adamtheone / canDrive

Tools for hacking your car
https://www.youtube.com/playlist?list=PLNiFaO8hU1z0o_6DSxk-jcVAM3UCUR-pY
MIT License
545 stars 148 forks source link

Integration canDrive with OP-COM Interface #5

Open adamslodki opened 3 years ago

adamslodki commented 3 years ago

I'am use OP-COM interface to sniffing CAN buses in Opel Vectra C using SocketCAN project and opcom.py script, but yours software (canDrive) looks great. May be you would like to integrate your canDrive with OP-COM interface. opcom.py scripts allows software switching beetwen LOW, MEDIUM or HIGH CAN-BUS in Opel cars. More info

marcohald commented 2 years ago

I would be also interested in the Integration of the OPCOM Interface. But can also understand, if that is not considered as it needs much afford. @adamslodki Ho did you find out the IDs to Switch the CAN Speed of the OPCOM I tried to find it elsewhere than the Page you linked and got no results. So I assume you did that by yourself.

adamtheone commented 2 years ago

Hello. I only used the OPCOM dongle with the official OPCOM software to reverse engineer the packets. The dongle and the software were obviously fully compatible with all the 3 busses of my car, so I didn't need to do anything on that front, I was just listening to the packets. With that said, I'm not sure how to control the OPCOM interface. As you could see in the videos, I've always separated the busses by hardware: the arduino could talk to only 1 bus at a time, and my custom hardware included 3 different can drivers in order to communicate with all busses at the same time. Unfortunately, I don't have free capacity currently to integrate the OPCOM interface into this project, although it would be cool for sure!

zalexzperez commented 1 month ago

Hi Adam,

did you ever try getting all the DTCs from the OPCOM data base? It seems they're encrypted in files for each model/engine combination. There is a compilation of all the errors on the internet but they don't carry the last two characters in the error code to specifically pinpoint the actual error, like OPCOM does.