dump_pklg.py 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
  1. #!/usr/bin/env python3
  2. # BlueKitchen GmbH (c) 2014
  3. # primitive dump for PacketLogger format
  4. # APPLE PacketLogger
  5. # typedef struct {
  6. # uint32_t len;
  7. # uint32_t ts_sec;
  8. # uint32_t ts_usec;
  9. # uint8_t type; // 0xfc for note
  10. # }
  11. import sys
  12. import datetime
  13. packet_types = [ "CMD =>", "EVT <=", "ACL =>", "ACL <="]
  14. def read_net_32(f):
  15. a = f.read(1)
  16. if a == '':
  17. return -1
  18. b = f.read(1)
  19. if b == '':
  20. return -1
  21. c = f.read(1)
  22. if c == '':
  23. return -1
  24. d = f.read(1)
  25. if d == '':
  26. return -1
  27. return ord(a) << 24 | ord(b) << 16 | ord(c) << 8 | ord(d)
  28. def as_hex(data):
  29. str_list = []
  30. for byte in data:
  31. str_list.append("{0:02x} ".format(byte))
  32. return ''.join(str_list)
  33. if len(sys.argv) == 1:
  34. print ('Dump PacketLogger file')
  35. print ('Copyright 2014, BlueKitchen GmbH')
  36. print ('')
  37. print ('Usage: ', sys.argv[0], 'hci_dump.pklg')
  38. exit(0)
  39. infile = sys.argv[1]
  40. with open (infile, 'rb') as fin:
  41. pos = 0
  42. try:
  43. while True:
  44. len = read_net_32(fin)
  45. if len < 0:
  46. break
  47. ts_sec = read_net_32(fin)
  48. ts_usec = read_net_32(fin)
  49. type = ord(fin.read(1))
  50. packet_len = len - 9;
  51. if (packet_len > 66000):
  52. print ("Error parsing pklg at offset %u (%x)." % (pos, pos))
  53. break
  54. packet = fin.read(packet_len)
  55. pos = pos + 4 + len
  56. time = "[%s.%03u]" % (datetime.datetime.fromtimestamp(ts_sec).strftime("%Y-%m-%d %H:%M:%S"), ts_usec / 1000)
  57. if type == 0xfc:
  58. print (time, "LOG", packet.decode('ascii'))
  59. continue
  60. if type <= 0x03:
  61. print (time, packet_types[type], as_hex(packet))
  62. except TypeError:
  63. print ("Error parsing pklg at offset %u (%x)." % (pos, pos))