1. Introduction
This section is non-normative.
The Universal Serial Bus (USB) is the de-facto standard for wired peripherals. Most USB devices implement one of roughly a dozen standard "device classes" which specify a way for the device to advertise the features it supports and commands and data formats for using those features. Standard device classes include keyboard, mice, audio, video and storage devices. Operating systems support such devices using the "class driver" provided by the OS vendor. There is however a long tail of devices that do not fit into one of the standardized device classes. These devices require hardware vendors to write native drivers and SDKs in order for developers to take advantage of them and this native code prevents these devices from being used by the web.
The WebUSB API provides a way to safely expose USB device services to the web. It provides an API familiar to developers who have used existing native USB libraries and exposes the device interfaces defined by existing specifications. With this API hardware manufacturers will have the ability to build cross-platform JavaScript SDKs for their devices. This will be good for the web because, instead of waiting for a new kind of device to be popular enough for browsers to provide a specific API, new and innovative hardware can be built for the web from day one.
For more information about USB see §9 Appendix: A Brief Introduction to USB.
2. Motivating Applications
This section is non-normative.
2.1. Educational Devices
The software delivery model of the web is a key enabler for educational applications because they can be quickly loaded on any computer without questions of platform compatibility or administrative credentials. Science classes are incorporating computerized measurement and data logging into their lessons. These tools require bundled software that may be difficult to install on managed computers as every new native application adds overhead to an already stressed IT department. Web-based hardware APIs allow support for these devices to be built directly into existing online course materials, providing a completely seamless experience.
Students learning to code with one of the many microcontroller development kits can take advantage of online developer tools to write and upload their code. These tools already exist however they require a native component to interface between the browser and the hardware. These native extensions add a barrier to entry and may expose the user to security vulnerabilities in a way that that code running in the sandboxed web environment does not.
2.2. Web Drivers
The composablity of the web allows a new ecosystem of hardware support to be built entirely from web technology. Taking 3D printers an example, imagine that a site hosting 3D object designs wants to integrate printing directly into their page. The web supports 2D printing but there is no API for the 3D variety. If manufacturers host embeddable pages that use the WebUSB API to send data to their printers, sites can use these pages to integrate support for the hardware in the same way that features such as embedded maps are added to many existing sites.
2.3. Devices Updates and Diagnostics
While wireless protocols such as Bluetooth are often the more convenient choice for consumer devices USB ports continue to proliferate because they are an easy solution for power delivery and can serve as the connection of last resort when the device isn’t working. By integrating update and diagnostic tools into their support site a hardware manufacturer can provide tools for customers on any platform and collect better diagnostic data when a customer reaches out for support through their website. The landing page provides a way for the device manufacturer to direct the user to the right part of their website for help with their device.
3. Security and Privacy Considerations
This section is non-normative.
The WebUSB API is a powerful feature and has the possibility to expose users to a number of new privacy and security risks. These risks can be broadly divided into three categories that will be described in the sections below.
3.1. Abusing Access to a Device
Peripheral devices can serve a number of purposes. They may store data, as a flash drive does. They may collect information about the outside world as a camera or microphone does. They may manipulate objects in the outside world as a printer does. Each of the examples above have high-level APIs in the web platform with security features that aim to prevent their abuse by a malicious website. Storing data to or from an external drive requires the user to select the file manually. Turning on the microphone or camera requires permission from the user and may activate an indicator to let the user know data collection is in progress. Printing a document requires explicit action as well. This API provides a generic mechanism to connect to devices not covered by these existing high-level APIs and so it requires a similarly generic mechanism for preventing a malicious page from abusing a device.
The first of these protections is the requestDevice() function. The UA
may display a permission prompt when this function is called. Even for a
non-malicious page this action also preserves user privacy by preventing a site
from connecting to a device before the user is aware that such a connection is
possible. The UA may also display an indicator when a device connection is
active.
Secondly, this specification requires that only secure contexts as described in [powerful-features] can access USB devices. This ensures both the authenticity of the code executing on behalf of the origin and that data read from the device may not be intercepted in transit.
Lastly, since USB devices are unable to distinguish requests from multiple
sources, operating systems only allow a USB interface to have a single owning
user-space or kernel-space driver. The UA acts as a user-space driver, therefore
allowing only a single execution context to claim a USB interface at a time. The claimInterface() function will fail if multiple execution contexts
attempt to claim an interface.
3.2. Attacking a Device
Historically, unless they were created for high security applications, USB
devices have been designed to trust the host they are connected to and so the
host is the traditional guardian of access to the capabilities a device
provides. In the development of this specification two possibilities were
considered. First, the UA could notify the device of the origin from which a
request originated. This would be similar to the Referrer header
included in HTTP request. The difficulty of this approach is that it places
the burden of access control on the device. Devices often have very limited
processing and storage capabilities and so an effort was made to limit the
amount of work necessary on the part of the device.
The approach initially chosen during drafting of this specification was to instead require that the UA control access though a mechanism similiar to [CORS]. The device could provide the UA with a set of static data structures defining a set of origins that are allowed to connect to it. To support a transition period for existing devices it was proposed that information about allowed origins could also be provided out of band through some kind of public registry.
A downside of this approach was two-fold. First, it required vendors to build new devices with WebUSB in mind or rely on a public registry system that proved difficult to specify. Product development cycles are long and as only an Editor’s Draft this specification does not have the clout necessary to influence product planning. Second, it provided no mechanism for third-party developers to use this API with a device. This limited innovation and the number of developers who could take advantage of this new capability.
After considering these options the authors have decided that the permission
prompt encouraged by the requestDevice() method and the integration with §7.1 Feature Policy provide adequate protection against unwanted access to a
device.
3.3. Attacking the Host
If a device is compromised then in addition to abusing its own capabilities the attacker may also use it to in turn attack the host to which it is connected or if the exploit is persistent any host it is connected to later. The methods above are the ways in which this specification attempts to mitigate this attack vector for once the device is under the control of an attacker (for example, by uploading a malicious firmware image) there is nothing that can be done by the UA to prevent further damage.
