Greetings. I am going to patch pixma backend and add support for mf4410 scanner, Vendor: 0x04A9 ID: 0x2737
I hope there are no major protocol changes from mf8030 (id 0x2707) or, probably mf4010 (id 0x26b4). I have connected scanner to windows and acquired a dozen image samples at different resolutions and color depth. The USB traffic was snooped with http://www.usblyzer.com/ I am trying to reverse-engineer the protocol entrails and currently lack documentation. I sure this is common case while reversing protocols. Yet I see a lot of work done for other devices, e.g. mentioned above mf8030 or mf4010. Would you be so kind and hint out some documentation related to the process of reverse-engineering of these devices? V. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.alioth.debian.org/pipermail/sane-devel/attachments/20111130/9bfbcc3b/attachment.html>
