Comment 32 for bug 1372609

I am in the process of reverse engineering the protocol. I have executed the Windows 8.1 driver in a VM and have written a short program which puts the touchpad into the proprietary mode. The code can be found here:

https://github.com/mgottschlag/focaltech-tools

If anybody wants to join me, before a proper driver can be written, the next step is to decipher the report packet stream - so if anybody wants to run the program on their machine and try to find out some information about the packet format, go ahead. I am going to collect my findings in the github wiki at the link above.

Example output (from a single finger moving to the left):

reset, device id = 00
status: 69 80 80
status: 36 53 03
status: 00 13 0d
status: 0b 03 00
status: 23 bd f8
(the interesting part starts here)
packet: 03 01 00 00 00 00
packet: 06 17 ce 03 b8 10
packet: 06 17 ce 03 b8 10
packet: 06 17 ce 03 b8 10
packet: 06 17 cc 03 b8 20
[...]
packet: 06 15 a4 03 d4 20
packet: 06 15 9a 03 d4 20
packet: 06 15 8d 03 d4 10
packet: 06 15 76 03 d2 10
packet: 03 00 00 00 00 00