This specification recommends device manufacturers practice defense in depth by designing their devices to only accept signed firmware updates and/or require physical access to the device in order to apply some configuration changes.
4. WebUSB Descriptors and Requests
This specification defines descriptors and commands the UA MAY use to gather information about the device specific to implementing this API.
4.1. WebUSB Platform Capability Descriptor
A device announces support for the WebUSB command set by including the following Platform Descriptor in its Binary Object Store:
| Offset | Field | Size | Value | Description |
|---|---|---|---|---|
| 0 | bLength | 1 | Number | Size of this descriptor. Must be set to 24. |
| 1 | bDescriptorType | 1 | Constant | DEVICE CAPABILITY descriptor type ([USB31] Table 9-6). |
| 2 | bDevCapabilityType | 1 | Constant | PLATFORM capability type ([USB31] Table 9-14). |
| 3 | bReserved | 1 | Number | This field is reserved and shall be set to zero. |
| 4 | PlatformCapabilityUUID | 16 | UUID | Must be set to {3408b638-09a9-47a0-8bfd-a0768815b665}. |
| 20 | bcdVersion | 2 | BCD | Protocol version supported. Must be set to 0x0100. |
| 22 | bVendorCode | 1 | Number | bRequest value used for issuing WebUSB requests. |
| 23 | iLandingPage | 1 | Number | URL descriptor index of the device’s landing page. |
The iLandingPage field, when non-zero, indicates a landing page which the device manufacturer would like the user to
visit in order to control their device. The UA MAY suggest the user navigate
to this URL when the device is connected.
4.2. WebUSB Device Requests
All control transfers defined by this specification are considered to
be vendor-specific requests. The bVendorCode value found
in the WebUSB Platform Capability Descriptor provides the UA
with the bRequest the device expects the host to use when
issuing control transfers these requests. The request type is then
specified in the wIndex field.
| Constant | Value |
|---|---|
| (Reserved) | 1 |
| GET_URL | 2 |
4.2.1. Get URL
This request fetches the URL descriptor with the given index.
The device MUST respond with the URL Descriptor at the given index or stall the transfer if the index is invalid.
| bmRequestType | bRequest | wValue | wIndex | wLength | Data |
|---|---|---|---|---|---|
| 11000000B | bVendorCode
| Descriptor Index | GET_URL | Descriptor Length | Descriptor |
4.3. WebUSB Descriptors
These descriptor types are returned by requests defined in this specification.
| Constant | Value |
|---|---|
| (Reserved) | 0-2 |
| WEBUSB_URL | 3 |
4.3.1. URL Descriptor
This descriptor contains a single URL and is returned by the Get URL request.
| Offset | Field | Size | Value | Description |
|---|---|---|---|---|
| 0 | bLength | 1 | Number | Size of this descriptor. |
| 1 | bDescriptorType | 1 | Constant | WEBUSB_URL. |
| 2 | bScheme | 1 | Number | URL scheme prefix. |
| 3 | URL | Variable | String | UTF-8 encoded URL (excluding the scheme prefix). |
The bScheme field MUST be one of these values:
| Value | Prefix |
|---|---|
| 0 | "http://" |
| 1 | "https://" |
| 255 | "" |
The special value 255 indicates that the entire URL, including
scheme, is encoded in the URL field.
5. Device Enumeration
dictionary {USBDeviceFilter unsigned short ;vendorId unsigned short ;productId octet ;classCode octet ;subclassCode octet ;protocolCode DOMString ; };serialNumber dictionary {USBDeviceRequestOptions required sequence <USBDeviceFilter >; }; [filters Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface :USB EventTarget {attribute EventHandler ;onconnect attribute EventHandler ;ondisconnect Promise <sequence <USBDevice >>(); [getDevices Exposed =Window ]Promise <USBDevice >(requestDevice USBDeviceRequestOptions ); }; [options Exposed =Window ,SecureContext ]partial interface Navigator { [SameObject ]readonly attribute USB ; }; [usb Exposed =(DedicatedWorker ,SharedWorker ),SecureContext ]partial interface WorkerNavigator { [SameObject ]readonly attribute USB ; };usb
getDevices(),
document. addEventListener( 'DOMContentLoaded' , async() => { let devices= await navigator. usb. getDevices(); devices. forEach( device=> { // Add |device| to the UI. }); });
After the page is loaded the user may connect or disconnect a device from their system so script should also register for these events in order to keep the interface up-to-date,
navigator. usb. addEventListener( 'connect' , event=> { // Add |event.device| to the UI. }); navigator. usb. addEventListener( 'disconnect' , event=> { // Remove |event.device| from the UI. });
If this is the first time the user has visited the page then it won’t have
permission to access any devices so the page must first call requestDevice() in response to a user gesture. In this case the page
supports devices from vendor 0xABCD that carry the vendor-specific
subclass 0x01,
let button= document. getElementById( 'request-device' ); button. addEventListener( 'click' , async() => { let device; try { device= await navigator. usb. requestDevice({ filters: [{ vendorId: 0xABCD , classCode: 0xFF , // vendor-specific protocolCode: 0x01 }]}); } catch ( err) { // No device was selected. } if ( device!== undefined ) { // Add |device| to the UI. } });
A USB device device matches a device
filter filter if the following steps return match:
-
Let deviceDesc be device’s device descriptor.
-
If
filter.is present andvendorIddeviceDesc.idVendordoes not equalfilter., returnvendorIdmismatch. -
If
filter.is present andproductIddeviceDesc.idProductdoes not equalfilter., returnproductIdmismatch. -
If
filter.is present then, let serialNumber be the string descriptor with indexserialNumberdeviceDesc.iSerialNumber. If device returns an error when requesting serialNumber or serialNumber is not equal tofilter., returnserialNumbermismatch. -
If
filter.is present and, for any of device’s interface’s interface, interface matches the interface filter filter, returnclassCodematch. -
If
filter.is present andclassCodedeviceDesc.bDeviceClassis not equal tofilter., returnclassCodemismatch. -
If
filter.is present andsubclassCodedeviceDesc.bDeviceSubClassis not equal tofilter., returnsubclassCodemismatch. -
If
filter.is present andprotocolCodedeviceDesc.bDeviceProtocolis not equal tofilter., returnprotocolCodemismatch. -
Return
match.
