2016-09-15 17:06:26 +02:00
|
|
|
#!/usr/bin/python
|
|
|
|
|
2019-05-27 20:57:32 +02:00
|
|
|
import codecs
|
2019-10-13 23:12:13 +02:00
|
|
|
import json
|
2019-05-27 20:57:32 +02:00
|
|
|
import random
|
|
|
|
import socket
|
2019-10-13 23:12:13 +02:00
|
|
|
import struct
|
2019-05-27 20:57:32 +02:00
|
|
|
import threading
|
|
|
|
import time
|
2016-09-15 17:06:26 +02:00
|
|
|
from datetime import datetime
|
2019-05-19 17:54:14 +02:00
|
|
|
|
2019-10-02 08:25:27 +02:00
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
|
2017-04-22 21:34:37 +02:00
|
|
|
|
2020-05-07 07:59:21 +02:00
|
|
|
from .exceptions import check_error, exception
|
2018-04-30 23:06:19 +02:00
|
|
|
|
2020-06-16 21:19:32 +02:00
|
|
|
|
2020-07-19 02:53:00 +02:00
|
|
|
def get_devices():
|
|
|
|
return {
|
2020-06-16 21:19:32 +02:00
|
|
|
0x0000: (sp1, "SP1", "Broadlink"),
|
|
|
|
|
|
|
|
0x2711: (sp2, "SP2", "Broadlink"),
|
|
|
|
0x2719: (sp2, "SP2-compatible", "Honeywell"),
|
|
|
|
0x271a: (sp2, "SP2-compatible", "Honeywell"),
|
|
|
|
0x2720: (sp2, "SP mini", "Broadlink"),
|
|
|
|
0x2728: (sp2, "SP2-compatible", "URANT"),
|
|
|
|
0x2733: (sp2, "SP3", "Broadlink"),
|
|
|
|
0x2736: (sp2, "SP mini+", "Broadlink"),
|
|
|
|
0x273e: (sp2, "SP mini", "Broadlink"),
|
|
|
|
0x7530: (sp2, "SP2", "Broadlink (OEM)"),
|
|
|
|
0x753e: (sp2, "SP mini 3", "Broadlink"),
|
|
|
|
0X7544: (sp2, "SP2-CL", "Broadlink"),
|
|
|
|
0x7546: (sp2, "SP2-UK/BR/IN", "Broadlink (OEM)"),
|
2020-07-31 07:09:46 +02:00
|
|
|
0x7547: (sp2, "SC1", "Broadlink"),
|
2020-06-16 21:19:32 +02:00
|
|
|
0x7918: (sp2, "SP2", "Broadlink (OEM)"),
|
|
|
|
0x7919: (sp2, "SP2-compatible", "Honeywell"),
|
|
|
|
0x791a: (sp2, "SP2-compatible", "Honeywell"),
|
|
|
|
0x7d00: (sp2, "SP3-EU", "Broadlink (OEM)"),
|
|
|
|
0x7d0d: (sp2, "SP mini 3", "Broadlink (OEM)"),
|
|
|
|
0x9479: (sp2, "SP3S-US", "Broadlink"),
|
|
|
|
0x947a: (sp2, "SP3S-EU", "Broadlink"),
|
|
|
|
|
|
|
|
0x2712: (rm, "RM pro/pro+", "Broadlink"),
|
|
|
|
0x272a: (rm, "RM pro", "Broadlink"),
|
|
|
|
0x2737: (rm, "RM mini 3", "Broadlink"),
|
|
|
|
0x273d: (rm, "RM pro", "Broadlink"),
|
|
|
|
0x277c: (rm, "RM home", "Broadlink"),
|
|
|
|
0x2783: (rm, "RM home", "Broadlink"),
|
|
|
|
0x2787: (rm, "RM pro", "Broadlink"),
|
|
|
|
0x278b: (rm, "RM plus", "Broadlink"),
|
|
|
|
0x278f: (rm, "RM mini", "Broadlink"),
|
|
|
|
0x2797: (rm, "RM pro+", "Broadlink"),
|
|
|
|
0x279d: (rm, "RM pro+", "Broadlink"),
|
|
|
|
0x27a1: (rm, "RM plus", "Broadlink"),
|
|
|
|
0x27a6: (rm, "RM plus", "Broadlink"),
|
|
|
|
0x27a9: (rm, "RM pro+", "Broadlink"),
|
|
|
|
0x27c2: (rm, "RM mini 3", "Broadlink"),
|
|
|
|
0x27d1: (rm, "RM mini 3", "Broadlink"),
|
|
|
|
0x27de: (rm, "RM mini 3", "Broadlink"),
|
|
|
|
|
|
|
|
0x51da: (rm4, "RM4 mini", "Broadlink"),
|
2020-06-17 04:15:23 +02:00
|
|
|
0x5f36: (rm4, "RM mini 3", "Broadlink"),
|
2020-06-16 21:19:32 +02:00
|
|
|
0x6026: (rm4, "RM4 pro", "Broadlink"),
|
|
|
|
0x6070: (rm4, "RM4C mini", "Broadlink"),
|
|
|
|
0x610e: (rm4, "RM4 mini", "Broadlink"),
|
|
|
|
0x610f: (rm4, "RM4C mini", "Broadlink"),
|
|
|
|
0x61a2: (rm4, "RM4 pro", "Broadlink"),
|
|
|
|
0x62bc: (rm4, "RM4 mini", "Broadlink"),
|
|
|
|
0x62be: (rm4, "RM4C mini", "Broadlink"),
|
|
|
|
|
|
|
|
0x2714: (a1, "e-Sensor", "Broadlink"),
|
|
|
|
|
|
|
|
0x4eb5: (mp1, "MP1-1K4S", "Broadlink"),
|
|
|
|
0x4ef7: (mp1, "MP1-1K4S", "Broadlink (OEM)"),
|
|
|
|
0x4f65: (mp1, "MP1-1K3S2U", "Broadlink"),
|
|
|
|
|
|
|
|
0x5043: (lb1, "SB800TD", "Broadlink (OEM)"),
|
|
|
|
0x504e: (lb1, "LB1", "Broadlink"),
|
|
|
|
0x60c7: (lb1, "LB1", "Broadlink"),
|
|
|
|
0x60c8: (lb1, "LB1", "Broadlink"),
|
|
|
|
0x6112: (lb1, "LB1", "Broadlink"),
|
|
|
|
|
|
|
|
0x2722: (S1C, "S2KIT", "Broadlink"),
|
|
|
|
|
|
|
|
0x4ead: (hysen, "HY02B05H", "Hysen"),
|
|
|
|
|
|
|
|
0x4e4d: (dooya, "DT360E-45/20", "Dooya"),
|
|
|
|
|
|
|
|
0x51e3: (bg1, "BG800/BG900", "BG Electrical"),
|
2019-05-19 17:54:14 +02:00
|
|
|
}
|
|
|
|
|
2020-07-19 02:53:00 +02:00
|
|
|
|
|
|
|
def gendevice(dev_type, host, mac, name=None, cloud=None):
|
|
|
|
"""Generate a device."""
