Closed evilpete closed 4 years ago
Here is a list of decoders found, I'll generate a pull request for solve these:
Protocol | Name |
---|---|
21 | Calibeur-RF104 |
47 | Conrad-S3318P |
49 | Quhwa-Doorbell |
54 | Oregon-SL109H |
68 | Kerui-Security |
84 | Thermopro-TP11 |
108 | Hyundai-WS |
115 | Honeywell-ActivLink |
116 | Honeywell-ActivLink |
121 | Opus-XT300 |
137 | GT-TMBBQ05 |
149 | ERT-SCM |
151 | Visonic-Powercode |
** IKEA Sparsnäs
generates a json report with '-vvv' option, even though the behavior is unique, I am not considering it a bug
{"time" : "2020-07-25 16:28:37", "protocol" : 130, "msg" : "IKEA Sparsnäs", "num_rows" : 1, "codes" : ["{10}000"]}
Update: here is a simple test script to detect the problem (@zuckschwerdt : feel free to add rtl_433_test )
(edit rtl_433 path in test_zero.sh first)
test_zero.sh
script will generate test data file count_zero.txt
, run rtl_433 writing results to zero_out.json
, then sort/unique/print results
(requires jq command )
Files:
test_zero.sh
runs all commands for test, results to stdoutgen_zero.py
generates test data for file count_zero.txtcount_zero.txt
test data generated by gen_zero.pyzero_out.json
rtl_433 outputzero_out.stderr
rtl_433 stderrUpdate # 2 : added simular test with 0xff packet data :
Protocol | Name | 0x00 | 0xff |
---|---|---|---|
19 | Nexus-TH | X | |
21 | Calibeur-RF104 | X | X |
47 | Conrad-S3318P | X | |
49 | Quhwa-Doorbell | X | |
50 | Oregon-v1 | X | |
54 | Oregon-SL109H | X | |
68 | Kerui-Security | X | |
84 | Thermopro-TP11 | X | X |
87 | Generic-Motion | X | |
95 | Schrader-EG53MA4 | X | |
108 | Hyundai-WS | X | X |
114 | Maverick-ET73 | X | |
115 | Honeywell-ActivLink | X | X |
116 | Honeywell-ActivLink | X | X |
121 | Opus-XT300 | X | |
131 | Microchip-HCS200 | X | |
135 | Philips-AJ7010 | X | |
137 | GT-TMBBQ05 | X | |
149 | ERT-SCM | X | |
151 | Visonic-Powercode | X | |
152 | Eurochron-EFTH800 | X |
Test files:
test_0xff.sh
gen_0xff.py
count_0xff.txt
0xff_out.json
Fixed in Pull Request #1444
Thanks for fixing this. If this is not fully resolved, feel free to reopen and explain :).
I've noticed I was receiving a lot of of "hits" for the Oregon Scientific SL109H device across multiple frequencies, after taking a closer look it seems that any packet with a length of 38 bits and comprised of all zeros is reported as a valid packet ( the "checksum" is calculated by simple addition of 5 nibbles ).
Suggested fix: add a simple sanity check to reject packet with something like the following:
(What are the odds of having Id humidity and channel be all be zero?) If this is an acceptable work around I'll generate a pull request...
This can be easily reproduced with :
rtl_433 -R 54 -y "{38}0000000000"
orrtl_433 -R 54 -y "{38}ff000000000"
. (not all zeros)Actual Received Packet: