentfor further details.
Compatibility
In theory, the device should work with any computer using a passive8x8 matrix keyboard. However, the layout of the connectors and thekeynames follow those of the C64. Also the type command willuse key combinations specific to the C64 to type the ASCII charactersgiven as the argument. If you need software support for a differenthomecomputer, please feel free to post a feature request on thegithub issue tracker,preferably providing the required information.
- Downloads
- Errata
- Ordering Assembly Kits
- Building the hardware
- Installing the firmware
- Installing the bootloader manually
- Configuring USB devices on the PC
- Installing the configuration and control utility
- Source
- Configuration
- Syntax
- Bits
- Commands for configuration and maintenance
- Commands for modifying control lines
- Commands for controlling the keyboard matrix
- Commands for controlling execution
- Commands for displaying information
- Syntax
- Configuration and control utility
- Transferring the Configuration
- Port expansion
- Serial interface
- Configuration examples
- Switching the kernal and performing a reset
Source
The source distribution includes the sources for the firmware and theconfiguration utility as well asschematics and pcb layouts in KiCadformat for building the hardware.
Latest stable is keyman64-1.6.tar.gz.
All releases can be found under /download/keyman64
Latest developments are available via github:
The Changelog lists all changes in detail.
Binaries
keyman64-1.6.msi
configuration utility, Windows 32-bit installer packagekeyman64-bootloader-updater-1.6.hex
updates the bootloader, suitable when updating from versions prior to 1.4 using the already installed bootloaderkeyman64-application-and-bootloader-1.6.hex
keyman64-application-and-bootloader-1.6.bin
combined images containing both bootloader and application, suitable for use with an external programmerkeyman64-application-1.6.hex
keyman64-application-1.6.bin
contains only the application part of the firmwarekeyman64-gerber-r4.zip
Gerber files for pcb revision 4
Schematics
Revision 3
The USB level conversion circuit is not correct in this and allprevious revisions. This may result in missing USB functionality. Itobviously depends on the specific type of 3.6V zener diodesused. While the diodes I have shipped with revisions 1 and 2 seem tohave worked (more by accident than by design), the ones shipped withrevision 3 boards have failed to work properly, so I have onlydiscovered this error after shipping revision 3.
In order to fix an already assembled board or when assembling theboard, the diodes have to be soldered in like this:
As you can see, the cathodes have to go directly to the D- and D+lines from the USB socket. You can solder them directly to the leadsof the 68Ω resistors, given that you installed them as suggestedby the silkscreen.
This error has been fixed with revision 4
Revision 2
The negative voltage generator ICL7660 is not required, although itdoes not hurt to leave it in. It has been removed in favor of analternative PLCC socket in Revision 3.
Also, the mounting holes added in this revision are 3mm in diameter,which makes them unsuitable for mounting using common self-adhesivepcb holders, which require at least 4mm holes. The holes have beenchanged to 4mm in Revision 3.
I’m offering assembly kits including the keyman64 pcb, the preprogrammed Atmega and all required components (except connection cables) for 30€ each. Worldwide shipping via regular mail isfree of charge.
You can order kits via email athenning.liebenau@protonmail.com
To place an order, please include the word “keyman64” in thesubject. State your full name, your complete international shippingaddress and the number of kits you wish to buy. Note that orders arelimited to a maximum of two kits per person. You will receive an emailcontaining payment information (bank transfer only). You will have topay in advance to confirm your order.
Notes on availability
I try to keep a sufficent number of kits on stock, but please notethat I’m doing all of this in my spare time, on a short budget and aminimal profit margin. My primary motivation is to serve thecommunity, not to run a profitable business.
This means that in case I am currently out of stock, it may take a fewweeks until I can put together a new batch of kits to fullfill yourorder. I may even need to collect a sufficient number of prepaidorders before I can afford to order the necessary parts myself. Inthese cases I will regularily inform you about the status of yourorder. Thus some patience and trust may be required on your part.
Please refer to the list of parts and the placementon board below below.
Power supply
+5V must be supplied to the center pin of J1. You can either supply+5V from the computers main board directly to this pin, or use ajumper bridge to supply power from pin 4 of P1 (the mainboard keyboardsocket) or from the USB socket. To supply power from themainboard socket, bridge the left and center pin of J1. To supply power fromUSB, bridge the center and right pin of J1.
Supplying power from the USB socket is only recommended forstandalone operation of the keyman64, i.e. when P1 it is notconnected to the io ports of a computer and none of the externaldevices connected to the keyman64 are powered from a different source.In general, all devices involved (the computer, the keyman64 and thedevices controlled by it) must be powered from the same source. Forexample, if the keyman64 was configured to source power over USB andthe computer is powered on without the USB cable being connected, thekeyman64 might still sink current over the ESD-protection diodes ofthe Atmels io ports from the io ports of the computer or the externaldevices, which might cause severe damage to any of the io portsinvolved.
Connections
The pin layouts of P1 and P2 follow the layout of the C64 keyboardconnector. The RESTORE line is simply passed through on the board.