|
2020-06-16 21:19:32 +02:00
|
|
|
try:
|
2020-07-19 02:53:00 +02:00
|
|
|
dev_class, model, manufacturer = get_devices()[dev_type]
|
|
|
|
|
2020-06-16 21:19:32 +02:00
|
|
|
except KeyError:
|
2020-07-19 02:53:00 +02:00
|
|
|
return device(host, mac, dev_type, name=name, cloud=cloud)
|
2020-06-16 21:19:32 +02:00
|
|
|
|
2020-07-19 02:53:00 +02:00
|
|
|
return dev_class(
|
|
|
|
host,
|
|
|
|
mac,
|
|
|
|
dev_type,
|
|
|
|
name=name,
|
|
|
|
model=model,
|
|
|
|
manufacturer=manufacturer,
|
|
|
|
cloud=cloud,
|
|
|
|
)
|
2019-05-19 17:54:14 +02:00
|
|
|
|
2016-11-19 23:22:08 +01:00
|
|
|
|
2020-03-04 22:25:00 +01:00
|
|
|
def discover(timeout=None, local_ip_address=None, discover_ip_address='255.255.255.255'):
|
2019-05-19 17:54:14 +02:00
|
|
|
if local_ip_address is None:
|
2020-06-08 12:20:44 +02:00
|
|
|
with socket.socket(socket.AF_INET, socket.SOCK_DGRAM) as s:
|
|
|
|
s.connect(('8.8.8.8', 53)) # connecting to a UDP address doesn't send packets
|
|
|
|
local_ip_address = s.getsockname()[0]
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
address = local_ip_address.split('.')
|
|
|
|
cs = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
|
|
cs.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
cs.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
|
|
|
|
cs.bind((local_ip_address, 0))
|
|
|
|
port = cs.getsockname()[1]
|
|
|
|
starttime = time.time()
|
2016-10-30 22:16:40 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
devices = []
|
2016-12-03 23:22:20 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
timezone = int(time.timezone / -3600)
|
|
|
|
packet = bytearray(0x30)
|
2018-03-18 23:03:26 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
year = datetime.now().year
|
2017-05-07 20:32:52 +02:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
if timezone < 0:
|
|
|
|
packet[0x08] = 0xff + timezone - 1
|
|
|
|
packet[0x09] = 0xff
|
|
|
|
packet[0x0a] = 0xff
|
|
|
|
packet[0x0b] = 0xff
|
|
|
|
else:
|
|
|
|
packet[0x08] = timezone
|
|
|
|
packet[0x09] = 0
|
|
|
|
packet[0x0a] = 0
|
|
|
|
packet[0x0b] = 0
|
|
|
|
packet[0x0c] = year & 0xff
|
|
|
|
packet[0x0d] = year >> 8
|
|
|
|
packet[0x0e] = datetime.now().minute
|
|
|
|
packet[0x0f] = datetime.now().hour
|
|
|
|
subyear = str(year)[2:]
|
|
|
|
packet[0x10] = int(subyear)
|
|
|
|
packet[0x11] = datetime.now().isoweekday()
|
|
|
|
packet[0x12] = datetime.now().day
|
|
|
|
packet[0x13] = datetime.now().month
|
|
|
|
packet[0x18] = int(address[0])
|
|
|
|
packet[0x19] = int(address[1])
|
|
|
|
packet[0x1a] = int(address[2])
|
|
|
|
packet[0x1b] = int(address[3])
|
|
|
|
packet[0x1c] = port & 0xff
|
|
|
|
packet[0x1d] = port >> 8
|
|
|
|
packet[0x26] = 6
|
2020-04-19 08:53:09 +02:00
|
|
|
|
|
|
|
checksum = 0xbeaf
|
|
|
|
for b in packet:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
2016-09-15 17:06:26 +02:00
|
|
|
|
|
|
|
packet[0x20] = checksum & 0xff
|
|
|
|
packet[0x21] = checksum >> 8
|
|
|
|
|
2020-03-04 22:25:00 +01:00
|
|
|
cs.sendto(packet, (discover_ip_address, 80))
|
2019-05-19 17:54:14 +02:00
|
|
|
if timeout is None:
|
|
|
|
response = cs.recvfrom(1024)
|
|
|
|
responsepacket = bytearray(response[0])
|
|
|
|
host = response[1]
|
|
|
|
devtype = responsepacket[0x34] | responsepacket[0x35] << 8
|
2020-06-08 12:22:27 +02:00
|
|
|
mac = responsepacket[0x3f:0x39:-1]
|
2020-03-24 16:09:31 +01:00
|
|
|
name = responsepacket[0x40:].split(b'\x00')[0].decode('utf-8')
|
|
|
|
cloud = bool(responsepacket[-1])
|
|
|
|
device = gendevice(devtype, host, mac, name=name, cloud=cloud)
|
2020-04-25 11:40:48 +02:00
|
|
|
cs.close()
|
2020-03-24 16:09:31 +01:00
|
|
|
return device
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
while (time.time() - starttime) < timeout:
|
|
|
|
cs.settimeout(timeout - (time.time() - starttime))
|
2016-12-22 09:51:38 +01:00
|
|
|
try:
|
2019-05-19 17:54:14 +02:00
|
|
|
response = cs.recvfrom(1024)
|
2016-12-22 09:51:38 +01:00
|
|
|
except socket.timeout:
|
2020-04-25 11:40:48 +02:00
|
|
|
cs.close()
|
2019-05-19 17:54:14 +02:00
|
|
|
return devices
|
|
|
|
responsepacket = bytearray(response[0])
|
|
|
|
host = response[1]
|
|
|
|
devtype = responsepacket[0x34] | responsepacket[0x35] << 8
|
2020-06-08 12:22:27 +02:00
|
|
|
mac = responsepacket[0x3f:0x39:-1]
|
2020-03-24 16:09:31 +01:00
|
|
|
name = responsepacket[0x40:].split(b'\x00')[0].decode('utf-8')
|
|
|
|
cloud = bool(responsepacket[-1])
|
|
|
|
device = gendevice(devtype, host, mac, name=name, cloud=cloud)
|
|
|
|
devices.append(device)
|
2020-04-25 11:40:48 +02:00
|
|
|
cs.close()
|
2019-05-19 17:54:14 +02:00
|
|
|
return devices
|
|
|
|
|
|
|
|
|
|
|
|
class device:
|
2020-07-19 02:53:00 +02:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
host,
|
|
|
|
mac,
|
|
|
|
devtype,
|
|
|
|
timeout=10,
|
|
|
|
name=None,
|
|
|
|
model=None,
|
|
|
|
manufacturer=None,
|
|
|
|
cloud=None
|
|
|
|
):
|
2019-05-19 17:54:14 +02:00
|
|
|
self.host = host
|
|
|
|
self.mac = mac.encode() if isinstance(mac, str) else mac
|
2020-03-16 09:49:41 +01:00
|
|
|
self.devtype = devtype if devtype is not None else 0x272a
|
2020-07-19 02:53:00 +02:00
|
|
|
self.timeout = timeout
|
2020-03-24 16:09:31 +01:00
|
|
|
self.name = name
|
2020-07-19 02:53:00 +02:00
|
|
|
self.model = model
|
|
|
|
self.manufacturer = manufacturer
|
2020-03-24 16:09:31 +01:00
|
|
|
self.cloud = cloud
|
2019-05-19 17:54:14 +02:00
|
|
|
self.count = random.randrange(0xffff)
|
|
|
|
self.iv = bytearray(
|
|
|
|
[0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58])
|
|
|
|
self.id = bytearray([0, 0, 0, 0])
|
|
|
|
self.type = "Unknown"
|
|
|
|
self.lock = threading.Lock()
|
|
|
|
|
2019-05-27 20:57:32 +02:00
|
|
|
self.aes = None
|
|
|
|
key = bytearray(
|
|
|
|
[0x09, 0x76, 0x28, 0x34, 0x3f, 0xe9, 0x9e, 0x23, 0x76, 0x5c, 0x15, 0x13, 0xac, 0xcf, 0x8b, 0x02])
|
|
|
|
self.update_aes(key)
|
|
|
|
|
2019-10-02 08:25:27 +02:00
|
|
|
