Hello List, I'm trying to reverse engineer a usb protocol. I'm interested in how usb devices work in general. Is the communication always passive or can devices actively request data or perform some sort of authentification with the driver? I see patterns in the protocol as well, is it possible that some devices require a "keep alive" signal? I've also tried performing what seem to be requests in the snoopy logs, but got inconsistent replies. Is usb communication in general request/response or should i consider the device as a finite state automaton, where a particular sequence of commands puts the device into a certain state (possibly writing desired data to an endpoint)? At the moment i have a few hundred pages of logs and before I get lost in the details I thought I could ask for some advice. Does anyone have any experience in reverse engineering usb protocols and can give me some pointers? I could also put the logs online if someone's interested in taking a look. The device is a Logitech IO2 digital pen.
Any help is much appreciated, Rade ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier. Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Linux-usb-users@lists.sourceforge.net To unsubscribe, use the last form field at: https://lists.sourceforge.net/lists/listinfo/linux-usb-users