List of parts
Reference | Type | Value | Package/RM |
---|---|---|---|
C1 | Ceramic capacitor | 18pF | 2.5mm |
C2 | Ceramic capacitor | 18pF | 2.5mm |
C6 | Ceramic/film capacitor | 100nF | 2.5mm |
C7 | Ceramic/film capacitor | 100nF | 2.5mm |
C8 | Ceramic/film capacitor | 100nF | 2.5mm |
C9 | Ceramic/film capacitor | 100nF | 2.5mm |
C10 | Ceramic/film capacitor | 100nF | 2.5mm |
C11 | Ceramic/film capacitor | 100nF | 2.5mm |
D1 | Zener Diode | 3.6V | DO-204 |
D2 | Zener Diode | 3.6V | DO-204 |
R1 | Precision Resistor | 1k5 | 6.5mm, ∅ 2.5mm |
R2 | Precision Resistor | 68 | 6.5mm, ∅ 2.5mm |
R3 | Precision Resistor | 68 | 6.5mm, ∅ 2.5mm |
P3 | USB Mini-B Socket | - | Through-Hole |
SW1 | Push Button | - | 6x6mm print |
SW2 | Push Button | - | 6x6mm print |
X1 | Quartz Crystal | 16Mhz | HC49/U-S |
U1 | 74HC22106 or MT8808 | - | DIP28 |
U2 | Atmega1284P | - | DIP40 |
U3 | 74HC00 | - | DIP14 |
U4 | 74HC4051 | - | DIP16 |
U5 | 74HC4520 | - | DIP16 |
U6 | 74HC4051 | - | DIP16 |
U7 | 74HC22106 or MT8808 | - | PLCC28 |
For the crosspoint switch you can either use an MT8808 or a 74HC22106, and you can either use U1 for a DIP28 package or U7 for a PLCC28 package version.
When using a 74HC22106, you will have to configure the deviceaccordingly by executing the configuration command using atstartup.
IC-Sockets are not listed.
Placement on board
If you bought an assembly kit from me, the Atmega is alreadyprogrammed with the latest firmware and bootloader versions and isready to use.
Otherwise, if you have no means of initially programming the Atmegayourself then you can send it to me and I will prepare it foryou. Just drop me a line at henning.liebenau@protonmail.com.
Installing the combined firmware image
The easiest way to bootstrap the Atmega is to install the combinedbinary image. The image contains both the bootloader andthe application part of the firmware. If you have a programming devicecapable of programming the complete PROGMEM area from a single binaryimage or intel hex file (e.g. the TL866), use this method.
Note that you also have to check and eventually program the fuses ofthe Atmega as well. The required fuse values are:
This corresponds to the following fuses programmed: SUT1, CKSEL3,SPIEN, EESAVE, BOOTSZ0, BOOTSZ1, BOOTRST, BODLEVEL0, BODLEVEL1. Allother fuses must remain unprogrammed.
Installing the bootloader manually
The Atmega1284p must contain the USBaspLoader, which must be uploadedto the Atmega via ISP prior to installing it on the board.
There is a preconfigured version of the bootloader in the source tarball.
Change to the bootloader
directory and edit the Makefile.inc
andadjust the PROGRAMMER
settings to according to your setup. Thenissue
The Atmega can now be installed on the device. When entering thebootloader, it identifies itself to thehost like this:
16c0:05dc Van Ooijen Technische Informatica shared ID for use with libusb
It can be accessed using avrdude -p m1284p -c usbasp <commands...>
Note that you may need to configure the USBdevices on your systembeforehand.
Entering the bootloader
To manually enter the bootloader, hold down the BOOT Button andpress the RESET button, then release the BOOT button again.
Once the device is installed you can configure a key combination usingthe boot command. For example, by using
you can enter the bootloader simply by pressing <meta>-b
.
You can also just send the boot
command via USB from the PC:
Updating the bootloader
Eventually firmware updates will require an update of the bootloaderalready installed on the device.
For this purpose, an updating application is provided inkeyman64-bootloader-updater-1.6.hex.
To upgrade, connect and power on the keyman64 and enter the existingbootloader, then run
This will overwrite the existing application code (i.e. the keyman64application), run the updater application and thus update the bootloader.
After this, manually enter the bootloader and proceed by reinstallingthe keyman64 application as described in the following section.
Installing and updating the firmware
Once the Atmega is equipped with a USB bootloader the application partof the firmware can be installed with the following command:
If you have build the firmware from source you can use the program
target of the toplevel Makefile as well.
Since version 1.4 the firmware can also be updated using the update
command:
This will automatically enter the bootloader and update the firmware.
Since version 1.5 the update
command also accepts firmware images inIntel HEX format. The file extensions .bin
and .hex
are recognizedand determine the respective file format.
Since version 1.6 the update
command accepts a configuration file asan optional second argument. If a configuration file is specified, theupdate command will first disable the existing configuration on thedevice, then update the firmware and finally recreate and flash theconfiguration from the specified file to the device. This is requiredfor updates which change the binary configuration format. If thisprocedure is necessary, it will be explicitly stated in the releasenotes and Changelog.
The keyman64 implements two separate USB devices, a remote controldevice and a bootloader device.
During normal operation, the remote control device will be active andaccessible from the PC using the configuration and controlutility. This device will identify itself to the host using thefollowing properties:
Vendor | OpenMoko, Inc. |
Manufacturer | Henning Bekel |
Device | Keyman64 |
Vendor ID | 1d50 |
Product ID | 60e9 |
While in bootloader mode, the bootloader device will be accessiblefrom the PC. This device will identify itself to the host using thefollowing properties:
Vendor | Van Ooijen Technische Informatica shared ID for use with libusb |
Manufacturer | www.fischl.de |
Device | USBasp |
Vendor ID | 16c0 |
Product ID | 05dc |
Linux
On Linux, the required udev rules are installed alongside theconfiguration and control utility. After installation, issue
When in bootloader mode, the bootloader device will be symlinked to/dev/usbasp
. During normal operation, the keyman64 control devicewill be symlinked to /dev/keyman64
. These symlinks are created withfile permissions 0666
, allowing access for any user.