def update_aes(self, key):
|
2019-05-27 20:57:32 +02:00
|
|
|
self.aes = Cipher(algorithms.AES(key), modes.CBC(self.iv),
|
|
|
|
backend=default_backend())
|
2019-05-19 17:54:14 +02:00
|
|
|
|
2019-10-02 08:25:27 +02:00
|
|
|
def encrypt(self, payload):
|
2019-05-27 20:57:32 +02:00
|
|
|
encryptor = self.aes.encryptor()
|
|
|
|
return encryptor.update(payload) + encryptor.finalize()
|
2019-05-19 17:54:14 +02:00
|
|
|
|
2019-10-02 08:25:27 +02:00
|
|
|
def decrypt(self, payload):
|
2019-05-27 20:57:32 +02:00
|
|
|
decryptor = self.aes.decryptor()
|
|
|
|
return decryptor.update(payload) + decryptor.finalize()
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def auth(self):
|
|
|
|
payload = bytearray(0x50)
|
|
|
|
payload[0x04] = 0x31
|
|
|
|
payload[0x05] = 0x31
|
|
|
|
payload[0x06] = 0x31
|
|
|
|
payload[0x07] = 0x31
|
|
|
|
payload[0x08] = 0x31
|
|
|
|
payload[0x09] = 0x31
|
|
|
|
payload[0x0a] = 0x31
|
|
|
|
payload[0x0b] = 0x31
|
|
|
|
payload[0x0c] = 0x31
|
|
|
|
payload[0x0d] = 0x31
|
|
|
|
payload[0x0e] = 0x31
|
|
|
|
payload[0x0f] = 0x31
|
|
|
|
payload[0x10] = 0x31
|
|
|
|
payload[0x11] = 0x31
|
|
|
|
payload[0x12] = 0x31
|
|
|
|
payload[0x1e] = 0x01
|
|
|
|
payload[0x2d] = 0x01
|
|
|
|
payload[0x30] = ord('T')
|
|
|
|
payload[0x31] = ord('e')
|
|
|
|
payload[0x32] = ord('s')
|
|
|
|
payload[0x33] = ord('t')
|
|
|
|
payload[0x34] = ord(' ')
|
|
|
|
payload[0x35] = ord(' ')
|
|
|
|
payload[0x36] = ord('1')
|
|
|
|
|
|
|
|
response = self.send_packet(0x65, payload)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2020-03-16 09:49:41 +01:00
|
|
|
payload = self.decrypt(response[0x38:])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
key = payload[0x04:0x14]
|
|
|
|
if len(key) % 16 != 0:
|
|
|
|
return False
|
|
|
|
|
2020-06-08 12:22:27 +02:00
|
|
|
self.id = payload[0x03::-1]
|
2019-05-27 20:57:32 +02:00
|
|
|
self.update_aes(key)
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
return True
|
|
|
|
|
2020-06-08 12:20:22 +02:00
|
|
|
def get_fwversion(self):
|
|
|
|
packet = bytearray([0x68])
|
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
|
|
|
payload = self.decrypt(response[0x38:])
|
|
|
|
return payload[0x4] | payload[0x5] << 8
|
|
|
|
|
2020-06-14 16:37:37 +02:00
|
|
|
def set_name(self, name):
|
2020-06-08 12:19:21 +02:00
|
|
|
packet = bytearray(4)
|
2020-06-16 23:19:18 +02:00
|
|
|
packet += name.encode('utf-8')
|
|
|
|
packet += bytearray(0x50 - len(packet))
|
|
|
|
packet[0x43] = self.cloud
|
2020-06-08 12:19:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2020-06-16 23:19:18 +02:00
|
|
|
self.name = name
|
|
|
|
|
|
|
|
def set_lock(self, state):
|
|
|
|
packet = bytearray(4)
|
|
|
|
packet += self.name.encode('utf-8')
|
|
|
|
packet += bytearray(0x50 - len(packet))
|
|
|
|
packet[0x43] = state
|
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
|
|
|
self.cloud = bool(state)
|
2020-06-08 12:19:21 +02:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
def get_type(self):
|
|
|
|
return self.type
|
|
|
|
|
|
|
|
def send_packet(self, command, payload):
|
|
|
|
self.count = (self.count + 1) & 0xffff
|
|
|
|
packet = bytearray(0x38)
|
|
|
|
packet[0x00] = 0x5a
|
|
|
|
packet[0x01] = 0xa5
|
|
|
|
packet[0x02] = 0xaa
|
|
|
|
packet[0x03] = 0x55
|
|
|
|
packet[0x04] = 0x5a
|
|
|
|
packet[0x05] = 0xa5
|
|
|
|
packet[0x06] = 0xaa
|
|
|
|
packet[0x07] = 0x55
|
2020-03-16 09:49:41 +01:00
|
|
|
packet[0x24] = self.devtype & 0xff
|
|
|
|
packet[0x25] = self.devtype >> 8
|
2019-05-19 17:54:14 +02:00
|
|
|
packet[0x26] = command
|
|
|
|
packet[0x28] = self.count & 0xff
|
|
|
|
packet[0x29] = self.count >> 8
|
2020-06-08 12:22:27 +02:00
|
|
|
packet[0x2a] = self.mac[5]
|
|
|
|
packet[0x2b] = self.mac[4]
|
|
|
|
packet[0x2c] = self.mac[3]
|
|
|
|
packet[0x2d] = self.mac[2]
|
|
|
|
packet[0x2e] = self.mac[1]
|
|
|
|
packet[0x2f] = self.mac[0]
|
|
|
|
packet[0x30] = self.id[3]
|
|
|
|
packet[0x31] = self.id[2]
|
|
|
|
packet[0x32] = self.id[1]
|
|
|
|
packet[0x33] = self.id[0]
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
# pad the payload for AES encryption
|
|
|
|
if payload:
|
2020-04-13 22:42:51 +02:00
|
|
|
payload += bytearray((16 - len(payload)) % 16)
|
2020-03-16 09:49:41 +01:00
|
|
|
|
2020-04-19 08:53:09 +02:00
|
|
|
checksum = 0xbeaf
|
|
|
|
for b in payload:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
packet[0x34] = checksum & 0xff
|
|
|
|
packet[0x35] = checksum >> 8
|
|
|
|
|
2020-03-04 22:24:09 +01:00
|
|
|
payload = self.encrypt(payload)
|
2019-05-19 17:54:14 +02:00
|
|
|
for i in range(len(payload)):
|
|
|
|
packet.append(payload[i])
|
|
|
|
|
2020-04-19 08:53:09 +02:00
|
|
|
checksum = 0xbeaf
|
|
|
|
for b in packet:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
packet[0x20] = checksum & 0xff
|
|
|
|
packet[0x21] = checksum >> 8
|
|
|
|
|
2019-05-27 20:57:32 +02:00
|
|
|
start_time = time.time()
|
2019-05-19 17:54:14 +02:00
|
|
|
with self.lock:
|
2020-04-25 11:40:48 +02:00
|
|
|
cs = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
|
|
cs.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
while True:
|
|
|
|
try:
|
2020-04-25 11:40:48 +02:00
|
|
|
cs.sendto(packet, self.host)
|
|
|
|
cs.settimeout(1)
|
|
|
|
response = cs.recvfrom(2048)
|
2019-05-19 17:54:14 +02:00
|
|
|
break
|
|
|
|
except socket.timeout:
|
2019-05-27 20:57:32 +02:00
|
|
|
if (time.time() - start_time) > self.timeout:
|
2020-05-07 15:53:55 +02:00
|
|
|
cs.close()
|
2020-05-07 07:59:21 +02:00
|
|
|
raise exception(0xfffd)
|
2020-05-07 15:53:55 +02:00
|
|
|
cs.close()
|
2019-05-19 17:54:14 +02:00
|
|
|
return bytearray(response[0])
|
2016-09-15 17:06:26 +02:00
|
|
|
|
2016-11-17 21:02:59 +01:00
|
|
|
|
2016-12-04 01:50:46 +01:00
|
|
|
class mp1(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "MP1"
|
|
|
|
|
|
|
|
def set_power_mask(self, sid_mask, state):
|
|
|
|
"""Sets the power state of the smart power strip."""
