Updated Sonoff RF Bridge 433 (markdown)

Michael Ingraham 2019-02-28 09:03:54 -05:00
parent 8669fe47dd
commit bec8a69bb8
1 changed files with 11 additions and 18 deletions

@ -93,7 +93,7 @@ Refer to [this issue](https://github.com/arendst/Sonoff-Tasmota/issues/3973) for
An [interactive tool](https://github.com/henfri/bitbuckedconverter/blob/master/BitBucketConverter) was developed to learn Commands/Codes.
Process:
-Run rfraw 177 in your SonOff console -Push all your remote (each Button 2-3 times)
-Save everything from the console that happened after rfraw 177 to a file, e.g. console.txt
-Save everything from the console that happened after rfraw 177 to a file, e.g., console.txt
a) Run bitbuckedconverter.py -f console.txt
- Each line of console.txt will be converted into a B0 string and displayed
@ -102,7 +102,7 @@ b) Run bitbuckedconverter.py -f console.txt -e
- Each line of console.txt will be converted into a B0 string and sent to the Bridge
Then:
* If the device reacted as expected, you can enter a name of the button (e.g. "light")
* If the device reacted as expected, you can enter a name of the button (e.g., "light")
* Else enter nothing to try the next
* Repeat this until all lines have been tried
* The tool will create a list of buttons -and their B0 codes- that have worked (i.e., for which you have specified a name)
@ -126,22 +126,16 @@ Result: `RfRaw AAB01C041407EB015700FD3EBC01010101010110100101010110101010010355`
As suggested by the Portisch firmware, perform the following:
In the Tasmota console, send
***
22:58:44 CMD: **RfRaw AAB155**
***
I then received two consecutive messages.
22:58:44 CMD: **`RfRaw AAB155`**
The first one tells you that you are using one of the new firmware commands
***
`22:58:44 MQT: gvf/cega/bridge1/stat/RESULT = **{"RfRaw":"ON"}**`
***
The second one tells that the EFM8BB1 RF chip new firmware accepts the command and enters raw sniffing mode ('A0' means 'ACK')
***
`22:58:44 MQT: gvf/cega/bridge1/tele/RESULT = **{"RfRaw":{"Data":"AAA055"}}**`
***
This will result in two consecutive messages:
1. The first one tells you that you are using one of the new firmware commands
`22:58:44 MQT: gvf/cega/bridge1/stat/RESULT = {"RfRaw":"ON"}`
2. The second one tells that the EFM8BB1 RF chip new firmware accepts the command and enters raw sniffing mode ('A0' means 'ACK')
`22:58:44 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AAA055"}}`
After that keep pushing one of the buttons on the remote.
***
```
22:58:44 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AAA055"}}
22:58:49 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 04 07F0 0128 00F2 3822 010101010101101001010101101010100103 55"}}
@ -163,11 +157,10 @@ After that keep pushing one of the buttons on the remote.
22:58:57 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F8 0128 37C8 010101010101101001010101101010100102 55"}}
22:58:58 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F9 0124 37D2 010101010101101001010101101010100102 55"}}
22:58:58 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F4 0124 37C8 010101010101101001010101101010100102 55"}}
22:58:59 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F9 0124 37C8 01
0101010101101001010101101010100102 55"}}
22:58:59 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F9 0124 37C8 010101010101101001010101101010100102 55"}}
22:58:59 MQT: gvf/cega/bridge1/tele/RESULT = {"RfRaw":{"Data":"AA B1 03 07F4 0123 37D2 010101010101101001010101101010100102 55"}}
```
***
Notice that this sequence of messages all start with 'AA' then 'B1' and the last byte '55'
The reason for pushing the remote button for several seconds is to get enough 'AA B1 ...... 55' sequences to select the best one to be transmitted back.