On Fri, 9 Feb 2007, Radomir Zugic wrote:
> Hello List,
>
> I'm trying to reverse engineer a usb protocol. I'm interested in how
> usb devices work in general. Is the communication always passive or
> can devices actively request data or perform some sort of
> authentification with the driver? I s
> Hello List,
>
> I'm trying to reverse engineer a usb protocol. I'm interested in how
> usb devices work in general. Is the communication always passive or
> can devices actively request data or perform some sort of
Not sure what you mean here.
USB devices usually just do exactly what the host te
Hello List,
I'm trying to reverse engineer a usb protocol. I'm interested in how
usb devices work in general. Is the communication always passive or
can devices actively request data or perform some sort of
authentification with the driver? I see patterns in the protocol as
well, is it possible th