Windows
Once you connect one of the usb devices for the first time, Windowswill insist on trying to download and install a driver for thesedevices. Since both devices are general purpose USB devices, this isfutile, since there simply are no drivers for windows to install. Youmust abort the windows driver installation dialog to prevent windowsfrom permanently marking the device as unusable due to its perceivedlack of “proper” drivers.
Instead, use the Zadig tool to generate andinstall minimal drivers that simply associate the devices with thesubsystems required for general purpose access.
Run Zadig, connect the usb cable to the keyman64 and power up thedevice. Zadig should now detect the Keyman64
device. Install theWinUSB driver for this device.
Now enter the bootloader. The Zadig toolshould now detect the USBasp
device. For use with the keyman64client, install the WinUSB driver for the bootloader device. For usewith avrdude
, install the libusb-win32 driver for this device. Inthis case, also make sure that the libusb0.dll
is present on yoursystem (it should come with avrdude). If not, follow the link forlibusb-win32 shown in the “More information” section of the Zadigwindow and install libusb-win32 on your system.
Binary
For the windows version, use the binary installerpackage. This will also install the requiredlibusb-1.0.dll. The installation directory will be added to yourPATH
environment variable.
Source
Linux & MacOSX
libusb-1.0
and corresponding development packages (if any) need tobe installed on your system.
Extract the tarball, change to the source directory and type make
.
Use make install
to install the keyman64
binary into/usr/local/bin
. The PREFIX
variable can be used to install with adifferent prefix, e.g. use make PREFIX=/usr install
to install into/usr/bin
instead. The DESTDIR
variable can be used for a stagedinstall.
On linux, the udev rules required for the USB devices will beinstalled to /etc/udev/rules.d
as well. As root, run
after installation.
Windows
If you’re using cygwin you can build a windows binary in the same wayas under Linux or MacOSX. The required packages are libusb-1.0
andlibusb-1.0-devel
. Note that the resulting binary will still needcygwin dlls to be present.
A native win32 binary can be build using mingw32 under Linux orCygwin. If necessary, edit the Makefile
and adjust the MINGW32
variable to the proper prefix for your toolchain. Then use makewin32
to build keyman64.exe
.
The configuration file is a plain text file containing configurationcommands and keybindings in a human readable format. Using thekeyman64 utility this file is converted to a binary format which canbe flashed into the EEPROM memory of the Microcontroller. SeeTransferring the configuration.
Syntax
Whitespace and comments
Empty lines as well as leading and trailing whitespace characters areignored. Whitespace is only significant to separate individual tokensand keywords.
Comments begin with a hash character #
and continue for theremainder of the current line.
Keywords
All keywords, like command and key names, as well as user definedsymbols are case-insensitive. E.g. CLEAR
is equivalent toclear
, SPACE
is equivalent to space
and so on.
Commands and bindings
Each line must contain one command specification, optionally prefixedby a key specification:
[<key>:][<policy>] <command> [<arguments>]
If no key specification is given, the command will be executed onpowerup/reset of the microcontroller, and can thus be used toconfigure the initial state of the device.
If a key specification is given, the command will be bound to thespecified key.
If multiple commands are bound to the same key, the commands will beexecuted in sequence, in the order in which they appear in theconfiguration file.
Command sequences can also be bound to “slots” by using numeric keyspecifications between $40
and $F9
. These command sequences cannot be invoked directly by a key combination, but may be invokedindirectly via the exec command.
The optional policy argument can be set to either 0
or 1
, meaningeven or odd. If even, the command will only be executed on the second,fourth, sixth etc. time the key is pressed. If odd, the command willonly be executed on the first, third, fifth etc. time the key ispressed.
Keynames
Keys can be specified by using literal key names like DEL
, A
,RUNSTOP
or ONE
. To obtain a list of valid key names and theirsynonyms, run keyman64 --keys
.
Keys may also be specified by number, denoting the key position in theC64 keyboard matrix. Keys are numbered from left to right, from row 0,column 0 down to row 7, column 7.
Thus $00
corresponds to the DEL
key, $3f
denotes the RUNSTOP
key.
Key numbers may be given in decimal or hexadecimalnotation. Hexadecimal numbers must be prefixed with a dollar sign $
or the literal string 0x
.
Ports
The sixteen control lines are organized into two 8-bit wide ports. Forcommands modifying the state of these control lines, the respectiveport can be specified using the keyword port
, followed by theliteral string a
or b
:
port [a|b]
Bits
Commands modifying the state of the control lines can be limited toindividual bits or ranges of successive bits. Bits are denoted by adecimal number in the range 0-7.
bit <n>
bits <s>-<e>
Where n
denotes an individual and s
and e
denote the start andend bit of a bitrange (inclusive).
Short notation for ports and bits
As of version 1.6 control lines and ranges of control lines can bespecified with a short notation combining the existing notations forports and bits:
<port>[[<s>][-<e>]]
Thus expressions like port a bit 3
or port b bits 0-2
can be shortenedto a3
or b0-2
respectively.
Durations
Durations can be specified by a series of decimal values and unit specifiers:
[<n><unit>...][<n>]
Available unit specifiers are d
, h
, m
, s
, ms
for days,hours, minutes, seconds and milliseconds respectively. If no unitspecifier is given, the preceding value is interpreted asmilliseconds.
The maximum possible duration is 232 milliseconds, about 49days. Specifications that exceed this value will be truncatedaccordingly.
