-- will make it inaccessible from Linux, so Wireshark cannot fetch the
-- descriptor by itself. However, it is sufficient if the VirtualBox
-- guest requests the descriptor once while Wireshark is capturing.
--- usb_product_dissectors:add(0x29616688, p_lwla) -- SysClk LWLA1016
--- usb_product_dissectors:add(0x29616689, p_lwla) -- SysClk LWLA1034
+-- usb_product_dissectors:add(0x29616688, p_lwla) -- Sysclk LWLA1016
+-- usb_product_dissectors:add(0x29616689, p_lwla) -- Sysclk LWLA1034
-- Addendum: Protocol registration based on product ID does not always
-- work as desired. Register the protocol on the interface class instead.
.TH SIGROK\-FWEXTRACT\-SYSCLK\-LWLA1016 1 "Oct 21, 2015"
.SH "NAME"
-sigrok\-fwextract\-sysclk\-lwla1016 \- Extract SysClk LWLA1016 firmware
+sigrok\-fwextract\-sysclk\-lwla1016 \- Extract Sysclk LWLA1016 firmware
.SH "SYNOPSIS"
.B sigrok\-fwextract\-sysclk\-lwla1016 LWLA1016-INST-DIR
.SH "DESCRIPTION"
-This tool extracts FPGA bitstreams from the vendor software for the SysClk
+This tool extracts FPGA bitstreams from the vendor software for the Sysclk
LWLA1016 USB logic analyzer. Install the original software (possibly within
a virtual machine) and locate the installation directory.
.PP
.TH SIGROK\-FWEXTRACT\-SYSCLK\-LWLA1034 1 "Oct 31, 2015"
.SH "NAME"
-sigrok\-fwextract\-sysclk\-lwla1034 \- Extract SysClk LWLA1034 firmware
+sigrok\-fwextract\-sysclk\-lwla1034 \- Extract Sysclk LWLA1034 firmware
.SH "SYNOPSIS"
.B sigrok\-fwextract\-sysclk\-lwla1034 SETUP-EXE
.SH "DESCRIPTION"
-This tool extracts FPGA bitstreams from the vendor software for the SysClk
+This tool extracts FPGA bitstreams from the vendor software for the Sysclk
LWLA1034 USB logic analyzer. Insert the CD-ROM that ships with the device,
and locate the Windows installer executable "lwla1034_EN_setup.exe".
.PP