| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
This includes changes to the flags, so that instead of an address prefix
you need to provide a full device address, and instead of `--libre2`,
there's a `--encrypted_protocol` flag.
If the capture includes the descriptors, neither flags are needed because
the script identifies them itself.
|
|
|
|
| |
These messages are not encrypted, but they can also be safely ignored.
|
|
|
|
|
| |
This encodes some more details of which commands are encrypted and not, but
makes decoding easier.
|
|
|
|
|
|
|
|
|
|
|
| |
The tool needs https://github.com/Flameeyes/usbmon-tools to work, and is
derived off the extract-hid-chatter tool in that repository, so it's
Apache-2 licensed (unlike the rest of the repository) and shares copyright
with the usbmon-tools authors.
While this does not work correctly for Libre2 traces, it does appear to
work fine with Libre1 systems with text protocol exchanges, and it provides
a starting point.
|
| |
|
|
|
|
| |
This can be used to help testing new FreeStyle devices, like the Libre2.
|
|
|
|
| |
This makes it easier to identify the expected command range of a FreeStyle device.
|
|
This makes it possible to send and receive text-command protocols to a FreeStyle HID device without actually writing any code, to identify possible valid commands.
|