Yep. Considering what I am doing raw CAN access would be fine as most CAN projects out there offer filtering at the cable level anyway, none of them offer variable voltage injection onto pins though. For now J2534 is really the only method I can use.Tazzi wrote:Yep yep, that makes sense. The device must send tester present constantly on the network (or similar).. so two devices would freak each other out. That would be why the devs added that extra sniffing ability then.rolls wrote: Yep at the CAN level there is no defined behaviour, you can listen, write crap and do whatever you want. J2534 is a higher level wrapper over the top and it expects to be the only "tester" on the network. You can connect with flow control disabled (eg no 7E0 response) and CAN selected however J2534 then automatically filters all ISO15765 packets.
Guess theres perks of both systems.. J2534 is structured throughout making it easy(ish) to support other J2534 devices.. but at CAN level it gives raw access.
I also just implemented a "tester present" loop in my program that runs in another thread and made my J2534 library thread safe. Now if you enter security access and the user is prompted with a message it doesn't time out the security access if they take more than 1 second to press yes/no.
Should have something out tonight for people to play with. It now can read unpacked or packed binary files, eg a 1.4mb or 6mb BA bin with real offsets. It will also compare the file to the PCM you are downloading to to see if the VIN/strategy or PCM type doesn't match. I won't add in any editing capabilities though, all that stuff will be in the editor flashing program. This winforms program will just be for engineering type stuff like logging DMR, sniffing and flash read/write.