Examples:
1m30s
= one minute and thirty seconds
1s500
= one second and fivehundred milliseconds
10
= ten milliseconds
Values
Values can be specified in hexadecimal or binary notation. Hexadecimalvalues need to be prefixed with $
. Binary values need to be prefixedwith %
Symbols
Custom symbols can improve the readability of the configurationfile. They are defined using simple name/value pairs.
<name> = <value>
Symbol names must consist of alphanumeric characters, digits andunderscores only. If a symbol name equals one of the reserved key orcommand names, a corresponding error message will be issued.
Once a symbol has been defined, any subsequent occurrence is replacedby its literal value. If a symbol is used before it is defined, anerror message will be generated.
For example, this configuration
can be made easier to read and change:
Commands for configuration and maintenance
using
using <8808|22106>
Specify which crosspoint switch IC is installed in the device. Eithera CD74HC22106 or an MT8808 may be used. Default is 8808
.
speed
speed <fast|slow>
Specify the speed at which the keyboard matrix is scanned. Fast modeis the default and should work well in most setups. Slow mode isrequired when the length of the cable is significantly longer than thestock keyboard cable, e.g. when installing the device in a CommodoreSX64.
Note that selecting slow mode will not impact the responsiveness ofthe keyboard in any way. Both modes are still quite fast in scanningthe keyboard.
expand
expand ports=<n> clock=<line> data=<line> latch=<line> enable=<line>
Configures a port expansion of <n> daisy chained 74595 serialshift registers, where the CLOCK, DATA, LATCH and ENABLE lines of thefirst shift register in the chain are connected to the respectivenative port lines.
Note that in this case the port lines need to be specified in shortnotation.
See port expansion for details.
meta
meta <key>
The meta command defines the meta key to be used. Default is ARROWLEFT
.
boot
boot
Enter the bootloader and expect configuration or firmware updates viaUSB. The device will remain bootloader mode until a new configurationor firmware has been programmed or the reset button has been pressed.
When sending the boot command via the remote USB interface, e.g. byexecuting keyman64 boot
on the PC, the firmware will immediatelyjump into the bootloader without properly terminating the current USBcommunication properly, which will result in the followingnon-critical error message:
This message can be ignored as long as the AVR has successfullyentered the bootloader.
save
save
Permanently saves the current state of the control lines toeeprom. This state can be restored later using the restorecommand.
restore
restore
Restore the state of the control lines that were stored in eeprom by apreceding save
command. If no state has been saved before, alllines are set to tristate.
memorize
memorize
Temporarily memorize the current state of the control lines toRAM. This state can be restored later using the recallcommand.
recall
recall
Restore the state of the control lines that was stored in ram by apreceding memorize
command. If no state has been memorized before,all lines are set to tristate.
Commands for modifying control lines
set
set <port> [<bits>] [to <value>]
Sets the specified bits of the specified port to the specified value.If value is omitted, it defaults to setting all bits to 1 (high). Ifbits are omitted, sets all bits of the specified port.
Examples:
set port a bit 3 to 1
– sets bit 3 of port a to high
set port b bits 3-4 to 2
– sets bit 3 to low and bit 4 to high on port b
set port a
– sets bits 0-7 to high
clear
clear <port> [<bits>]
Clears the specified bits of the specified ports, i.e. sets them to 0(low). If bits are omitted, clears all bits of the specified port.
tristate
tristate <port> [<bits>]
Tristates the specified bits on the specified port. If bits areomitted, tristates all bits on the specified port.
Tristating a line means setting it to a high-impedance state which isneither high nor low. This is equivalent to physically disconnectingthe line.
invert
invert <port> [<bits>]
Inverts the state of the specified bits on the specified ports. Ifbits are omitted, inverts all bits of the specified port. If a bithas been set to tristate beforehand, it will be set to output high.
increment
increment <port> [<bits>]
Increment the state of the specified bits on the specified port byone. If bits are omitted, increments the state of all bits on thespecified port.
This can be used to implement a binary counter on a port or a specificbit range on a port. If all bits are already set (e.g. the counter hasreached its maximum) then all bits are cleared again.
Example of a four-bit binary up-counter in the lower part of port a:
increment port a bits 0-3
decrement
decrement <port> [<bits>]
Decrements the state of the specified bits. Works similar to theincrement
command.
Commands for controlling the keyboard matrix
down
down <key>
Holds down the key on the matrix seen by the computer. The key willremain held down until an up
command for the key is executed or themeta key is released.
up
up <key>
Releases the specified key on the matrix seen by the computer. The keywill remain released until a down
command for the key is executed orthe meta key is released.
press
press <key>
Presses the specified key on the matrix seen by the computer, i.e. thekey is held down for 20 milliseconds and then released again. This isa shortcut for
type
type <string>
Types the specified string on the matrix seen by the computer. Toinsert a press of the RETURN key, add the escape sequence r
.
Lower case ASCII characters will cause the corresponding key to bepressed without modifiers. Upper case and special characters will bepressed in conjunction with the required modifier to type the correctcharacter.
To type PETSCII characters that are not present in the ASCII characterset, you can simply use the ASCII character at the respective positionin the ASCII table. For example, the pound symbol, which is atposition 92 in the PETSCII table, can be specified by using thecorresponding ASCII backslash character.