Note: The steps above treat the bDeviceClass, bDeviceSubClass and bDeviceProtocol fields of the device descriptor as though they were part of an interface
descriptor which is also compared against the provided filter.
A USB interface interface matches
an interface filter filter if the following steps return match:
-
Let desc be interface’s interface descriptor.
-
If
filter.is present andclassCodedesc.bInterfaceClassis not equal tofilter., returnclassCodemismatch. -
If
filter.is present andsubclassCodedesc.bInterfaceSubClassis not equal tofilter., returnsubclassCodemismatch. -
If
filter.is present andprotocolCodedesc.bInterfaceProtocolis not equal tofilter., returnprotocolCodemismatch. -
Return
match.
A USBDeviceFilter filter is valid if the following steps
return valid:
-
If
filter.is present andproductIdfilter.is not present, returnvendorIdinvalid. -
If
filter.is present andsubclassCodefilter.is not present, returnclassCodeinvalid. -
If
filter.is present andprotocolCodefilter.is not present, returnsubclassCodeinvalid. -
Return
valid.
The UA MUST be able to enumerate all devices attached to the system.
It is, however NOT required to perform this work each time an algorithm
requests an enumeration. The UA MAY cache the result of the first enumeration
it performs and then begin monitoring for device connection and disconnection
events, adding connected devices to its cached enumeration and removing
disconnected devices. This mode of operation is preferred as it reduces the
number of operating system calls made and amount of bus traffic generated by
the getDevices() and requestDevice() methods.
The onconnect attribute is an Event handler IDL attribute for the connect event type.
The ondisconnect attribute is an Event handler IDL attribute for the disconnect event type.
The getDevices() method, when invoked, MUST return a new Promise and
run the following steps in parallel:
-
Enumerate all devices attached to the system. Let this result be enumerationResult.
-
Let devices be a new empty
Array. -
For each device in enumerationResult:
-
If this is the first call to this method, check permissions for device.
-
Search for an element allowedDevice in
storage.where device is in allowedDevice@allowedDevices[[devices]]. If no such element exists, continue to the next device. -
Add the
USBDeviceobject representing device to devices.
-
-
Resolve promise with devices.
The requestDevice() method, when invoked, MUST run the following steps:
-
Request permission to use the following descriptor,
{ name: "usb" filters: options. filters} Let permissionResult be the resulting
Promise. -
Return the result of transforming permissionResult with a fullfillment handler that takes an argument result and runs the following steps:
-
If
result.is empty, throw adevicesNotFoundErrorand abort these steps. -
Return
result..devices[0]
-
To request the "usb" permission, given a USBPermissionStorage storage, a USBPermissionDescriptor options and a USBPermissionResult status, the UA MUST return a new Promise promise and run the following
steps in parallel:
-
For each filter in
options.if filter is not a valid filter reject promise with afiltersTypeErrorand abort these steps. -
If the algorithm is not triggered by user activation, reject promise with a
SecurityErrorand abort these steps. -
Set
status.to `"ask"`.state -
Enumerate all devices attached to the system. Let this result be enumerationResult.
-
Remove devices from enumerationResult if they do not match a device filter in
options..filters -
Display a prompt to the user requesting they select a device from enumerationResult. The UA SHOULD show a human-readable name for each device.
-
Wait for the user to have selected a device or cancelled the prompt.
-
If the user cancels the prompt, set
status.to an emptydevicesFrozenArray, resolve promise withundefined, and abort these steps. -
Let deviceObj be the
USBDeviceobject representing device. -
Set
status.to a newdevicesFrozenArraycontaining deviceObj as its only element. -
Resolve promise with
undefined.
To add an allowed USB device device to USBPermissionStorage storage, the UA MUST run the following
steps:
-
Search for an element allowedDevice in
storage.where device is in allowedDevice@allowedDevices[[devices]]. If one is found, abort these steps. -
Let vendorId and productId be device’s vendor ID and product ID.
-
Let serialNumber be device’s serial number if it has one, otherwise
undefined. -
Append
{ vendorId: vendorId, productId: productId, serialNumber: serialNumber }, with a[[devices]]internal slot containing a single entry device tostorage..allowedDevices
To check permissions for a new USB device device, given a USBPermissionStorage storage,
the UA MUST run the following steps:
-
Let vendorId and productId be device’s vendor ID and product ID.
-
Let serialNumber be device’s if it has one, otherwise
undefined. -
Search for an element allowedDevice in
storage.where:allowedDevices-
allowedDevice.equals vendorId.vendorId -
allowedDevice.equals productId.productId -
allowedDevice.equals serialNumber.serialNumber
-
-
If no such element exists, return
null. -
Add device to allowedDevice@
[[devices]]. -
Return allowedDevice.
5.1. Events
dictionary :USBConnectionEventInit EventInit {required USBDevice ; }; [device (Constructor DOMString ,type USBConnectionEventInit ),eventInitDict Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface :USBConnectionEvent Event { [SameObject ]readonly attribute USBDevice ; };device
When the UA detects a new USB device device connected to the host it MUST perform the following steps for each script execution environment:
-
Let storage be the
USBPermissionStorageobject in the current script execution environment. -
Check permissions for device with storage and let allowedDevice be the result.
-
If allowedDevice is
null, abort these steps. -
Let deviceObj be the
USBDeviceobject representing device. -
Let event be a new
USBConnectionEvent, with thedeviceattribute set to deviceObj. -
Fire an event named connect on
usb, using event as the event object.
When the UA detects a USB device device has been disconnected from the host it MUST perform the following steps for each script execution environment:
-
Let storage be the
USBPermissionStorageobject in the current script execution environment. -
Search for an element allowedDevice in
storage.where device is in allowedDevice@allowedDevices[[devices]], if no such element exists, abort these steps. -
Remove device from allowedDevice@
[[devices]]. -
If
allowedDevice.isserialNumberundefinedand allowedDevice@[[devices]]is empty remove allowedDevice fromstorage..allowedDevices -
Let device be the
USBDeviceobject representing device. -
Let event be a new
USBConnectionEvent, with thedeviceattribute set to device. -
Fire an event named disconnect on
usb, using event as the event object.