|
|
|
|
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0x00] = 0x0d
|
|
|
|
packet[0x02] = 0xa5
|
|
|
|
packet[0x03] = 0xa5
|
|
|
|
packet[0x04] = 0x5a
|
|
|
|
packet[0x05] = 0x5a
|
|
|
|
packet[0x06] = 0xb2 + ((sid_mask << 1) if state else sid_mask)
|
|
|
|
packet[0x07] = 0xc0
|
|
|
|
packet[0x08] = 0x02
|
|
|
|
packet[0x0a] = 0x03
|
|
|
|
packet[0x0d] = sid_mask
|
|
|
|
packet[0x0e] = sid_mask if state else 0
|
|
|
|
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def set_power(self, sid, state):
|
|
|
|
"""Sets the power state of the smart power strip."""
|
|
|
|
sid_mask = 0x01 << (sid - 1)
|
|
|
|
return self.set_power_mask(sid_mask, state)
|
|
|
|
|
|
|
|
def check_power_raw(self):
|
|
|
|
"""Returns the power state of the smart power strip in raw format."""
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0x00] = 0x0a
|
|
|
|
packet[0x02] = 0xa5
|
|
|
|
packet[0x03] = 0xa5
|
|
|
|
packet[0x04] = 0x5a
|
|
|
|
packet[0x05] = 0x5a
|
|
|
|
packet[0x06] = 0xae
|
|
|
|
packet[0x07] = 0xc0
|
|
|
|
packet[0x08] = 0x01
|
|
|
|
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
if isinstance(payload[0x4], int):
|
|
|
|
state = payload[0x0e]
|
|
|
|
else:
|
|
|
|
state = ord(payload[0x0e])
|
|
|
|
return state
|
|
|
|
|
|
|
|
def check_power(self):
|
|
|
|
"""Returns the power state of the smart power strip."""
|
|
|
|
state = self.check_power_raw()
|
2019-06-10 09:12:50 +02:00
|
|
|
if state is None:
|
|
|
|
return {'s1': None, 's2': None, 's3': None, 's4': None}
|
2019-05-19 17:54:14 +02:00
|
|
|
data = {}
|
|
|
|
data['s1'] = bool(state & 0x01)
|
|
|
|
data['s2'] = bool(state & 0x02)
|
|
|
|
data['s3'] = bool(state & 0x04)
|
|
|
|
data['s4'] = bool(state & 0x08)
|
|
|
|
return data
|
2016-12-04 01:50:46 +01:00
|
|
|
|
|
|
|
|
2019-10-13 23:12:13 +02:00
|
|
|
class bg1(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-10-13 23:12:13 +02:00
|
|
|
self.type = "BG1"
|
|
|
|
|
|
|
|
def get_state(self):
|
2019-10-16 10:58:02 +02:00
|
|
|
"""Get state of device.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
dict: Dictionary of current state
|
|
|
|
eg. `{"pwr":1,"pwr1":1,"pwr2":0,"maxworktime":60,"maxworktime1":60,"maxworktime2":0,"idcbrightness":50}`"""
|
2019-10-13 23:12:13 +02:00
|
|
|
packet = self._encode(1, b'{}')
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-10-13 23:12:13 +02:00
|
|
|
return self._decode(response)
|
|
|
|
|
|
|
|
def set_state(self, pwr=None, pwr1=None, pwr2=None, maxworktime=None, maxworktime1=None, maxworktime2=None, idcbrightness=None):
|
|
|
|
data = {}
|
|
|
|
if pwr is not None:
|
|
|
|
data['pwr'] = int(bool(pwr))
|
|
|
|
if pwr1 is not None:
|
|
|
|
data['pwr1'] = int(bool(pwr1))
|
|
|
|
if pwr2 is not None:
|
|
|
|
data['pwr2'] = int(bool(pwr2))
|
|
|
|
if maxworktime is not None:
|
|
|
|
data['maxworktime'] = maxworktime
|
|
|
|
if maxworktime1 is not None:
|
|
|
|
data['maxworktime1'] = maxworktime1
|
|
|
|
if maxworktime2 is not None:
|
|
|
|
data['maxworktime2'] = maxworktime2
|
|
|
|
if idcbrightness is not None:
|
|
|
|
data['idcbrightness'] = idcbrightness
|
|
|
|
js = json.dumps(data).encode('utf8')
|
|
|
|
packet = self._encode(2, js)
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-10-13 23:12:13 +02:00
|
|
|
return self._decode(response)
|
|
|
|
|
|
|
|
def _encode(self, flag, js):
|
|
|
|
# packet format is:
|
|
|
|
# 0x00-0x01 length
|
|
|
|
# 0x02-0x05 header
|
|
|
|
# 0x06-0x07 00
|
|
|
|
# 0x08 flag (1 for read or 2 write?)
|
|
|
|
# 0x09 unknown (0xb)
|
|
|
|
# 0x0a-0x0d length of json
|
|
|
|
# 0x0e- json data
|
|
|
|
packet = bytearray(14)
|
|
|
|
length = 4 + 2 + 2 + 4 + len(js)
|
|
|
|
struct.pack_into('<HHHHBBI', packet, 0, length, 0xa5a5, 0x5a5a, 0x0000, flag, 0x0b, len(js))
|
|
|
|
for i in range(len(js)):
|
|
|
|
packet.append(js[i])
|
|
|
|
|
2020-04-19 08:53:09 +02:00
|
|
|
checksum = 0xc0ad
|
|
|
|
for b in packet[0x08:]:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
|
|
|
|
2019-10-13 23:12:13 +02:00
|
|
|
packet[0x06] = checksum & 0xff
|
|
|
|
packet[0x07] = checksum >> 8
|
|
|
|
|
|
|
|
return packet
|
|
|
|
|
|
|
|
def _decode(self, response):
|
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
js_len = struct.unpack_from('<I', payload, 0x0a)[0]
|
|
|
|
state = json.loads(payload[0x0e:0x0e+js_len])
|
|
|
|
return state
|
|
|
|
|
2016-11-17 21:02:59 +01:00
|
|
|
class sp1(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "SP1"
|
2016-11-17 21:02:59 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
def set_power(self, state):
|
|
|
|
packet = bytearray(4)
|
|
|
|
packet[0] = state
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x66, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2016-11-17 21:02:59 +01:00
|
|
|
|
|
|
|
|
|
|
|
class sp2(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "SP2"
|
|
|
|
|
|
|
|
def set_power(self, state):
|
|
|
|
"""Sets the power state of the smart plug."""
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 2
|
|
|
|
if self.check_nightlight():
|
|
|
|
packet[4] = 3 if state else 2
|
2018-04-15 12:19:05 +02:00
|
|
|
else:
|
2019-05-19 17:54:14 +02:00
|
|
|
packet[4] = 1 if state else 0
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def set_nightlight(self, state):
|
|
|
|
"""Sets the night light state of the smart plug"""
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 2
|
|
|
|
if self.check_power():
|
|
|
|
packet[4] = 3 if state else 1
|
2018-04-15 12:19:05 +02:00
|
|
|
else:
|
2019-05-19 17:54:14 +02:00
|
|
|
packet[4] = 2 if state else 0
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def check_power(self):
|
|
|
|
"""Returns the power state of the smart plug."""
