Skip to content

Mousr handshake

theficus edited this page Dec 27, 2021 · 6 revisions

Handshake as observed through Wireshark

  1. Send: ROBOT_POSE -> INITIALIZE_DEVICE (0x3003000000bedf8961000000001c00)
  2. Receive: FIRMWARE_VERSION (0x1c020101000400075e571701881300000c000000)
  3. Receive: NACK (0xff1c000103000000000000000300000000000000) (Used to get MBAPI version?)
  4. Receive: CRASH_LOG_STRING (0x604e6f206372617368206c6f672e000000000000) (No crash log.)
  5. Receive: CRASH_LOG_FINISH (0x5f00000000000000000000000000000000000000)
  6. Send: ROBOT_POSE -> SOUND_VOLUME (0x300000000000000000000000001300) (based on user preferences)
  7. Receive: ??? (0x5000000000000000000000000000000000000000)
  8. Receive: ??? (0x5300000000000000000000000000000000000000)
  9. Receive: INIT_DONE (0x1e00000000000000000000000000000000000000)
  10. Receive: ROBOT_POSE heading information (0x3059c1c9be41a32fc0aa2cb6bd00290000000000)
  11. Receive: BATTERY_VOLTAGE (622d000000001815000000000000000000000000)
  12. Send: ROBOT_POSE -> TAIL_CALIB_Signal (0x300000000000000000000000001900)
Clone this wiki locally