aboutsummaryrefslogtreecommitdiff
path: root/decode/packet.py
AgeCommit message (Collapse)Author
2012-07-17decode: handle another UsbSnoop URB functionDan Williams
2012-06-25decode: handle FUNCTION_CLASS_INTERFACE requests like CONTROL_TRANSFERDan Williams
The Novatel USB551L uses these to send data to the device, but the data is QMUX.
2012-06-22decode: update with latest QMI enumsDan Williams
Since QC stopped distributing the database files, we can't easily decode the TLV names unless we start parsing the C headers.
2012-04-24decode: recognize another UsbSnoop packet typeDan Williams
2012-01-23decode: add another USB functionDan Williams
2012-01-21decode: parse URB timestamps tooDan Williams
2012-01-21decode: updates all aroundDan Williams
Rewrite packet handling so packets can span multiple USB URBs (which sometimes happens with WMC) and also add a bunch more WMC decoding stuff.
2012-01-20decode: add another ignored packet typeDan Williams
2011-12-30decode: add some python tools to decode SniffUSB dumpsDan Williams
decode.py will read SniffUSB logs of communication with QMUX or WMC speaking devices. It will dump the packets in both hex and ASCII. If you know something about the device then you can tell it to decode the packets. For example, we know the Pantech UML290's WMC port speaks WMC using Bulk Transfers, so we can: decode.py --transfer=wmc <path to sniffusb logs> or we know the UML290's "rmnet" port speaks raw IP in the Bulk Transfers and QMUX in the Control Transfers, so: decode.py --control=qmux <path to sniffusb logs> qmiprotgen.py takes a path to an Entities.txt file and dumps out the protocol entities and services in Python code which is used by qmux.py. xml2ascii.py and analyze.py dump out UsbSnoopy XML logs but these are not as usable as the SniffUSB logs (they do not provide good direction information). http://www.wingmanteam.com/usbsnoopy/ http://www.pcausa.com/Utilities/UsbSnoop/