Alternatively, any PETSCII character can be typed by inserting itusing a numeric escape sequence, specified in either decimal orhexadecimal notation:
In addition, the following escape sequences are predefined:
Note that the keyman can only type those characters that can actuallybe typed on a real C64 keyboard. This excludes the PETSCII-codes forexplicitly setting the character set (upper or mixed case, codes 14and 142) and for locking/unlocking manual switching of character sets(codes 8 and 9).
Example (on the C64):
type load'*',8,1r
– types LOAD'*',8,1
and presses RETURN
swap
swap <key> <key>
Swaps the specified keys against each other before relaying them tothe computer. This can be used to redefine the keyboard layout,e.g. to switch to a QWERTZ layout on the C64:
swap Z Y
Note that this applies only to the keys relayed to the computer, notto the keys interpreted as a part of a key binding. Commands bound tothe physical key Z
can still be invoked by pressing <meta>-Z
inthis example.
map
map <port> <bit> to <key>
Maps the specified control pin to a key. The control pin becomes anactive-low input pin and will hold down the specified key when low.
Note that once mapped, a pin should not be modified by other commandsin any way.
password
password
Interactively set the password used for unlocking the keyboard afterit has been locked using the lock command. The C64 needs tobe in direct mode for this as the keyman prompts for the password bysimply typing on the keyboard.
The password needs to be entered twice. If both passwords match, thepassword is permanently stored in EEPROM memory.
To clear the password, simply enter an empty password, i.e. hit returntwice.
lock
lock
If a password has been set using the password command,the keyboard will be locked and no keys will be passed through to thecomputer until the user enters the correct password followed byRETURN.
Any commands bound to the virtual key LOCKED will be executed beforelocking the keyboard. Likewise, any commands bound to the virtual keyUNLOCKED will be executed before unlocking the keyboard again.
Commands for controlling execution
exec
exec <key>|<slot>
Executes the command sequence bound to the specified key or slotnumber. Execution of the current command sequence will resume afterthe specified sequence has been executed.
sleep
sleep <duration>
Suspend execution of the current command sequence for the specifiedduration. No keyboard processing will occur during sleep, e.g. keypresses will neither be relayed nor interpreted as bindings.
requires
<key>: requires <n>
This directive instructs the keyman to execute the command sequencebound to the respective key
only after n
consecutive presses ofthe key have been registered while the meta key is being held down.
This is useful to protect against accidental executions of adisruptive action, such as resetting the machine while having unsavedchanges in an editor. For example, the following reset sequencerequires three presses to execute:
This only applies to interactive use, i.e. exec r
will still run theabove sequence immediately.
Commands for displaying information
version
version
Types out the current firmware version and build date. Note that theC64 has to be in direct mode for the text to appear on screen.
status
status
Types out the current state of the control lines. Note that the C64has to be in direct mode for the text to appear on screen.
The state of the control lines will be displayed similar to this:
Where 0 is low, 1 is high and X is tristate.
$ keyman64 --help
Transferring the Configuration
Version 1.4 and later
As of version 1.4 the configuration file can be converted and flashedto the keyman64 in one step using the configure
command:
This will parse the configuration file keyman64.conf
, convert it toa binary format and transfer it to the Atmega’s eeprom memory. Whenfinished, the keyman64 will be reset and the new configuration shouldbecome effective.
The previous method described below can still be used alternatively.
Versions prior to 1.4
The convert
command of the configuration and control utility is usedto convert the configuration file to a binary format which can then bewritten to the Atmega1284p’s EEPROM memory over USB.
Assuming you have written a configuration file named keyman64.conf
,you can convert it using
If no errors are encountered this results in the filekeyman64.bin
.
Make the keyman64 enter the bootloader.
Then use avrdude
to write the configuration to the EEPROM memory:
After the configuration has been transfered, the keyman64 will resetand the new configuration should be in effect.
Please note that the bootloader will reset the AVR immediately afterthe update operation has completed, even before the current USBcommunication between the bootloader and avrdude has beencompleted. This results in the following non-critical error messagefrom avrdude:
This message can be ignored as long as avrdude reports that it hassuccessfully written and verified eeprom contents.
Preserving saved state when updating the configuration
Note that the –preserve option is no longer necessary in versions 1.5and later, since saved state is no longer overwritten when transferringa new configuration.
If the current eeprom contains a saved control state, this state willbe lost if a new binary configuration is created using the convert
command, since the eeprom will be flashed with new values.
In order to preserve a saved state, the --preserve
option may beused in conjunction with the convert
command. The utility will thentry to obtain the currently saved state of the control lines via USBand insert this state into the newly created binaryconfiguration. Thus the device has to powered up and connected viaUSB.
Note that when using the configure
command described above, anysaved state will be preserved automatically.
Remote control
Any command can be send from the PC via USB to the keyman64, where itwill be executed immediately.
A single command can be executed by passing it directly on thecommandline, e.g.
If no arguments are specified on the commandline, the keyman64 utilitywill read commands from STDIN, where one command can be given on eachline. Note that the commands will get parsed and executed after STDINhas been closed, e.g. all commands have been entered/piped in:
If the first argument to the keyman64 utility is a file, commands willbe read from this file and subsequently sent to the keyman64.
Thus you can create a file containing a script like the following:
and run this script via
The --delay
option will add an additional delay of 250ms after eachcommand. This avoids having to add explicit sleep
commands in thescript.
On Linux and MacOSX, the she-bang mechanism can be used to create anexecutable script. Just make the script executable and add anappropriate she-bang line at the top, e.g.
then chmod +x
the script and you can execute it like any othercommand.