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 1
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
if isinstance(payload[0x4], int):
|
|
|
|
return bool(payload[0x4] == 1 or payload[0x4] == 3 or payload[0x4] == 0xFD)
|
|
|
|
return bool(ord(payload[0x4]) == 1 or ord(payload[0x4]) == 3 or ord(payload[0x4]) == 0xFD)
|
|
|
|
|
|
|
|
def check_nightlight(self):
|
|
|
|
"""Returns the power state of the smart plug."""
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 1
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
if isinstance(payload[0x4], int):
|
|
|
|
return bool(payload[0x4] == 2 or payload[0x4] == 3 or payload[0x4] == 0xFF)
|
|
|
|
return bool(ord(payload[0x4]) == 2 or ord(payload[0x4]) == 3 or ord(payload[0x4]) == 0xFF)
|
|
|
|
|
|
|
|
def get_energy(self):
|
|
|
|
packet = bytearray([8, 0, 254, 1, 5, 1, 0, 0, 0, 45])
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
if isinstance(payload[0x7], int):
|
|
|
|
energy = int(hex(payload[0x07] * 256 + payload[0x06])[2:]) + int(hex(payload[0x05])[2:]) / 100.0
|
2018-04-15 12:19:05 +02:00
|
|
|
else:
|
2019-05-19 17:54:14 +02:00
|
|
|
energy = int(hex(ord(payload[0x07]) * 256 + ord(payload[0x06]))[2:]) + int(
|
|
|
|
hex(ord(payload[0x05]))[2:]) / 100.0
|
|
|
|
return energy
|
2017-07-16 01:30:22 +02:00
|
|
|
|
|
|
|
|
2016-11-17 21:02:59 +01:00
|
|
|
class a1(device):
|
2020-06-08 12:21:23 +02:00
|
|
|
|
|
|
|
_SENSORS_AND_LEVELS = (
|
|
|
|
('light', ('dark', 'dim', 'normal', 'bright')),
|
|
|
|
('air_quality', ('excellent', 'good', 'normal', 'bad')),
|
|
|
|
('noise', ('quiet', 'normal', 'noisy')),
|
|
|
|
)
|
|
|
|
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "A1"
|
|
|
|
|
|
|
|
def check_sensors(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
data = self.check_sensors_raw()
|
|
|
|
for sensor, levels in self._SENSORS_AND_LEVELS:
|
|
|
|
try:
|
|
|
|
data[sensor] = levels[data[sensor]]
|
|
|
|
except IndexError:
|
|
|
|
data[sensor] = 'unknown'
|
2019-05-19 17:54:14 +02:00
|
|
|
return data
|
|
|
|
|
|
|
|
def check_sensors_raw(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
packet = bytearray([0x1])
|
2019-05-19 17:54:14 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2020-06-08 12:21:23 +02:00
|
|
|
data = bytearray(payload[0x4:])
|
|
|
|
return {
|
|
|
|
'temperature': data[0x0] + data[0x1] / 10.0,
|
|
|
|
'humidity': data[0x2] + data[0x3] / 10.0,
|
|
|
|
'light': data[0x4],
|
|
|
|
'air_quality': data[0x6],
|
|
|
|
'noise': data[0x8],
|
|
|
|
}
|
2016-12-04 01:41:10 +01:00
|
|
|
|
2016-11-17 21:02:59 +01:00
|
|
|
|
|
|
|
class rm(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "RM2"
|
2020-03-16 09:49:41 +01:00
|
|
|
self._request_header = bytes()
|
|
|
|
self._code_sending_header = bytes()
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def check_data(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x04)
|
2019-05-19 17:54:14 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2020-03-16 09:49:41 +01:00
|
|
|
return payload[len(self._request_header) + 4:]
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def send_data(self, data):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._code_sending_header)
|
2020-05-21 02:00:11 +02:00
|
|
|
packet += bytearray([0x02, 0x00, 0x00, 0x00])
|
2019-05-19 17:54:14 +02:00
|
|
|
packet += data
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def enter_learning(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x03)
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def sweep_frequency(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x19)
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def cancel_sweep_frequency(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x1e)
|
2020-05-07 07:59:21 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
def check_frequency(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x1a)
|
2019-05-19 17:54:14 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2020-03-16 09:49:41 +01:00
|
|
|
if payload[len(self._request_header) + 4] == 1:
|
2019-05-19 17:54:14 +02:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
def find_rf_packet(self):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
|
|
|
packet.append(0x1b)
|
2019-05-19 17:54:14 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2020-03-16 09:49:41 +01:00
|
|
|
if payload[len(self._request_header) + 4] == 1:
|
2019-05-19 17:54:14 +02:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2020-06-08 12:21:23 +02:00
|
|
|
def _check_sensors(self, command):
|
2020-03-16 09:49:41 +01:00
|
|
|
packet = bytearray(self._request_header)
|
2020-06-08 12:21:23 +02:00
|
|
|
packet.append(command)
|
2019-05-19 17:54:14 +02:00
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2020-06-08 12:21:23 +02:00
|
|
|
return bytearray(payload[len(self._request_header) + 4:])
|
2016-10-30 22:16:40 +01:00
|
|
|
|
2020-03-23 21:23:05 +01:00
|
|
|
def check_temperature(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
data = self._check_sensors(0x1)
|
|
|
|
return data[0x0] + data[0x1] / 10.0
|
|
|
|
|
|
|
|
def check_sensors(self):
|
|
|
|
data = self._check_sensors(0x1)
|
|
|
|
return {'temperature': data[0x0] + data[0x1] / 10.0}
|
|
|
|
|
2018-03-18 23:03:26 +01:00
|
|
|
|
2020-03-16 09:49:41 +01:00
|
|
|
class rm4(rm):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2020-03-16 09:49:41 +01:00
|
|
|
self.type = "RM4"
|
|
|
|
self._request_header = b'\x04\x00'
|
|
|
|
self._code_sending_header = b'\xd0\x00'
|
|
|
|
|
2020-03-23 21:23:05 +01:00
|
|
|
def check_temperature(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
data = self._check_sensors(0x24)
|
|
|
|
return data[0x0] + data[0x1] / 100.0
|
2020-03-23 21:23:05 +01:00
|
|
|
|
|
|
|
def check_humidity(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
data = self._check_sensors(0x24)
|
|
|
|
return data[0x2] + data[0x3] / 100.0
|
2020-03-23 21:23:05 +01:00
|
|
|
|
|
|
|
def check_sensors(self):
|
2020-06-08 12:21:23 +02:00
|
|
|
data = self._check_sensors(0x24)
|
2020-03-23 21:23:05 +01:00
|
|
|
return {
|
2020-06-08 12:21:23 +02:00
|
|
|
'temperature': data[0x0] + data[0x1] / 100.0,
|
|
|
|
'humidity': data[0x2] + data[0x3] / 100.0
|
2020-03-23 21:23:05 +01:00
|
|
|
}
|
2020-03-16 09:49:41 +01:00
|
|
|
|
2020-06-08 12:21:23 +02:00
|
|
|
|
2018-03-18 23:03:26 +01:00
|
|
|
# For legacy compatibility - don't use this
|
2016-11-17 21:02:59 +01:00
|
|
|
class rm2(rm):
|
2019-05-19 17:54:14 +02:00
|
|
|
def __init__(self):
|
|
|
|
device.__init__(self, None, None, None)
|
2016-10-30 22:16:40 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
def discover(self):
|
|
|
|
dev = discover()
|
|
|
|
self.host = dev.host
|
|
|
|
self.mac = dev.mac
|
2017-04-22 21:48:02 +02:00
|
|
|
|
2017-11-25 21:20:46 +01:00
|
|
|
|
2018-03-18 23:03:26 +01:00
|
|
|
class hysen(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "Hysen heating controller"
|
|
|
|
|
|
|
|
# Send a request
|
|
|
|
# input_payload should be a bytearray, usually 6 bytes, e.g. bytearray([0x01,0x06,0x00,0x02,0x10,0x00])
|
|
|
|
# Returns decrypted payload
|
|
|
|
# New behaviour: raises a ValueError if the device response indicates an error or CRC check fails
|
|
|
|
# The function prepends length (2 bytes) and appends CRC
|
2020-04-10 09:23:15 +02:00
|
|
|
|
|
|
|
def calculate_crc16(self, input_data):
|
|
|
|
from ctypes import c_ushort
|
|
|
|
crc16_tab = []
|
|
|
|
crc16_constant = 0xA001
|
|
|
|
|
|
|
|
for i in range(0, 256):
|
|
|
|
crc = c_ushort(i).value
|
|
|
|
for j in range(0, 8):
|
|
|
|
if (crc & 0x0001):
|
|
|
|
crc = c_ushort(crc >> 1).value ^ crc16_constant
|
|
|
|
else:
|
|
|
|
crc = c_ushort(crc >> 1).value
|
|
|
|
crc16_tab.append(hex(crc))
|
|
|
|
|
|
|
|
try:
|
|
|
|
is_string = isinstance(input_data, str)
|
|
|
|
is_bytes = isinstance(input_data, bytes)
|
|
|
|
|
|
|
|
if not is_string and not is_bytes:
|
|
|
|
raise Exception("Please provide a string or a byte sequence "
|
|
|
|
"as argument for calculation.")
