mirror of https://github.com/arendst/Tasmota.git
Added information on how to use learned commands and added Information about the interactive B1 to B0 tool
parent
c121f5bb80
commit
731f2c30f1
|
@ -47,7 +47,38 @@ Once the hardware changes have been made or the Bridge is powered via a 3.3V pin
|
||||||
|
|
||||||
**IMPORTANT:** In the Module configuration GPIO4 and GPIO5 must be left as **00 None**
|
**IMPORTANT:** In the Module configuration GPIO4 and GPIO5 must be left as **00 None**
|
||||||
|
|
||||||
## B1 to B0 helping tool.
|
## Learning of Commands with custom Firmware
|
||||||
|
In order to learn Buttons from your remote, go to the Console of your RFBridge.
|
||||||
|
There, enter rfraw 177 and push the buttons on your remote. Repeat each button 2-3 times, as the signal may be different for each try.
|
||||||
|
This will give you a so called B1 code of your button, which needs to be converted to a B0 code (see below).
|
||||||
|
|
||||||
|
## Sending of Commands with custom Firmware
|
||||||
|
The commands learned with the hacked (Portisch-)Firmware **cannot ** be stored in the webinterface. Instead, they must be sent via MQTT:
|
||||||
|
`mqtt=">[broker:cmnd/sonoff-8E8329/Backlog:command:ON:RfRaw AAB0210314016703F924180101011001100110010101100110011001010110010101100255; RfRaw 0],`
|
||||||
|
Refer to [this](https://github.com/arendst/Sonoff-Tasmota/issues/3973) issue for further information
|
||||||
|
|
||||||
|
|
||||||
|
## Interactive B1 to B0 tool
|
||||||
|
Here ([link](https://github.com/henfri/bitbuckedconverter/blob/master/BitBucketConverter)) an interactive tool was developed to learn Commands/Codes.
|
||||||
|
Process:
|
||||||
|
-Run rfraw 177 in your SonOff console -Push all your remote (each Button 2-3 times)
|
||||||
|
-Save everything from the console that happened after rfraw 177 to a file, e.g. console.txt
|
||||||
|
|
||||||
|
a) Run bitbuckedconverter.py -f console.txt
|
||||||
|
b) Run bitbuckedconverter.py -f console.txt -e
|
||||||
|
|
||||||
|
In case of a) each line of console.txt will be converted into a B0 string and displayed
|
||||||
|
In case of b) each line of console.txt will be converted into a B0 string and send to the Bridge.
|
||||||
|
Then:
|
||||||
|
* if the device reacted as expeced, you can enter a name of the button (e.g. "light")
|
||||||
|
* else enter nothing to try the next
|
||||||
|
* repeat this until all lines have been tried
|
||||||
|
* The tool will create a list of buttons -and their B0 codes- that have worked (i.e. for which you have specified a name)
|
||||||
|
* In the end you can test all of these codes
|
||||||
|
|
||||||
|
|
||||||
|
## B1 to B0 helping tool
|
||||||
|
(if you prefer the non interactive version)
|
||||||
After learning how bit bucket works from here [#23](https://github.com/Portisch/RF-Bridge-EFM8BB1/issues/23) this is a python script to help calculate the right 'B0' message to send using 'RfRaw' command in Tasmota from the received 'B1' sniffing message (rename file from 'BitBucketConverter.txt' to 'BitBucketConverter.py'.
|
After learning how bit bucket works from here [#23](https://github.com/Portisch/RF-Bridge-EFM8BB1/issues/23) this is a python script to help calculate the right 'B0' message to send using 'RfRaw' command in Tasmota from the received 'B1' sniffing message (rename file from 'BitBucketConverter.txt' to 'BitBucketConverter.py'.
|
||||||
|
|
||||||
[Python Script](https://github.com/Portisch/RF-Bridge-EFM8BB1/files/2374903/BitBucketConverter.txt)
|
[Python Script](https://github.com/Portisch/RF-Bridge-EFM8BB1/files/2374903/BitBucketConverter.txt)
|
||||||
|
|
Loading…
Reference in New Issue