Commit Graph

16 Commits

Author SHA1 Message Date
Dan Williams
f08c76f00c decode: handle another UsbSnoop URB function 2012-07-17 16:04:31 -05:00
Dan Williams
061b4d202c decode: handle FUNCTION_CLASS_INTERFACE requests like CONTROL_TRANSFER
The Novatel USB551L uses these to send data to the device, but the data
is QMUX.
2012-06-25 12:48:47 -05:00
Dan Williams
16d85f7b33 decode: update with latest QMI enums
Since QC stopped distributing the database files, we can't easily
decode the TLV names unless we start parsing the C headers.
2012-06-22 12:18:38 -05:00
Dan Williams
0f324de94f decode: recognize another UsbSnoop packet type 2012-04-24 13:34:16 -05:00
Dan Williams
7d6d3fd47e decode: update WMC for DEVICE_INFO changes 2012-01-23 18:54:28 -06:00
Dan Williams
704489d660 decode: fix WMC decoder for PC5740 dumps 2012-01-23 18:54:28 -06:00
Dan Williams
1e6da54b45 decode: add another USB function 2012-01-23 18:53:34 -06:00
Dan Williams
4c5ef98525 decode: fix some formatting 2012-01-21 15:12:34 -06:00
Dan Williams
365666da01 decode: update for WMC timestamps 2012-01-21 15:10:59 -06:00
Dan Williams
2838456e7a decode: parse URB timestamps too 2012-01-21 13:26:08 -06:00
Dan Williams
c37fdf5f94 decode: updates all around
Rewrite packet handling so packets can span multiple USB URBs
(which sometimes happens with WMC) and also add a bunch more
WMC decoding stuff.
2012-01-21 12:55:16 -06:00
Dan Williams
d068cde819 decode: decode more WMC commands and fix some command names 2012-01-20 17:20:37 -06:00
Dan Williams
21052004dd decode: add another ignored packet type 2012-01-20 16:54:59 -06:00
Dan Williams
4e7fb72d2d decode: fix tab/space confusion in analyze.py 2012-01-19 11:55:12 -06:00
Dan Williams
b24561e99e decode: don't try interpreting non-WMC data as WMC 2012-01-13 14:56:04 -06:00
Dan Williams
c9d0dea5b0 decode: add some python tools to decode SniffUSB dumps
decode.py will read SniffUSB logs of communication with
QMUX or WMC speaking devices.  It will dump the packets
in both hex and ASCII.  If you know something about the
device then you can tell it to decode the packets.  For
example, we know the Pantech UML290's WMC port speaks
WMC using Bulk Transfers, so we can:

decode.py --transfer=wmc <path to sniffusb logs>

or we know the UML290's "rmnet" port speaks raw IP in
the Bulk Transfers and QMUX in the Control Transfers, so:

decode.py --control=qmux <path to sniffusb logs>

qmiprotgen.py takes a path to an Entities.txt file and
dumps out the protocol entities and services in
Python code which is used by qmux.py.

xml2ascii.py and analyze.py dump out UsbSnoopy XML logs
but these are not as usable as the SniffUSB logs (they
do not provide good direction information).

http://www.wingmanteam.com/usbsnoopy/
http://www.pcausa.com/Utilities/UsbSnoop/
2011-12-30 20:42:51 -06:00