|
|
|
|
|
|
|
|
crcValue = 0xffff
|
|
|
|
|
|
|
|
for c in input_data:
|
|
|
|
d = ord(c) if is_string else c
|
|
|
|
tmp = crcValue ^ d
|
|
|
|
rotated = c_ushort(crcValue >> 8).value
|
|
|
|
crcValue = rotated ^ int(crc16_tab[(tmp & 0x00ff)], 0)
|
|
|
|
|
|
|
|
return crcValue
|
|
|
|
except Exception as e:
|
|
|
|
print("EXCEPTION(calculate): {}".format(e))
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
def send_request(self, input_payload):
|
|
|
|
|
2020-04-19 08:49:55 +02:00
|
|
|
crc = self.calculate_crc16(bytes(input_payload))
|
2019-05-19 17:54:14 +02:00
|
|
|
|
|
|
|
# first byte is length, +2 for CRC16
|
|
|
|
request_payload = bytearray([len(input_payload) + 2, 0x00])
|
|
|
|
request_payload.extend(input_payload)
|
|
|
|
|
|
|
|
# append CRC
|
|
|
|
request_payload.append(crc & 0xFF)
|
|
|
|
request_payload.append((crc >> 8) & 0xFF)
|
|
|
|
|
|
|
|
# send to device
|
|
|
|
response = self.send_packet(0x6a, request_payload)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
response_payload = bytearray(self.decrypt(bytes(response[0x38:])))
|
|
|
|
|
|
|
|
# experimental check on CRC in response (first 2 bytes are len, and trailing bytes are crc)
|
|
|
|
response_payload_len = response_payload[0]
|
|
|
|
if response_payload_len + 2 > len(response_payload):
|
|
|
|
raise ValueError('hysen_response_error', 'first byte of response is not length')
|
2020-04-19 08:49:55 +02:00
|
|
|
crc = self.calculate_crc16(bytes(response_payload[2:response_payload_len]))
|
2019-05-19 17:54:14 +02:00
|
|
|
if (response_payload[response_payload_len] == crc & 0xFF) and (
|
|
|
|
response_payload[response_payload_len + 1] == (crc >> 8) & 0xFF):
|
|
|
|
return response_payload[2:response_payload_len]
|
|
|
|
raise ValueError('hysen_response_error', 'CRC check on response failed')
|
|
|
|
|
|
|
|
# Get current room temperature in degrees celsius
|
|
|
|
def get_temp(self):
|
|
|
|
payload = self.send_request(bytearray([0x01, 0x03, 0x00, 0x00, 0x00, 0x08]))
|
|
|
|
return payload[0x05] / 2.0
|
|
|
|
|
|
|
|
# Get current external temperature in degrees celsius
|
|
|
|
def get_external_temp(self):
|
|
|
|
payload = self.send_request(bytearray([0x01, 0x03, 0x00, 0x00, 0x00, 0x08]))
|
|
|
|
return payload[18] / 2.0
|
|
|
|
|
|
|
|
# Get full status (including timer schedule)
|
|
|
|
def get_full_status(self):
|
|
|
|
payload = self.send_request(bytearray([0x01, 0x03, 0x00, 0x00, 0x00, 0x16]))
|
|
|
|
data = {}
|
|
|
|
data['remote_lock'] = payload[3] & 1
|
|
|
|
data['power'] = payload[4] & 1
|
|
|
|
data['active'] = (payload[4] >> 4) & 1
|
|
|
|
data['temp_manual'] = (payload[4] >> 6) & 1
|
|
|
|
data['room_temp'] = (payload[5] & 255) / 2.0
|
|
|
|
data['thermostat_temp'] = (payload[6] & 255) / 2.0
|
|
|
|
data['auto_mode'] = payload[7] & 15
|
|
|
|
data['loop_mode'] = (payload[7] >> 4) & 15
|
|
|
|
data['sensor'] = payload[8]
|
|
|
|
data['osv'] = payload[9]
|
|
|
|
data['dif'] = payload[10]
|
|
|
|
data['svh'] = payload[11]
|
|
|
|
data['svl'] = payload[12]
|
|
|
|
data['room_temp_adj'] = ((payload[13] << 8) + payload[14]) / 2.0
|
|
|
|
if data['room_temp_adj'] > 32767:
|
|
|
|
data['room_temp_adj'] = 32767 - data['room_temp_adj']
|
|
|
|
data['fre'] = payload[15]
|
|
|
|
data['poweron'] = payload[16]
|
|
|
|
data['unknown'] = payload[17]
|
|
|
|
data['external_temp'] = (payload[18] & 255) / 2.0
|
|
|
|
data['hour'] = payload[19]
|
|
|
|
data['min'] = payload[20]
|
|
|
|
data['sec'] = payload[21]
|
|
|
|
data['dayofweek'] = payload[22]
|
|
|
|
|
|
|
|
weekday = []
|
|
|
|
for i in range(0, 6):
|
|
|
|
weekday.append(
|
|
|
|
{'start_hour': payload[2 * i + 23], 'start_minute': payload[2 * i + 24], 'temp': payload[i + 39] / 2.0})
|
|
|
|
|
|
|
|
data['weekday'] = weekday
|
|
|
|
weekend = []
|
|
|
|
for i in range(6, 8):
|
|
|
|
weekend.append(
|
|
|
|
{'start_hour': payload[2 * i + 23], 'start_minute': payload[2 * i + 24], 'temp': payload[i + 39] / 2.0})