6. Device Usage
[Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBDevice readonly attribute octet ;usbVersionMajor readonly attribute octet ;usbVersionMinor readonly attribute octet ;usbVersionSubminor readonly attribute octet ;deviceClass readonly attribute octet ;deviceSubclass readonly attribute octet ;deviceProtocol readonly attribute unsigned short ;vendorId readonly attribute unsigned short ;productId readonly attribute octet ;deviceVersionMajor readonly attribute octet ;deviceVersionMinor readonly attribute octet ;deviceVersionSubminor readonly attribute DOMString ?;manufacturerName readonly attribute DOMString ?;productName readonly attribute DOMString ?;serialNumber readonly attribute USBConfiguration ?;configuration readonly attribute FrozenArray <USBConfiguration >;configurations readonly attribute boolean ;opened Promise <void >();open Promise <void >();close Promise <void >(selectConfiguration octet );configurationValue Promise <void >(claimInterface octet );interfaceNumber Promise <void >(releaseInterface octet );interfaceNumber Promise <void >(selectAlternateInterface octet ,interfaceNumber octet );alternateSetting Promise <USBInTransferResult >(controlTransferIn USBControlTransferParameters ,setup unsigned short );length Promise <USBOutTransferResult >(controlTransferOut USBControlTransferParameters ,setup optional BufferSource );data Promise <void >(clearHalt USBDirection ,direction octet );endpointNumber Promise <USBInTransferResult >(transferIn octet ,endpointNumber unsigned long );length Promise <USBOutTransferResult >(transferOut octet ,endpointNumber BufferSource );data Promise <USBIsochronousInTransferResult >(isochronousTransferIn octet ,endpointNumber sequence <unsigned long >);packetLengths Promise <USBIsochronousOutTransferResult >(isochronousTransferOut octet ,endpointNumber BufferSource ,data sequence <unsigned long >);packetLengths Promise <void >(); };reset
bConfigurationValue 1)
with a single interface (bInterfaceNumber 1) with a single
bulk endpoint (bEndpointAddress 0x81 which means that it is
endpoint 1 and an IN endpoint). When data is sampled it is available on this
endpoint. The maximum packet size on this endpoint is 16 bytes to support all 8
channels being activated at the same time. To save bus bandwidth, however, any
combination of channels can be activated and deactivated. The packet will only
be the length necessary to transmit the data collected.
To get started we open the device, select the first configuration (it only has one but the operating system may not have already done this during enumeration) and claim the data logging interface,
await device. open(); if ( device. configuration=== null ) await device. selectConfiguration( 1 ); await device. claimInterface( 1 );
For this particular application we care about reading from channels 1, 2 and 5 so we issue a control transfer to activate these channels,
await device. controlTransferOut({ requestType: ' vendor ' , recipient: ' interface ' , request: 0x01 , // vendor-specific request: enable channels value: 0x0013 , // 0b00010011 (channels 1, 2 and 5) index: 0x0001 // Interface 1 is the recipient });
The application may now start polling the device for data. As we only expect data from 3 channels we request a 6 byte buffer. As long as we receive a complete buffer the captured values (transmitted in big endian) are printed to the console log. If the device has encountered an error and signals this by stalling the endpoint then the error is cleared before continuing,
while ( true ) { let result= await data. transferIn( 1 , 6 ); if ( result. data&& result. data. byteLength=== 6 ) { console. log( 'Channel 1: ' + result. data. getUint16( 0 )); console. log( 'Channel 2: ' + result. data. getUint16( 2 )); console. log( 'Channel 5: ' + result. data. getUint16( 4 )); } if ( result. status=== 'stall' ) { console. warn( 'Endpoint stalled. Clearing.' ); await device. clearHalt( 1 ); } }
The usbVersionMajor, usbVersionMinor and usbVersionSubminor attributes declare the USB protocol version
supported by the device. They SHALL correspond to the value of the bcdUSB field of the device descriptor such that a value of 0xJJMN has major version JJ, minor version M and subminor version N.
The deviceClass, deviceSubclass and deviceProtocol attributes declare the communication interface
supported by the device. They MUST correspond respectively to the values of the bDeviceClass, bDeviceSubClass and bDeviceProtocol fields of the device descriptor.
The vendorId and productId MUST be equal to the
device’s vendor ID and product ID.
The deviceVersionMajor, deviceVersionMinor and deviceVersionSubminor attributes declare the device release
number as defined by the device manufacturer. It SHALL correspond to the value
of the bcdDevice field of the device descriptor such that a
value of 0xJJMN has major version JJ, minor version M and subminor version N.
The manufacturerName, productName and serialNumber attributes SHOULD contain the values of the string
descriptors indexed by the iManufacturer, iProduct and iSerialNumber fields of the device descriptor if each is
defined.
The configuration attribute contains the currently selected
configuration for the device and SHALL be one of the configurations listed in configurations. It MAY be null if the device is in
an unconfigured state and MUST be updated by selectConfiguration().
The configurations attribute contains a list of configurations
supported by the device. These configurations SHALL be populated from the
configuration descriptors reported by the device and the number of elements in
this list SHALL match the value of the bNumConfigurations field of
the device descriptor.
The opened attribute SHALL be set to true when the
device is opened by the current execution context and SHALL be set to false otherwise.
The open() method, when invoked, MUST return a new Promise promise and run the following steps in parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
If
device.isopenedtrueresolve promise and abort these steps. -
Perform the necessary platform-specific steps to begin a session with the device. If these fail for any reason reject promise with a
NetworkErrorand abort these steps.
The close() method, when invoked, MUST return a new Promise promise and run the following steps in parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
If
device.isopenedfalseresolve promise and abort these steps. -
Abort all other algorithms currently running against this device and reject their associated promises with an
AbortError. -
Perform the necessary platform-specific steps to release any claimed interfaces as if
releaseInterface(interfaceNumber)had been called for each claimed interface. -
Perform the necessary platform-specific steps to end the session with the device.
