aboutsummaryrefslogtreecommitdiff
path: root/decode/wmc.py
AgeCommit message (Collapse)Author
2012-01-23decode: update WMC for DEVICE_INFO changesDan Williams
2012-01-23decode: fix WMC decoder for PC5740 dumpsDan Williams
2012-01-21decode: fix some formattingDan Williams
2012-01-21decode: update for WMC timestampsDan Williams
2012-01-21decode: updates all aroundDan Williams
Rewrite packet handling so packets can span multiple USB URBs (which sometimes happens with WMC) and also add a bunch more WMC decoding stuff.
2012-01-20decode: decode more WMC commands and fix some command namesDan Williams
2012-01-13decode: don't try interpreting non-WMC data as WMCDan Williams
2011-12-30decode: add some python tools to decode SniffUSB dumpsDan Williams
decode.py will read SniffUSB logs of communication with QMUX or WMC speaking devices. It will dump the packets in both hex and ASCII. If you know something about the device then you can tell it to decode the packets. For example, we know the Pantech UML290's WMC port speaks WMC using Bulk Transfers, so we can: decode.py --transfer=wmc <path to sniffusb logs> or we know the UML290's "rmnet" port speaks raw IP in the Bulk Transfers and QMUX in the Control Transfers, so: decode.py --control=qmux <path to sniffusb logs> qmiprotgen.py takes a path to an Entities.txt file and dumps out the protocol entities and services in Python code which is used by qmux.py. xml2ascii.py and analyze.py dump out UsbSnoopy XML logs but these are not as usable as the SniffUSB logs (they do not provide good direction information). http://www.wingmanteam.com/usbsnoopy/ http://www.pcausa.com/Utilities/UsbSnoop/