UDP decode

Chris Angelico rosuav at gmail.com
Tue Oct 25 23:41:22 EDT 2016


On Wed, Oct 26, 2016 at 2:19 PM,  <julimadoz at gmail.com> wrote:
> b'/osceleton2/joint\x00\x00\x00,siiffffd\x00\x00\x00head\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05C\xec\xad&C\xa0\x81vDG\x84N?\x80\x00\x00Bu\x7f\xedh5f\x9b'
> --------------------------------------------------
>
>
> It supouse to be this:
> --------------------------------------------------
> Address pattern: "/osceleton2/joint"
> Type tag: "siiffffd"
> s: Joint name, check out the full list of joints below
> i: The ID of the sensor
> i: The ID of the user
> f: X coordinate of joint in real world coordinates (centimetres)
> f: Y coordinate of joint in real world coordinates (centimetres)
> f: Z coordinate of joint in real world coordinates (centimetres)
> f: confidence value in interval [0.0, 1.0]
> d: time stamp in milliseconds since Unix epoch
>
> example:
>
> /osceleton2/joint head 0 1 109.07692 54.557518 666.81543 1. 0.

Well, the first bit clearly matches. Then you have four bytes ending
with a comma (0x2C) and then siiffffd. A few more NULs and "head". So
really, the interesting part starts after that.

Can you find information you recognize in any of the bytes that follow that?

ChrisA



More information about the Python-list mailing list