When no [ECMAScript] code can observe an instance of USBDevice device anymore, the UA SHOULD run device.close().
The selectConfiguration(configurationValue) method, when invoked,
MUST return a new Promise promise and run the following steps in
parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let configuration be the device configuration with
bConfigurationValueequal to configurationValue. If no such configuration exists, reject promise with aNotFoundErrorand abort these steps. -
If
device.is not equal toopenedtruereject promise with anInvalidStateErrorand abort these steps. -
Abort all transfers currently scheduled on endpoints other than the default control pipe and reject their associated promises with a
AbortError. -
Issue a
SET_CONFIGURATIONcontrol transfer to the device to set configurationValue as its active configuration. If this step fails reject promise with aNetworkErrorand abort these steps. -
Set
device.to configuration and resolve promise.configuration
The claimInterface(interfaceNumber) method, when invoked, MUST
return a new Promise and run the following steps in parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let interface be the interface in the active configuration with
bInterfaceNumberequal to interfaceNumber. If no such interface exists, reject promise with aNotFoundErrorand abort these steps. -
If
device.is notopenedtrueandinterface.is notclaimedfalse, reject promise with anInvalidStateErrorand abort these steps. -
Perform the necessary platform-specific steps to request exclusive control over interface for the current execution context. If this fails, reject promise with a
NetworkErrorand abort these steps.
The releaseInterface(interfaceNumber) method, when invoked, MUST
return a new Promise promise and run the following steps in
parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let interface be the interface in the active configuration with
bInterfaceNumberequal to interfaceNumber. If no such interface exists, reject promise with aNotFoundErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Perform the necessary platform-specific steps to reliquish exclusive control over interface.
The selectAlternateInterface(interfaceNumber, alternateSetting) method, when invoked, MUST return a new Promise promise and run the
following steps in parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let interface be the interface in the active configuration with
bInterfaceNumberequal to interfaceNumber. If no such interface exists, reject promise with aNotFoundErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Abort all transfers currently scheduled on endpoints associated with the previously selected alternate setting of interface and reject their associated promises with a
AbortError. -
Issue a
SET_INTERFACEcontrol transfer to the device to set alternateSetting as the current configuration of interface. If this step fails reject promise with aNetworkErrorand abort these steps. -
Resolve promise.
The controlTransferIn(setup, length) method, when invoked, MUST
return a new Promise promise and run the following steps in
parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
If
device.is not equal toopenedtruereject promise with anInvalidStateErrorand abort these steps. -
Check the validity of the control transfer parameters and abort these steps if promise is rejected.
-
If length is greater than the
bMaxPacketSize0field of the device’s device descriptor, reject promise with aTypeErrorand abort these steps. -
If length is greather than 0, let buffer be a host buffer with space for length bytes.
-
Issue a control transfer to device with the setup packet parameters provided in setup, the data transfer direction in
bmRequestTypeset to "device to host" andwLengthset to length. If defined also provide buffer as the destination to write data received in response to this transfer. -
Let bytesTransferred be the number of bytes written to buffer.
-
Let result be a new
USBInTransferResult. -
If data was received from device create a new
ArrayBuffercontaining the first bytesTransferred bytes of buffer and setresult.to a newdataDataViewconstructed over it. -
If device responded by stalling the default control pipe set
result.tostatus"stall". -
If device responded with more than length bytes of data set
result.tostatus"babble"and otherwise set it to"ok". -
If the transfer fails for any other reason reject promise with a
NetworkErrorand abort these steps. -
Resolve promise with result.
The controlTransferOut(setup, data) method, when invoked, must
return a new Promise promise and run the following steps in
parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
If
device.is not equal toopenedtruereject promise with anInvalidStateErrorand abort these steps. -
Check the validity of the control transfer parameters and abort these steps if promise is rejected.
-
If
data.lengthis greater than thebMaxPacketSize0field of the device’s device descriptor, reject promise with aTypeErrorand abort these steps. -
Issue a control transfer with the setup packet populated by setup and the data transfer direction in
bmRequestTypeset to "host to device" andwLengthset todata.length. Transmit data in the data stage of the transfer. -
Let result be a new
USBOutTransferResult. -
If the device responds by stalling the default control pipe set
result.tostatus"stall". -
If the device acknowledges the transfer set
result.tostatus"ok"andresult.tobytesWrittendata.length. -
If the transfer fails for any other reason reject promise with a
NetworkErrorand abort these steps. -
Resolve promise with result.
The clearHalt(direction, endpointNumber) method, when invoked,
MUST return a new Promise promise and run the following steps in
parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let endpoint be the endpoint in the active configuration with
bEndpointAddresscorresponding to direction and endpointNumber. If no such endpoint exists reject promise and abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Issue a
ClearFeature(ENDPOINT_HALT)control transfer to the device to clear the halt condition on endpoint. -
On failure reject promise with a
NetworkError, otherwise resolve promise.
The transferIn(endpointNumber, length) method, when invoked, MUST
return a new Promise promise and run the following steps in
parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let endpoint be the IN endpoint in the active configuration with
bEndpointAddresscorresponding to endpointNumber. If there is no such endpoint reject promise with aNotFoundErrorand abort these steps. -
If endpoint is not a bulk or interrupt endpoint reject promise with an
InvalidAccessErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Let buffer be a host buffer with space for length bytes.
-
As appropriate for endpoint enqueue a bulk or interrupt IN transfer on endpoint to receive length bytes of data from the device into buffer.
-
Let bytesTransferred be the number of bytes written to buffer.
-
Let result be a new
USBInTransferResult. -
If data was received from device create a new
ArrayBuffercontaining the first bytesTransferred bytes of buffer and setresult.to a newdataDataViewconstructed over it. -
If device responded with more than length bytes of data set
result.tostatus"babble". -
If the transfer ended because endpoint is halted set
result.tostatus"stall". -
If device acknowledged the complete transfer set
result.tostatus"ok". -
If the transfer failed for any other reason reject promise with a
NetworkErrorand abort these steps. -
Resolve promise with result.