|
|
|
|
|
|
|
|
data['weekend'] = weekend
|
|
|
|
return data
|
|
|
|
|
|
|
|
# Change controller mode
|
|
|
|
# auto_mode = 1 for auto (scheduled/timed) mode, 0 for manual mode.
|
|
|
|
# Manual mode will activate last used temperature.
|
|
|
|
# In typical usage call set_temp to activate manual control and set temp.
|
|
|
|
# loop_mode refers to index in [ "12345,67", "123456,7", "1234567" ]
|
|
|
|
# E.g. loop_mode = 0 ("12345,67") means Saturday and Sunday follow the "weekend" schedule
|
|
|
|
# loop_mode = 2 ("1234567") means every day (including Saturday and Sunday) follows the "weekday" schedule
|
|
|
|
# The sensor command is currently experimental
|
|
|
|
def set_mode(self, auto_mode, loop_mode, sensor=0):
|
|
|
|
mode_byte = ((loop_mode + 1) << 4) + auto_mode
|
|
|
|
self.send_request(bytearray([0x01, 0x06, 0x00, 0x02, mode_byte, sensor]))
|
|
|
|
|
|
|
|
# Advanced settings
|
|
|
|
# Sensor mode (SEN) sensor = 0 for internal sensor, 1 for external sensor,
|
|
|
|
# 2 for internal control temperature, external limit temperature. Factory default: 0.
|
|
|
|
# Set temperature range for external sensor (OSV) osv = 5..99. Factory default: 42C
|
|
|
|
# Deadzone for floor temprature (dIF) dif = 1..9. Factory default: 2C
|
|
|
|
# Upper temperature limit for internal sensor (SVH) svh = 5..99. Factory default: 35C
|
|
|
|
# Lower temperature limit for internal sensor (SVL) svl = 5..99. Factory default: 5C
|
|
|
|
# Actual temperature calibration (AdJ) adj = -0.5. Prescision 0.1C
|
|
|
|
# Anti-freezing function (FrE) fre = 0 for anti-freezing function shut down,
|
|
|
|
# 1 for anti-freezing function open. Factory default: 0
|
|
|
|
# Power on memory (POn) poweron = 0 for power on memory off, 1 for power on memory on. Factory default: 0
|
|
|
|
def set_advanced(self, loop_mode, sensor, osv, dif, svh, svl, adj, fre, poweron):
|
|
|
|
input_payload = bytearray([0x01, 0x10, 0x00, 0x02, 0x00, 0x05, 0x0a, loop_mode, sensor, osv, dif, svh, svl,
|
|
|
|
(int(adj * 2) >> 8 & 0xff), (int(adj * 2) & 0xff), fre, poweron])
|
|
|
|
self.send_request(input_payload)
|
|
|
|
|
|
|
|
# For backwards compatibility only. Prefer calling set_mode directly.
|
|
|
|
# Note this function invokes loop_mode=0 and sensor=0.
|
|
|
|
def switch_to_auto(self):
|
|
|
|
self.set_mode(auto_mode=1, loop_mode=0)
|
|
|
|
|
|
|
|
def switch_to_manual(self):
|
|
|
|
self.set_mode(auto_mode=0, loop_mode=0)
|
|
|
|
|
|
|
|
# Set temperature for manual mode (also activates manual mode if currently in automatic)
|
|
|
|
def set_temp(self, temp):
|
|
|
|
self.send_request(bytearray([0x01, 0x06, 0x00, 0x01, 0x00, int(temp * 2)]))
|
|
|
|
|
|
|
|
# Set device on(1) or off(0), does not deactivate Wifi connectivity.
|
|
|
|
# Remote lock disables control by buttons on thermostat.
|
|
|
|
def set_power(self, power=1, remote_lock=0):
|
|
|
|
self.send_request(bytearray([0x01, 0x06, 0x00, 0x00, remote_lock, power]))
|
|
|
|
|
|
|
|
# set time on device
|
|
|
|
# n.b. day=1 is Monday, ..., day=7 is Sunday
|
|
|
|
def set_time(self, hour, minute, second, day):
|
|
|
|
self.send_request(bytearray([0x01, 0x10, 0x00, 0x08, 0x00, 0x02, 0x04, hour, minute, second, day]))
|
|
|
|
|
|
|
|
# Set timer schedule
|
|
|
|
# Format is the same as you get from get_full_status.
|
|
|
|
# weekday is a list (ordered) of 6 dicts like:
|
|
|
|
# {'start_hour':17, 'start_minute':30, 'temp': 22 }
|
|
|
|
# Each one specifies the thermostat temp that will become effective at start_hour:start_minute
|
|
|
|
# weekend is similar but only has 2 (e.g. switch on in morning and off in afternoon)
|
|
|
|
def set_schedule(self, weekday, weekend):
|
|
|
|
# Begin with some magic values ...
|
|
|
|
input_payload = bytearray([0x01, 0x10, 0x00, 0x0a, 0x00, 0x0c, 0x18])
|
|
|
|
|
|
|
|
# Now simply append times/temps
|
|
|
|
# weekday times
|
|
|
|
for i in range(0, 6):
|
|
|
|
input_payload.append(weekday[i]['start_hour'])
|
|
|
|
input_payload.append(weekday[i]['start_minute'])
|
|
|
|
|
|
|
|
# weekend times
|
|
|
|
for i in range(0, 2):
|
|
|
|
input_payload.append(weekend[i]['start_hour'])
|
|
|
|
input_payload.append(weekend[i]['start_minute'])
|
|
|
|
|
|
|
|
# weekday temperatures
|
|
|
|
for i in range(0, 6):
|
|
|
|
input_payload.append(int(weekday[i]['temp'] * 2))
|
|
|
|
|
|
|
|
# weekend temperatures
|
|
|
|
for i in range(0, 2):
|
|
|
|
input_payload.append(int(weekend[i]['temp'] * 2))
|
|
|
|
|
|
|
|
self.send_request(input_payload)
|
2018-03-18 23:03:26 +01:00
|
|
|
|
|
|
|
|
2017-11-25 21:20:46 +01:00
|
|
|
S1C_SENSORS_TYPES = {
|
|
|
|
0x31: 'Door Sensor', # 49 as hex
|
|
|
|
0x91: 'Key Fob', # 145 as hex, as serial on fob corpse
|
|
|
|
0x21: 'Motion Sensor' # 33 as hex
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
class S1C(device):
|
2019-05-19 17:54:14 +02:00
|
|
|
"""
|
|
|
|
Its VERY VERY VERY DIRTY IMPLEMENTATION of S1C
|
|
|
|
"""
|
|
|
|
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = 'S1C'
|
|
|
|
|
|
|
|
def get_sensors_status(self):
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 0x06 # 0x06 - get sensors info, 0x07 - probably add sensors
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-27 20:57:32 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
2019-05-19 17:54:14 +02:00
|
|
|
if not payload:
|
|
|
|
return None
|
|
|
|
count = payload[0x4]
|
2017-11-25 21:20:46 +01:00
|
|
|
sensors = payload[0x6:]
|
|
|
|
sensors_a = [bytearray(sensors[i * 83:(i + 1) * 83]) for i in range(len(sensors) // 83)]
|
|
|
|
|
|
|
|
sens_res = []
|
|
|
|
for sens in sensors_a:
|
2019-05-19 17:54:14 +02:00
|
|
|
status = ord(chr(sens[0]))
|
|
|
|
_name = str(bytes(sens[4:26]).decode())
|
|
|
|
_order = ord(chr(sens[1]))
|
|
|
|
_type = ord(chr(sens[3]))
|
|
|
|
