summaryrefslogtreecommitdiffstats
path: root/reversing_tools (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix errors identified by flake8.Diego Elio Pettenò2020-03-261-1/+2
|
* Check type annotations for tools with mypy, too.Diego Elio Pettenò2020-03-232-0/+0
| | | | This requires the released version of usbmon-tools.
* Make HID support a "session" class rather than a base class.Diego Elio Pettenò2020-03-221-5/+5
| | | | | | This in turn allows wrapping the FreeStyle access in its own session class, which the freestyle_hid_console can use without dirty tricks, and without triggering the now-abstract class.
* Now that Python 3.6 is the minimum supported version, use f-strings.Diego Elio Pettenò2020-03-141-2/+2
| | | | | | | | | | | The f-strings formatted strings are generally simpler to write, read and debug, with a few exceptions. Keep the logging strings lazy, keep the CSV-building with %-formatting, as it makes it more readable. In fsoptium, keep `'$%s\r\n'` as a %-format, to avoid making it `f'${command}\r\n'` that would make it easy to mistake for a Shell variable.
* format code with blackBen2020-03-082-51/+100
|
* Clean up the extraction script, and make it more user friendly.Diego Elio Pettenò2020-02-011-13/+37
| | | | | | | | | This includes changes to the flags, so that instead of an address prefix you need to provide a full device address, and instead of `--libre2`, there's a `--encrypted_protocol` flag. If the capture includes the descriptors, neither flags are needed because the script identifies them itself.
* extract_freestyle: add an option to not print keepalive messages.Diego Elio Pettenò2020-01-241-1/+16
| | | | These messages are not encrypted, but they can also be safely ignored.
* Avoid heuristics, and instead add an explicit --libre2 flag.Diego Elio Pettenò2020-01-241-12/+16
| | | | | This encodes some more details of which commands are encrypted and not, but makes decoding easier.
* Add a tool to extract a FreeStyle protocol chatter from an usbmon capture.Diego Elio Pettenò2020-01-241-0/+109
| | | | | | | | | | | The tool needs https://github.com/Flameeyes/usbmon-tools to work, and is derived off the extract-hid-chatter tool in that repository, so it's Apache-2 licensed (unlike the rest of the repository) and shares copyright with the usbmon-tools authors. While this does not work correctly for Libre2 traces, it does appear to work fine with Libre1 systems with text protocol exchanges, and it provides a starting point.
* Fix the freestyle_hid_console to use Python 3.5 compatible formatting.Diego Elio Pettenò2019-09-271-2/+2
|
* Add the list of known FreeStyle commands to the tools directory.Diego Elio Pettenò2019-09-151-0/+48
| | | | This can be used to help testing new FreeStyle devices, like the Libre2.
* freestyle_hid_console: allow feeding a list of known commands.Diego Elio Pettenò2019-09-081-1/+7
| | | | This makes it easier to identify the expected command range of a FreeStyle device.
* Add a simple-ish script to use access a FreeStyle HID-compatible commands.Diego Elio Pettenò2019-09-081-0/+46
This makes it possible to send and receive text-command protocols to a FreeStyle HID device without actually writing any code, to identify possible valid commands.