The transferOut(endpointNumber, data) method, when invoked, MUST
return a new Promise promise and run the following steps in
parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let endpoint be the OUT endpoint in the active configuration with
bEndpointAddresscorresponding to endpointNumber. If there is no such endpoint reject promise with aNotFoundErrorand abort these steps. -
If endpoint is not a bulk or interrupt endpoint reject promise with an
InvalidAccessErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
As appropriate for endpoint enqueue a bulk or interrupt OUT transfer on endpoint to transmit data to the device.
-
Let result be a new
USBOutTransferResult. -
Set
result.to the amount of data successfully sent to the device.bytesWritten -
If the device acknowledges the complete transfer set
result.tostatus"ok". -
If the transfer fails for any other reason reject promise with a
NetworkErrorand abort these steps. -
Resolve promise with result.
The isochronousTransferIn(endpointNumber, packetLengths) method,
when invoked, MUST return a new Promise promise and run the following
steps in parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let endpoint be the IN endpoint in the active configuration with
bEndpointAddresscorresponding to endpointNumber. If there is no such endpoint reject promise with aNotFoundErrorand abort these steps. -
If endpoint is not an isochronous endpoint reject promise with an
InvalidAccessErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Let length be the sum of the elements of packetLengths.
-
Let buffer be a new
ArrayBufferof length bytes. -
Let result be a new
USBIsochronousInTransferResultand setresult.to a newdataDataViewconstructed over buffer. -
Enqueue an isochronous IN transfer on endpoint that will write up to length bytes of data from the device into buffer.
-
For each packet i from
0topacketLengths.length - 1:-
Let packet be a new
USBIsochronousInTransferPacketand setresult.to packet.packets[i] -
Let view be a new
DataViewover the portion of buffer containing the data received from the device for this packet and setpacket.to view.data -
If the device responds with more than
packetLengths[i]bytes of data setpacket.tostatus"babble". -
If the transfer ends because endpoint is stalled set
packet.tostatus"stall". -
If the device acknowledges the complete transfer set
packet.tostatus"ok". -
If the transfer fails for any other reason reject promise with a
NetworkErrorand abort these steps.
-
-
Resolve promise with result.
The isochronousTransferOut(endpointNumber, data, packetLengths) method, when invoked, MUST return a new Promise promise and run the
following steps in parallel:
-
If the device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
Let endpoint be the OUT endpoint in the active configuration with
bEndpointAddresscorresponding to endpointNumber. If there is no such endpoint reject promise with aNotFoundErrorand abort these steps. -
If endpoint is not an isochronous endpoint reject promise with an
InvalidAccessErrorand abort these steps. -
If
device.oropenedinterface.is notclaimedtrue, reject promise with anInvalidStateErrorand abort these steps. -
Let length be the sum of the elements of packetLengths.
-
Let result be a new
USBIsochronousOutTransferResult. -
Enqueue an isochronous OUT transfer on endpoint that will write buffer to the device, divided into
packetLength.lengthpackets ofpacketLength[i]bytes (for packets i from0topacketLengths.length - 1). -
For each packet i from
0topacketLengths.length - 1the host attempts to send to the device:-
Let packet be a new
USBIsochronousOutTransferPacketand setresult.to packet.packets[i] -
Let
packet.be the amount of data successfully sent to the device as part of this packet.bytesWritten -
If the transfer ends because endpoint is stalled set
packet.tostatus"stall". -
If the device acknowledges the complete transfer set
packet.tostatus"ok". -
If the transfer fails for any other reason reject promise with a
NetworkErrorand abort these steps.
-
-
Resolve promise with result.
The reset() method, when invoked, MUST return a new Promise promise and run the following steps in parallel:
-
Let device be the target
USBDeviceobject. -
If device is no longer connected to the system, reject promise with a
NotFoundErrorand abort these steps. -
If
device.is not equal toopenedtruereject promise with anInvalidStateErrorand abort these steps. -
Abort all operations on the device and reject their associated promises with an
AbortError. -
Perform the necessary platform-specific operation to soft reset the device.
-
On failure reject promise with a
NetworkError, otherwise resolve promise.
What configuration is the device in after it resets? <https://github.com/WICG/webusb/issues/36>
6.1. Transfers
enum {USBRequestType ,"standard" ,"class" };"vendor" enum {USBRecipient ,"device" ,"interface" ,"endpoint" };"other" enum {USBTransferStatus ,"ok" ,"stall" };"babble" dictionary {USBControlTransferParameters required USBRequestType ;requestType required USBRecipient ;recipient required octet ;request required unsigned short ;value required unsigned short ; }; [index (Constructor USBTransferStatus ,status optional DataView ?),data Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBInTransferResult readonly attribute DataView ?;data readonly attribute USBTransferStatus ; }; [status (Constructor USBTransferStatus ,status optional unsigned long = 0),bytesWritten Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBOutTransferResult readonly attribute unsigned long ;bytesWritten readonly attribute USBTransferStatus ; }; [status (Constructor USBTransferStatus ,status optional DataView ?),data Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBIsochronousInTransferPacket readonly attribute DataView ?;data readonly attribute USBTransferStatus ; }; [status (Constructor sequence <USBIsochronousInTransferPacket >,packets optional DataView ?),data Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBIsochronousInTransferResult readonly attribute DataView ?;data readonly attribute FrozenArray <USBIsochronousInTransferPacket >; }; [packets (Constructor USBTransferStatus ,status optional unsigned long = 0),bytesWritten Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBIsochronousOutTransferPacket readonly attribute unsigned long ;bytesWritten readonly attribute USBTransferStatus ; }; [status (Constructor sequence <USBIsochronousOutTransferPacket >),packets Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBIsochronousOutTransferResult readonly attribute FrozenArray <USBIsochronousOutTransferPacket >; };packets
A control transfer is a special class of USB traffic most commonly used for configuring a device. It consists of three stages: setup, data and status. In the setup stage a setup packet is transmitted to the device containing request parameters including the transfer direction and size of the data to follow. In the data stage that data is either sent to or received from the device. In the status stage successful handling of the request is acknowledged or a failure is signaled.
