aboutsummaryrefslogtreecommitdiff
path: root/decode
AgeCommit message (Collapse)Author
2012-07-17decode: handle another UsbSnoop URB functionDan Williams
2012-06-25decode: handle FUNCTION_CLASS_INTERFACE requests like CONTROL_TRANSFERDan Williams
The Novatel USB551L uses these to send data to the device, but the data is QMUX.
2012-06-22decode: update with latest QMI enumsDan Williams
Since QC stopped distributing the database files, we can't easily decode the TLV names unless we start parsing the C headers.
2012-04-24decode: recognize another UsbSnoop packet typeDan Williams
2012-01-23decode: update WMC for DEVICE_INFO changesDan Williams
2012-01-23decode: fix WMC decoder for PC5740 dumpsDan Williams
2012-01-23decode: add another USB functionDan Williams
2012-01-21decode: fix some formattingDan Williams
2012-01-21decode: update for WMC timestampsDan Williams
2012-01-21decode: parse URB timestamps tooDan Williams
2012-01-21decode: updates all aroundDan Williams
Rewrite packet handling so packets can span multiple USB URBs (which sometimes happens with WMC) and also add a bunch more WMC decoding stuff.
2012-01-20decode: decode more WMC commands and fix some command namesDan Williams
2012-01-20decode: add another ignored packet typeDan Williams
2012-01-19decode: fix tab/space confusion in analyze.pyDan Williams
2012-01-13decode: don't try interpreting non-WMC data as WMCDan Williams
2011-12-30decode: add some python tools to decode SniffUSB dumpsDan Williams
decode.py will read SniffUSB logs of communication with QMUX or WMC speaking devices. It will dump the packets in both hex and ASCII. If you know something about the device then you can tell it to decode the packets. For example, we know the Pantech UML290's WMC port speaks WMC using Bulk Transfers, so we can: decode.py --transfer=wmc <path to sniffusb logs> or we know the UML290's "rmnet" port speaks raw IP in the Bulk Transfers and QMUX in the Control Transfers, so: decode.py --control=qmux <path to sniffusb logs> qmiprotgen.py takes a path to an Entities.txt file and dumps out the protocol entities and services in Python code which is used by qmux.py. xml2ascii.py and analyze.py dump out UsbSnoopy XML logs but these are not as usable as the SniffUSB logs (they do not provide good direction information). http://www.wingmanteam.com/usbsnoopy/ http://www.pcausa.com/Utilities/UsbSnoop/