As of version 1.6 the number of available control lines can beexpanded by connecting one or more daisy chained 74595 serial shiftregisters. Four of the existing control lines need to be connected tothe first (or only) 74595, while each 74595 added to the chain willadd another 8-bit control port.
The 74595 is available on easily chainable breakout boards fromvarious sources, for example the Artekit shop offers a breakoutboardwell suited for this purpose.
The expand configuration directive is used to tell thekeyman64 about the number of available additional ports and which ofits native control lines are connected to the required pins of thefirst shift register. Once configured, the expanded ports will belabeled alphabetically beginning with the letter “c”. They can be usedjust like the existing ports a and b in other configuration directivesand commands.
The expand directive names the required shift register pins as CLOCK,DATA, LATCH and ENABLE. Depending on the datasheet or breakout-boardused, these pins may be named differently:
Keyman64 | 74595 pin number | Description | Other common names on breakout-boards or in datasheets |
CLOCK | 11 | shift register clock input | CLK, SCK, SHCP, SRCLK |
DATA | 14 | serial data input | DS, SER, SER-IN |
LATCH | 12 | storage register clock input | STCP, RCLK |
ENABLE | 13 | output enable input (active low) | OE, EN |
RESET | 10 | serial clear input (active low) | MR, CLR, SRCLR |
The ENABLE and RESET signals should be pulled up via a 4.7kresistor. (This is already the case for the artekit board linkedabove).
When the keyman starts up, all expanded ports will be initiallytristated. Once any of the expanded port lines is set or modified by acommand, all registers will be enabled, and all port lines whose statehas not explicitly defined yet will be driven low by default.
Note that the virtual ports cannot be used as inputs and cannot be putinto tristate, thus the commands map and tristateare not allowed to be used with expanded port lines. The configurationutility will issue an appropriate error message in this case.
Example
This illustration shows how to wire one or more 74595 breakoutboards. Here the lower four control lines of port b are connected to the74595.
The corresponding expand directive for using two additional ports is thus:
Any command following this directive in the configuration file can nowrefer to the additional ports as ports c and d, e.g.
The P4 connector offers a simple serial interface allowing remotecontrol of the keyman64 by external hardware. The left pin providesthe input for an active-low clock signal (denoted as /CLK on theboard). The right pin provides the data input (denoted DATA). On thefalling edge of the clock signal the value present on the data inputis transferred to the keyman64.
Each command consists of a command-byte, followed by one or moreargument bytes. Bytes are transferred individually in little-endianorder, i.e. the least significant bit is send first. For example, topress RUNSTOP
, the actual command looks like this:
00000100 00111111
=> 0x4 (command) 0x3f (argument)
but must be transferred like this:
00100000 11111100
=> command, then argument, both lsb first.
The following commands are available:
Download Henning Driver Windows 7
00000001 <key>
: execute command sequence bound to key or slot number00000010 <key>
: hold the specified key down00000011 <key>
: release the specified key00000100 <key>
: press the specified key (down for 20ms, release)00000101 <pin> <key>
: (re)map the specified pin to the specified key00000111 <code>
: type the specified PETSCII code
The pin for the map command is denoted by bits 0-2 and the port isdenoted by bit 3 (low = port a, high = port b).
Note that if a key is held down via the serial interface it willremain in this state until explicitly released via the serialinterface again. The state of the physical key will be ignored duringthis time.
Connecting the Serial interface to the C64
One possible way of using the serial interface is to connect it to theC64 via bits 3 and 4 of the 6510 IO port. These are available as“Cassette Sense” and “Cassette Write” at the tapeport (assuming youdon’t use the tapeport for anything else). “Cassette Sense” will beused as the /CLK signal and “Cassette Write” as the DATA signal.
The source distribution contains the file serial.h
and serial.asm
in KickAssembler3 format. These files can be used to issue serialcommands from the C64 using the 6510 IO port.
For example, the following code will execute the command sequencebound to <meta>-RUNSTOP
:
Switching the kernal and performing a reset
Let’s assume you have a dual-kernal adapter installed in yourC64. These adapters usually come with a switch that controls thehighest address line of the eprom and thus chooses the kernal that isseen by the C64. You are expected to drill a hole in your C64 case toinstall the switch.
Using keyman64 you can avoid drilling a hole in your precious case.
Simply remove the switch and connect the highest address line of theeprom to one of the 16 control lines of the keyman64. For thisexample, we’ll assume that we’re using the highest line of the firstcontrol port (port a bit 7
).
Create a configuration file with the following contents:
Convert and transfer it using the keyman64
command line tool:
After the configuration is written, the keyman64 will reset. First itexecutes any command not bound to a key. This allows us to set theinitial state of the control lines. In this case, all lines areinitially pulled low using the clear
command).
Now the key combination <meta>-k
will invert the state of theeprom address line, effectively switching back and forth between thetwo kernal images on each invocation.
While this does the job on the hardware level, it might still causethe C64 to crash, since you might swap the kernal contents whilekernal code is being executed. So it would be nice to also reset theC64 after switching the kernal rom.
We’ll connect the C64 reset line to the first line of the firstcontrol port and change the configuration to:
Download Henning Driver Windows 10
Now if we press <meta>-r
, the reset line will be driven from tristateto low for 10 milliseconds and is then tristated again, effectivelycausing the C64 to reset.
And if we press <meta>-k
, the kernal will be switched just likebefore, but then the reset sequence bound to <meta>-r
will beexecuted in addition.
Thus we can switch the kernal and immediately reset the C64 simply bypressing <meta>-k
instead of having to turn off the C64, flip aswitch and turn the C64 back on every time we want to change thekernal.