All USB devices MUST have a default control pipe which is endpointNumber 0.
The requestType attribute populates part of
the bmRequestType field of the setup packet to indicate
whether this request is part of the USB standard, a particular USB device class
specification or a vendor-specific protocol.
The recipient attribute populates part of the bmRequestType field of the setup packet to indicate whether
the control transfer is addressed to the entire device, or a specific
interface or endpoint.
The request attribute populates the bRequest field of the setup packet. Valid requests are
defined by the USB standard, USB device class specifications or the device
vendor.
The value and index attributes populate the wValue and wIndex fields of the setup packet respectively. The meaning of these fields depends on the request being made.
To check the validity of the control transfer parameters perform the following steps:
-
Let setup be the
USBControlTransferParameterscreated for the transfer. -
Let promise be the promise created for the transfer.
-
Let configuration be the active configuration. If the device is not configured abort these steps.
-
If
setup.isrecipient"interface", perform the following steps:-
Let interfaceNumber be the lower 8 bits of
setup..index -
Let interface be the interface in the | configuration| with
bInterfaceNumberequal to interfaceNumber. If no such interface exists, reject promise with aNotFoundErrorand abort these steps. -
If
interface.is not equal toclaimedtrue, reject promise with anInvalidStateErrorand abort these steps.
-
-
If
setup.isrecipient"endpoint", run the following steps:-
Let endpointNumber be defined as the lower 4 bits of
setup..index -
Let direction be defined as
"in"if the 8th bit ofsetup.isindex1and"out"otherwise. -
Let endpoint be the endpoint in the active configuration with
bEndpointAddresscorresponding to direction and endpointNumber. If no such endpoint exists, reject promise with aNotFoundErrorand abort these steps. -
Let interface be the interface in which endpoint is defined. If
interface.is not equal toclaimedtrue, reject promise with anInvalidStateError.
-
6.2. Configurations
[(Constructor USBDevice ,device octet ),configurationValue Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBConfiguration readonly attribute octet ;configurationValue readonly attribute DOMString ?;configurationName readonly attribute FrozenArray <USBInterface >; };interfaces
Each device configuration SHALL have a unique configurationValue that matches the bConfigurationValue fields of the configuration descriptor that defines it.
The configurationName attribute SHOULD contain the value
of the string descriptor referenced by the iConfiguration field of the configuration descriptor, if defined.
The interfaces attribute SHALL contain a list of
interfaces exposed by this device configuration. These interfaces SHALL by
populated by collecting the interface descriptors contained within this configuration descriptor and organizing them by bInterfaceNumber.
Include some non-normative information about device configurations. <https://github.com/WICG/webusb/issues/46>
6.3. Interfaces
[(Constructor USBConfiguration ,configuration octet ),interfaceNumber Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBInterface readonly attribute octet ;interfaceNumber readonly attribute USBAlternateInterface ;alternate readonly attribute FrozenArray <USBAlternateInterface >;alternates readonly attribute boolean ; }; [claimed (Constructor USBInterface ,deviceInterface octet ),alternateSetting Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBAlternateInterface readonly attribute octet ;alternateSetting readonly attribute octet ;interfaceClass readonly attribute octet ;interfaceSubclass readonly attribute octet ;interfaceProtocol readonly attribute DOMString ?;interfaceName readonly attribute FrozenArray <USBEndpoint >; };endpoints
Each interface provides a collection of alternates identified
by a single bInterfaceNumber field found in their interface
descriptors. The interfaceNumber attribute MUST match this
field.
The alternate attribute SHALL be set to the USBAlternateInterface that is currently selected for this interface, which
by default SHALL be the one with bAlternateSetting equal to 0.
The alternates attribute SHALL contain a list of all alternate
interface configurations available for this interface.
The claimed attribute SHALL be set to true when
the interface is claimed by the current execution context and SHALL be set to false otherwise.
Each alternative interface configuration SHALL have a unique alternateSetting within a given interface that
matches the bAlternateSetting field of the interface
descriptor that defines it.
The interfaceClass, interfaceSubclass and interfaceProtocol attributes declare the
communication interface supported by the interface. They MUST correspond
respectively to the values of the bInterfaceClass, bInterfaceSubClass and bInterfaceProtocol fields of
the interface descriptor.
The interfaceName attribute SHOULD contain the value
of the string descriptor indexed by the iInterface field of
the interface descriptor, if defined.
The endpoints attribute SHALL contain a list of
endpoints exposed by this interface. These endpoints SHALL by populated from
the endpoint descriptors contained within this interface descriptor and the number of elements in this sequence SHALL
match the value of the bNumEndpoints field of the interface descriptor.
A device’s active configuration is the combination of the USBConfiguration selected by calling selectConfiguration(configurationValue) and the set of USBAlternateInterfaces selected by calling selectAlternateInterface(interfaceNumber, alternateSetting). A
device MAY, by default, be left in an unconfigured state, referred to as
configuration 0 or may automatically be set to whatever
configuration has bConfigurationValue equal to 1.
When a configuration is set all interfaces within that configuration
automatically have the USBAlternateInterface with bAlternateSetting equal to 0 selected by default. It
is therefore unnecessary to call selectAlternateInterface(interfaceNumber, alternateSetting) with alternateSetting equal to 0 for each interface when opening a
device.
6.4. Endpoints
enum {USBDirection ,"in" };"out" enum {USBEndpointType ,"bulk" ,"interrupt" }; ["isochronous" (Constructor USBAlternateInterface ,alternate octet ,endpointNumber USBDirection ),direction Exposed =(DedicatedWorker ,SharedWorker ,Window ),SecureContext ]interface {USBEndpoint readonly attribute octet ;endpointNumber readonly attribute USBDirection ;direction readonly attribute USBEndpointType ;type readonly attribute unsigned long ; };packetSize
Each endpoint within a particular device configuration SHALL have a unique
combination of endpointNumber and direction.
