Wireless Carplay Dongle Reverse Engineering

CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering
Alternatives To Wireless Carplay Dongle Reverse Engineering
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Opendrop7,41911a year ago10April 29, 202132gpl-3.0Python
An open Apple AirDrop implementation written in Python
360controller6,492
a year ago270gpl-2.0C++
TattieBogle Xbox 360 Driver (with improvements)
Owl1,012
6 months ago34gpl-3.0C
An open Apple Wireless Direct Link (AWDL) implementation written in C
Wireless Carplay Dongle Reverse Engineering526
3 months ago9gpl-3.0Shell
CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering
Bthidhub256
14 days ago30mitPython
Bluetooth HID hub
Applewirelesskeyboard223
2 years ago28gpl-3.0C#
Windows companion application for the Apple Wireless Keyboard which makes Fn and Eject keys work
Applewirelesskeyboard65
7 years ago1C#
Based on the original AppleWirelessKeyboard helper utility (http://uxsoft.cz/projects/applewirelesskeyboard/), this includes some small changes that allow it to be better used with an Apple wired keyboard.
What S New In Macos Catalina61
4 years ago1
Wireshark Awdl39
5 years agoother
Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of Wireshark 3.0!
Apple Keyboard Bridge14
4 years ago1bsd-2-clauseC++
Apple Wireless Keyboard key mapping tool for Windows
Alternatives To Wireless Carplay Dongle Reverse Engineering
Select To Compare


Alternative Project Comparisons
Readme

Carlinkit V2

Carlinkit / Carplay2Air Reverse Engineering

Hardware

Hardware Part
Flash Macronix 25L12835F (16MB)
SoC Freescale i.MX6 UltraLite
CPU ARM Cortex-A7 (ARMv7)
RAM Micron/SK hynix 1Gb (64x16)
Wi-Fi/BT Realtek RTL8822BS

Software

2021.03.09.0001 on CPLAY2Air:

$ cat /proc/cmdline
console=ttyLogFile0 root=/dev/mtdblock2 rootfstype=jffs2 mtdparts=21e0000.qspi:256k(uboot),3328K(kernel),12800K(rootfs) rootwait quiet rw

$ cat /proc/mtd
dev:    size   erasesize  name
mtd0: 00040000 00010000 "uboot"
mtd1: 00340000 00010000 "kernel"
mtd2: 00c80000 00010000 "rootfs"

$ df -T
Filesystem           Type       1K-blocks      Used Available Use% Mounted on
/dev/root            jffs2          12800     10940      1860  85% /
devtmpfs             devtmpfs       61632         0     61632   0% /dev
tmpfs                tmpfs          61732      6324     55408  10% /tmp
/dev/sda1            vfat        62498880     42304  62456576   0% /mnt/UPAN

u-boot compilation

apt-get install device-tree-compiler gcc-arm-linux-gnueabihf
export ARCH=arm
export CROSS_COMPILE=arm-linux-gnueabihf-
git clone https://github.com/ARM-software/u-boot.git
make mx6ull_14x14_evk_defconfig
make all

The device can be seen as "SP Blank 6ULL" when powered by USB-OTG but it is not possible to flash a custom u-boot using imx_usb because it is signed

Popular Apple Projects
Popular Wireless Projects
Popular Companies Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Shell
Usb
Apple
Wireless
Reverse Engineering