Holding down a key during reset
Some expansion port modules execute special functions when a key isheld down during reset. Things like this can be simulated as well. Thefollowing binding performs a reset while holding down the RUNSTOP
key:
Defining keyboard macros
The type
command can be bound to a key as well:
Now pressing <meta>-d
will type load'$',8<return>
. The r
escape sequence denotes a newline in this context.
Remapping the keyboard
The swap
command can be used to virtually swap two keys on thekeyboard. For example, to change the keyboard layout to QWERTZ, just add
to your configuration.
If you want to switch between both layouts on the fly, you can simplybind the swap command to a key:
Copyright (C) 2016 Henning bekel <h.bekel@googlemail.com>
Hardware licensed under CERN OHL v.1.2, see ./hardware/LICENSE.txt
Software and firmware licensed under GNU GPLv3, see ./LICENSE
The software contains MIT licensed code fromhttps://github.com/arkku/ihex for reading Intel HEX files, copyright(C) 2013-2015 Kimmo Kulovesi, see ./intelhex/LICENSE
The firmware contains the V-USB Driver (https://www.obdev.at/vusb),(C)2008 Objective Development GmbH.
Distributed in the./bootloaderdirectory is the USBasp bootloader, (C)2013 Stephan Baerwolf(matrixstorm@gmx.de) and (C)2008 Objective Development GmbH(https://www.obdev.at/vusb).
In compliance with the terms of the (identical) V-USB driver andUSBasp bootloader licenses (./firmware/usbdrv/License.txt and./bootloader/License.txt, the entire project is published under
In addition, this distribution contains
Download Henning Driver Update
- a circuit diagram in PDF format, see ./hardware/keyman64-schematics.pdf
- the full source code for the host software in ./firmware
- a README file in ASCII format which describes the purpose of the project and what can be found in which directories and which files
- references to (https://www.obdev.at/vusb)
The USB Product and Vendor IDs for the Keyman64 USB device have kindlybeen provided by OpenMoko, Inc (http://openmoko.org).
Born | 15 August 1967 Eccles, Lancashire, England |
---|---|
Disappeared | December 2013 Al-Dana, Syria |
Died | c. 3 October 2014 (aged 47) |
Cause of death | Murder by beheading |
Nationality | British |
Occupation | Taxi driver Aid worker |
Alan Henning (15 August 1967 – c. 3 October 2014) was an English taxicab driver-turned-volunteer humanitarian aid worker.[1][2] He was the fourth Western hostage killed by Islamic State of Iraq and the Levant (ISIL) whose killing was publicised in a beheading video.
Henning was captured during ISIL's occupation of the Syrian city of Al-Dana in December 2013. He was there helping provide humanitarian relief.[3] The British Foreign Office withheld news of Henning's capture while it attempted to negotiate his release.
Local colleagues warned Henning not to cross the border into Syria, but he said he wanted to make sure the supplies were delivered safely.[4][5]
When he was captured, Henning was a driver for the Worcester-based charity Al-Fatiha Global [2]. Henning was shown at the end of David Cawthorne Haines's execution video, released on 13 September 2014, and was referred to as being the next victim by Mohammed Emwazi, the media described as 'Jihadi John' of the ISIL cell described as The Beatles. A video of Henning's beheading was released on 3 October 2014.[2][6] In an al-Qaeda magazine interview, spokesman Adam Gadahn condemned the beheading.[7] After his murder, British Prime Minister David Cameron ordered MI5, MI6, and GCHQ to track and kill or capture the killer.[8][9][10] Emwazi was killed in a drone strike in 2015.[11][12]
Early life[edit]
Henning was a taxi driver in Salford, Greater Manchester, in North West England before he travelled to Syria in December 2013 to be a volunteer aid worker.[13] He lived in Eccles, Greater Manchester.[14] There has also been a fundraising page set up to help his family.[15]
He was married to Barbara,[16] and had two children, Lucy and Adam.[17][18]
Kidnapping[edit]
In December 2013, Henning was part of a team of volunteers delivering goods and funds to people affected by Syria's civil war. He was abducted on 26 December 2013 by masked gunmen, according to other people in his aid convoy.[19]
Beheading[edit]
A video released on 3 October 2014 shows his apparent beheading;[20] the executioner blames it on the UK for its joining the U.S.-led bombing campaign against ISIS.[19]
Before he is beheaded,[21] Henning appears on camera, handcuffed behind his back and in a kneeling position, next to a knife-wielding masked man (Jihadi John, of the ISIL cell known as The Beatles). Henning speaks, referencing the British Parliament's decision to participate in a coalition of countries, such as the United States, that have banded together to bomb the Islamic State in Iraq and Syria.[2][19]
The end of the video shows American aid worker Peter Kassig, and a threat to his life.[19]
Reactions[edit]
Prime Minister David Cameron condemned the killing as 'absolutely appalling' and 'completely unforgivable' and vowed to do everything to defeat ISIL. He described Henning as a man of great peace, kindness and gentleness, saying: 'He went with many Muslim friends out to do no more than simply help other people. His Muslim friends will be mourning him at this special time of Eid and the whole country is mourning with them.'[22]