The endpointNumber MUST equal the 4 least significant bits of
the bEndpointAddress field of the endpoint descriptor defining the endpoint.
The direction attribute declares the transfer direction
supported by this endpoint and is equal to "in" if the most
significant bit of the bEndpointAddress is set and "out" otherwise. An endpoint may either carry data IN from the device to host or OUT from host to device.
The type attribute declares the type of data transfer supported
by this endpoint.
The packetSize attribute declares the packet size employed by
this endpoint and MUST be equal to the value of the wMaxPacketSize of the endpoint descriptor defining it. In a High-Speed, High-Bandwidth
endpoint this value will include the multiplication factor provided by issuing
multiple transactions per microframe. In a SuperSpeed device this value will
include the multiplication factor provided by the bMaxBurst field
of the SuperSpeed Endpoint Companion descriptor.
7. Integrations
7.1. Feature Policy
This specification defines a feature that controls whether the usb attribute is exposed on the Navigator object.
The feature name for this feature is "usb".
The default allowlist for this feature is ["self"].
7.2. Permission API
The [permissions] API provides a uniform way for websites to request permissions from users and query which permissions they have.
The "usb" powerful feature is
defined as follows:
- permission descriptor type
-
dictionary :USBPermissionDescriptor PermissionDescriptor {sequence <USBDeviceFilter >; };filters - extra permission data type
-
USBPermissionStorage, defined as:dictionary {AllowedUSBDevice required octet ;vendorId required octet ;productId DOMString ; };serialNumber dictionary {USBPermissionStorage sequence <AllowedUSBDevice >= []; };allowedDevices AllowedUSBDeviceinstances have an internal slot[[devices]]that holds an array of USB devices. - permission result type
-
interface :USBPermissionResult PermissionStatus {attribute FrozenArray <USBDevice >; };devices - permission query algorithm
-
To query the "usb" permission with a
USBPermissionDescriptordesc, aUSBPermissionStoragestorage, and aUSBPermissionResultstatus, the UA must:-
If
desc.is set then, for each filter infiltersdesc.if filter is not a valid filter then raise afiltersTypeErrorand abort these steps. -
Let matchingDevices be a new
Array. -
For each allowedDevice in
storage.and for each device inallowedDevicesallowedDevice@, run the following substeps:[[devices]]-
If
desc.is set and device does not match a device filter infiltersdesc., continue to the next device.filters -
Get the
USBDevicerepresenting device and add it to matchingDevices.
-
-
Set
status.to a newdevicesFrozenArraywhose contents are matchingDevices.
-
- permission request algorithm
- Request the "usb" permission.
8. Terminology
This specification uses several terms taken from [USB31]. While reference is made to version 3.1 of the Universal Serial Bus many of these concepts exist in previous versions as well. Significant differences between USB versions that have bearing on this specification will be called out explicitly.
Descriptors are binary data structures that can be read from a device and describe its properties and function:
-
The device descriptor contains information applicable to the entire devices and is described in section 9.6.1 of [USB31].
-
A configuration descriptor describes a particular set of device interfaces and endpoints that can be selected by the host. Its fields are described in section 9.6.3 of [USB31].
-
An interface descriptor describes the interface of a particular functional component of a device including its protocol and communication endpoints. Its fields are described in section 9.6.5 of [USB31].
-
An interface association descriptor creates an association between multiple interfaces that are part of a single functional unit of a device. Its fields are described in section 9.6.4 of [USB31].
-
An endpoint descriptor describes a channel through which data is either sent to or received from the device. Its fields are described in section 9.6.6 of [USB31].
-
A string descriptor contains a single UTF16-LE string and is referenced by index by other descriptors. Its fields are described in section 9.6.9 of [USB31].
The Binary Object Store (BOS) is an additional set of descriptors that are more free-form than the standard device descriptors. Of note is the Platform Descriptor type which allows third parties (such as this specification) to declare their own types of descriptors. Each of these is identified by a UUID. The Binary Object Store is described in section 9.6.2 of [USB31].
A USB device has a single device descriptor which links to
one or more configuration descriptors. It’s vendor ID is
assigned to the device manufacturer by the USB-IF and is stored in the idVendor field of the device descriptor. It’s product
ID is assigned by the manufacturer and is stored in the idProduct field of the device descriptor. It’s serial
number is an optional property that is defined if the iSerialNumber field of the device descriptor is not equal
to 0 and is the string descriptor referred to by that index.
9. Appendix: A Brief Introduction to USB
This section is non-normative.
USB is a network but it’s very different from traditional TCP/IP networks. It is really more like an RPC system. All traffic is directed by the host, that is, your computer. Though some devices like smartphones can act as both a USB host and USB client they can only take on one role at a time.
9.1. Descriptors
USB devices identify themselves to the host by providing a set of binary structures known as descriptors. The first one read by the host is the device descriptor which contains basic information such as the vendor and product IDs assigned by the USB-IF and the manufacturer. The host may then read the device’s configuration descriptor which is a description of the device’s capabilities including the interfaces and endpoints it exposes. A class can be declared at the device level or for individual interfaces. A device with multiple interfaces providing different functions is known as a composite device.
9.2. Transfers
Whether data is traveling from host to device or the other way around the transfer is always initiated by the host. OUT transfers carry data from host to device and may wait until the device acknowledges the data has been received. IN transfers carry data from device to host and may have to wait until the device has some data to send. Transfers are executed against one of a device’s endpoints and there are different kinds depending on what type of traffic is being sent.
-
Bulk transfers are good for sending lots of data with whatever bandwidth is available. This is what is used to read and write data to USB mass storage devices.
-
Interrupt transfers offer guaranteed latency (by reserving bandwidth so that they can’t be blocked by a large bulk transfers) but with limited packet sizes. These are used for signaling and for small packets like mouse movements and button presses.
-
Isochronous transfers also reserve bandwidth but they don’t guarantee delivery. They’re used for streaming data like audio and video.
-
Every device also has a special default endpoint. While regular endpoints only carry data in one direction or the other control transfers have a small header called the SETUP packet that is always sent to the device and contains request parameters in addition to a larger data payload that can be either IN or OUT.