4 KiB
QMK Firmware XAP Specs
This document describes the requirements of the QMK XAP ("extensible application protocol") API.
Types
All integral types are little-endian.
Name | Definition |
---|---|
type[n] | An array of type , with array extent of N -- e.g. u8[2] signifies two consecutive octets. |
u16 | An unsigned 16-bit integral, commonly seen as uint16_t from stdint.h. |
u32 | An unsigned 32-bit integral, commonly seen as uint32_t from stdint.h. |
u8 | An unsigned 8-bit integral (octet, or byte), commonly seen as uint8_t from stdint.h. |
Definitions
This list defines the terms used across the entire set of XAP protocol documentation.
Name | Definition |
---|---|
Handler | A piece of code that is executed when a specific route is received. |
Payload | Any received data appended to the route, which gets delivered to the handler when received. |
Response | The data sent back to the host during execution of a handler. |
Route | A sequence of IDs describing the route to invoke a handler. |
Subsystem | A high-level area of functionality within XAP. |
ID | A single octet / 8-bit byte, representing Subsystem or Route index. |
Request Header | Packet format for inbound data. Takes the format:token - tokenu8 - length |
Response Flags | An u8 containing the status of the request. |
Response Header | Packet format for outbound data. Takes the format:token - tokenresponse_flags - flagsu8 - length |
Token | A u16 associated with a specific request as well as its corresponding response. |
Requests and Responses
Communication generally follows a request/response pattern.
Each request needs to include a token -- this u16
value prefixes each outbound request from the host application and its corresponding response, allowing response messages to be correlated with their request, even if multiple host applications are communicating with the firmware simultaneously. Host applications should randomly generate a token ID for every outbound request, unless using a reserved token defined below.
This token is followed by a u8
signifying the length of data in the request.
Response messages will always be prefixed by the originating request token, directly followed by that request's response flags, then the response payload length:
Bit 7 | Bit 6 | Bit 5 | Bit 4 | Bit 3 | Bit 2 | Bit 1 | Bit 0 |
---|---|---|---|---|---|---|---|
- |
- |
- |
- |
- |
- |
- |
SUCCESS |
- Bit 0 (
SUCCESS
): When this bit is set, the request was successfully handled. If not set, all payload data should be disregarded, and the request retried if appropriate (with a new token).
Example "conversation":
Request -- version query:
Byte | 0 | 1 | 2 | 3 | 4 |
---|---|---|---|---|---|
Purpose | Token | Token | Payload Length | Route | Route |
Value | 0x43 |
0x2B |
0x02 |
0x00 |
0x00 |
Response -- matching token, successful flag, payload of 0x03170192
= 3.17.192:
Byte | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
---|---|---|---|---|---|---|---|---|
Purpose | Token | Token | Response Flags | Payload Length | Payload | Payload | Payload | Payload |
Value | 0x43 |
0x2B |
0x01 |
0x04 |
0x92 |
0x01 |
0x17 |
0x03 |
Routes
Subsystem validity should be queried through the “Enabled-in-firmware subsystem query” under the QMK subsystem (route=0x00,0x01). This is the primary method for determining if a subsystem has been enabled in the running firmware.
XAP - 0x00
This subsystem is always present, and provides the ability to query information about the XAP protocol of the connected device.
Name | Route | Tags | Payloads | Description |
---|---|---|---|---|
Version Query | 0x00 0x00 |
Response: u32 |
XAP protocol version query. * Returns the BCD-encoded version in the format of XX.YY.ZZZZ => 0xXXYYZZZZ * e.g. 3.2.115 will match 0x03020115 , or bytes {0x15,0x01,0x02,0x03}. |