On 5 October 2014, prayers were said for Henning in churches across Bolton. The Bishop of Bolton Rt Rev Chris Edmondson said: 'This is the most horrific, brutal and barbaric act. Leaders of Christian and Muslim faiths have universally condemned this act.' Bolton Interfaith Council and Bolton Council of Mosques, who had held a vigil for Henning before news of his death, said they would continue to pray for him.[23] A special service of remembrance was held at Eccles Parish Church, attended by Henning's widow. A memorial fund had been set up, by friend and fellow aid-worker Shameela Islam-Zulfiqar, with the aim of raising £20,000.[24] By 9 October 2014, £30,000 had been raised by the Muslim community and would be used to help support Henning's family.[25] A further memorial service was held on 12 October at the British Muslim Heritage Centre, organised by friends and humanitarian aid colleagues of Henning, attracting over 600 people.[26]
On 7 October, former Guantánamo Bay detainee Moazzam Begg said that he had offered to intervene to help secure Henning's release.[27]
The Salafi Muslims of the UK also condemned the murder of Alan Henning noting that ISIS has violated Islam's respect for covenants and that ISIS had also mistreated Henning and the Muslims captured along with him. While a London-based follower of Omar Bakri, Mizanur Rahman (aka Abu Baraa), justified the killing. Mizanur Rahman however was strongly criticised by Salafi Muslims.[28]
On 15 October 2014, Labour MP Barbara Keeley, speaking during Prime Minister's Questions, called for a national honour to recognise Henning's sacrifice, and for support for his widow and children. David Cameron agreed and said he would look carefully at her suggestion.[29]
On 1 April 2020, it was reported that the charity Henning had worked for failed in their duty to safeguard Henning and their other volunteers while working in Syria.[30]
See also[edit]
References[edit]
- ^https://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11099969/Alan-Henning-charity-campaigned-for-release-of-Lady-al-Qaeda-Aafia-Siddiqui.html
- ^ abc'Alan Henning 'killed by Islamic State''. BBC. 4 October 2014. Retrieved 3 October 2014.
- ^Harper, Tom (14 September 2014). 'Alan Henning: Second British hostage in an IS beheading video named as 'kind and funny' aid worker'. The Independent. Retrieved 14 September 2014.
- ^British hostage Alan Henning kidnapped half an hour after crossing Syrian border, By Bill Gardner, Ben Farmer and Gordon Rayner, The Daily Telegraph, 15 September 2014
- ^Charity Commission investigates aid charity over alleged Syrian fighter links, Celina Ribeiro, Civil Society Media Ltd, 4 April 2014
- ^'ISIS Claims To Have Killed British Hostage Alan Henning'. The WorldPost. Retrieved 4 October 2014.
- ^'Archived copy'(PDF). Archived from the original(PDF) on 23 September 2018. Retrieved 17 February 2019.CS1 maint: archived copy as title (link)
- ^'British Prime Minister David Cameron orders spy chiefs to hunt down 'Jihadi John''. The Times of India. 5 October 2014. Retrieved 5 October 2014.
- ^'British PM David Cameron orders spy chiefs to hunt down 'Jihadi John''. Economic Times. 5 October 2014. Retrieved 5 October 2014.
- ^Patrick Sawer; Tim Ross (5 October 2014). 'David Cameron pledges to defeat 'ruthless, senseless and barbaric' Isil killers'. The Daily Telegraph. London. Retrieved 5 October 2014.
- ^''Jihadi John': high degree of certainty US airstrike killed Mohammed Emwazi, sources say'. The Guardian. 13 November 2015.
- ^'ISIS confirms death of 'Jihadi John''. CNN. 20 January 2016. Retrieved 16 May 2018.
- ^'Alan Henning 'killed by Islamic State''. BBC News. Retrieved 5 October 2014.
- ^Ian Cobain. 'Isis video shows murder of British hostage Alan Henning'. The Guardian. Retrieved 5 October 2014.
- ^'Alan Henning RIP'. Archived from the original on 6 October 2014. Retrieved 7 October 2014.
- ^'Alan Henning's family 'numb with grief''. BBC News. Retrieved 5 October 2014.
- ^'Alan Henning: An ordinary man who wanted to help Syrians'. BBC News. Retrieved 5 October 2014.
- ^'Alan Henning's family 'numb with grief''. The Guardian. Retrieved 5 October 2014.
- ^ abcd'ISIS video claims to show beheading of Alan Henning; American threatened'. CNN. 4 October 2014. Retrieved 4 October 2014.
- ^'British hostage Alan Henning 'killed by Islamic State''. BBC News. Retrieved 3 October 2014.
- ^'Isis beheads British aid worker Alan Henning'. The Times. Retrieved 5 October 2014.
- ^'Alan Henning murder: David Cameron vows to defeat ISIS'. The Guardian. 4 October 2014. Retrieved 7 October 2014.
- ^'Prayers for murdered aid worker Alan Henning'. The Bolton News. Retrieved 7 October 2014.
- ^'Alan Henning memorial service held'. The Daily Telegraph. 5 October 2014. Retrieved 7 October 2014.
- ^Muslim community in Bolton raised £30,000 in memory of British aid worker, The Independent, accessed 11 October 2014.
- ^'Alan Henning memorial service held in Manchester'. BBC News.
- ^'Moazzam Begg: I offered to help secure release of Alan Henning'. The Guardian. Retrieved 7 October 2014.
- ^AbdulHaq al-Ashanti (2014). 'The Killing of Alan Henning: Mizanur Rahman Abu Baraa and his Errors in the Covenant of Security and the Definition of a Combatant in the Sharee'ah'(pdf).
- ^'Cameron on Alan Henning: 'We have lost a local hero''. BBC News.
- ^[1]
External links[edit]
- The Killing of Alan Henning: Refutation of Abu Baraa(PDF), London: SalafiManhaj.com, UK.