summaryrefslogtreecommitdiffstats
path: root/reversing_tools/abbott/extract_freestyle.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-02-01Clean up the extraction script, and make it more user friendly.Diego Elio Pettenò1-13/+37
This includes changes to the flags, so that instead of an address prefix you need to provide a full device address, and instead of `--libre2`, there's a `--encrypted_protocol` flag. If the capture includes the descriptors, neither flags are needed because the script identifies them itself.
2020-01-24extract_freestyle: add an option to not print keepalive messages.Diego Elio Pettenò1-1/+16
These messages are not encrypted, but they can also be safely ignored.
2020-01-24Avoid heuristics, and instead add an explicit --libre2 flag.Diego Elio Pettenò1-12/+16
This encodes some more details of which commands are encrypted and not, but makes decoding easier.
2020-01-24Add a tool to extract a FreeStyle protocol chatter from an usbmon capture.Diego Elio Pettenò1-0/+109
The tool needs https://github.com/Flameeyes/usbmon-tools to work, and is derived off the extract-hid-chatter tool in that repository, so it's Apache-2 licensed (unlike the rest of the repository) and shares copyright with the usbmon-tools authors. While this does not work correctly for Libre2 traces, it does appear to work fine with Libre1 systems with text protocol exchanges, and it provides a starting point.