_serial = bytes(codecs.encode(sens[26:30], "hex")).decode()
|
|
|
|
|
|
|
|
type_str = S1C_SENSORS_TYPES.get(_type, 'Unknown')
|
|
|
|
|
|
|
|
r = {
|
|
|
|
'status': status,
|
|
|
|
'name': _name.strip('\x00'),
|
|
|
|
'type': type_str,
|
|
|
|
'order': _order,
|
|
|
|
'serial': _serial,
|
|
|
|
}
|
|
|
|
if r['serial'] != '00000000':
|
|
|
|
sens_res.append(r)
|
2017-11-25 21:20:46 +01:00
|
|
|
result = {
|
2019-05-19 17:54:14 +02:00
|
|
|
'count': count,
|
|
|
|
'sensors': sens_res
|
2017-11-25 21:20:46 +01:00
|
|
|
}
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
2017-12-25 01:34:37 +01:00
|
|
|
class dooya(device):
|
2020-03-24 16:09:31 +01:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2019-05-19 17:54:14 +02:00
|
|
|
self.type = "Dooya DT360E"
|
|
|
|
|
|
|
|
def _send(self, magic1, magic2):
|
|
|
|
packet = bytearray(16)
|
|
|
|
packet[0] = 0x09
|
|
|
|
packet[2] = 0xbb
|
|
|
|
packet[3] = magic1
|
|
|
|
packet[4] = magic2
|
|
|
|
packet[9] = 0xfa
|
|
|
|
packet[10] = 0x44
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x22:0x24])
|
2019-05-19 17:54:14 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
return ord(payload[4])
|
|
|
|
|
|
|
|
def open(self):
|
|
|
|
return self._send(0x01, 0x00)
|
|
|
|
|
|
|
|
def close(self):
|
|
|
|
return self._send(0x02, 0x00)
|
|
|
|
|
|
|
|
def stop(self):
|
|
|
|
return self._send(0x03, 0x00)
|
|
|
|
|
|
|
|
def get_percentage(self):
|
|
|
|
return self._send(0x06, 0x5d)
|
|
|
|
|
|
|
|
def set_percentage_and_wait(self, new_percentage):
|
2017-12-25 01:34:37 +01:00
|
|
|
current = self.get_percentage()
|
2019-05-19 17:54:14 +02:00
|
|
|
if current > new_percentage:
|
|
|
|
self.close()
|
|
|
|
while current is not None and current > new_percentage:
|
|
|
|
time.sleep(0.2)
|
|
|
|
current = self.get_percentage()
|
2017-12-25 01:34:37 +01:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
elif current < new_percentage:
|
|
|
|
self.open()
|
|
|
|
while current is not None and current < new_percentage:
|
|
|
|
time.sleep(0.2)
|
|
|
|
current = self.get_percentage()
|
|
|
|
self.stop()
|
2017-12-25 01:34:37 +01:00
|
|
|
|
2020-04-05 19:14:47 +02:00
|
|
|
class lb1(device):
|
|
|
|
state_dict = []
|
|
|
|
effect_map_dict = { 'lovely color' : 0,
|
|
|
|
'flashlight' : 1,
|
|
|
|
'lightning' : 2,
|
|
|
|
'color fading' : 3,
|
|
|
|
'color breathing' : 4,
|
|
|
|
'multicolor breathing' : 5,
|
|
|
|
'color jumping' : 6,
|
|
|
|
'multicolor jumping' : 7 }
|
|
|
|
|
2020-06-16 21:19:32 +02:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
device.__init__(self, *args, **kwargs)
|
2020-04-05 19:14:47 +02:00
|
|
|
self.type = "SmartBulb"
|
|
|
|
|
|
|
|
def send_command(self,command, type = 'set'):
|
|
|
|
packet = bytearray(16+(int(len(command)/16) + 1)*16)
|
|
|
|
packet[0x02] = 0xa5
|
|
|
|
packet[0x03] = 0xa5
|
|
|
|
packet[0x04] = 0x5a
|
|
|
|
packet[0x05] = 0x5a
|
|
|
|
packet[0x08] = 0x02 if type == "set" else 0x01 # 0x01 => query, # 0x02 => set
|
|
|
|
packet[0x09] = 0x0b
|
|
|
|
packet[0x0a] = len(command)
|
|
|
|
packet[0x0e:] = map(ord, command)
|
|
|
|
|
2020-04-19 08:53:09 +02:00
|
|
|
checksum = 0xbeaf
|
|
|
|
for b in packet:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
2020-04-05 19:14:47 +02:00
|
|
|
|
|
|
|
packet[0x00] = (0x0c + len(command)) & 0xff
|
|
|
|
packet[0x06] = checksum & 0xff # Checksum 1 position
|
|
|
|
packet[0x07] = checksum >> 8 # Checksum 2 position
|
|
|
|
|
|
|
|
response = self.send_packet(0x6a, packet)
|
2020-05-07 07:59:21 +02:00
|
|
|
check_error(response[0x36:0x38])
|
2020-04-05 19:14:47 +02:00
|
|
|
payload = self.decrypt(bytes(response[0x38:]))
|
|
|
|
|
|
|
|
responseLength = int(payload[0x0a]) | (int(payload[0x0b]) << 8)
|
|
|
|
if responseLength > 0:
|
|
|
|
self.state_dict = json.loads(payload[0x0e:0x0e+responseLength])
|
|
|
|
|
|
|
|
def set_json(self, jsonstr):
|
|
|
|
reconvert = json.loads(jsonstr)
|
|
|
|
if 'bulb_sceneidx' in reconvert.keys():
|
|
|
|
reconvert['bulb_sceneidx'] = self.effect_map_dict.get(reconvert['bulb_sceneidx'], 255)
|
|
|
|
|
|
|
|
self.send_command(json.dumps(reconvert))
|
|
|
|
return json.dumps(self.state_dict)
|
|
|
|
|
|
|
|
def set_state(self, state):
|
|
|
|
cmd = '{"pwr":%d}' % (1 if state == "ON" or state == 1 else 0)
|
|
|
|
self.send_command(cmd)
|
|
|
|
|
|
|
|
def get_state(self):
|
|
|
|
cmd = "{}"
|
|
|
|
self.send_command(cmd)
|
|
|
|
return self.state_dict
|
2018-03-18 23:03:26 +01:00
|
|
|
|
2017-04-22 21:48:02 +02:00
|
|
|
# Setup a new Broadlink device via AP Mode. Review the README to see how to enter AP Mode.
|
|
|
|
# Only tested with Broadlink RM3 Mini (Blackbean)
|
|
|
|
def setup(ssid, password, security_mode):
|
2019-05-19 17:54:14 +02:00
|
|
|
# Security mode options are (0 - none, 1 = WEP, 2 = WPA1, 3 = WPA2, 4 = WPA1/2)
|
|
|
|
payload = bytearray(0x88)
|
|
|
|
payload[0x26] = 0x14 # This seems to always be set to 14
|
|
|
|
# Add the SSID to the payload
|
|
|
|
ssid_start = 68
|
|
|
|
ssid_length = 0
|
|
|
|
for letter in ssid:
|
|
|
|
payload[(ssid_start + ssid_length)] = ord(letter)
|
|
|
|
ssid_length += 1
|
|
|
|
# Add the WiFi password to the payload
|
|
|
|
pass_start = 100
|
|
|
|
pass_length = 0
|
|
|
|
for letter in password:
|
|
|
|
payload[(pass_start + pass_length)] = ord(letter)
|
|
|
|
pass_length += 1
|
|
|
|
|
|
|
|
payload[0x84] = ssid_length # Character length of SSID
|
|
|
|
payload[0x85] = pass_length # Character length of password
|
|
|
|
payload[0x86] = security_mode # Type of encryption (00 - none, 01 = WEP, 02 = WPA1, 03 = WPA2, 04 = WPA1/2)
|
|
|
|
|
2020-04-19 08:53:09 +02:00
|
|
|
checksum = 0xbeaf
|
|
|
|
for b in payload:
|
|
|
|
checksum = (checksum + b) & 0xffff
|
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
payload[0x20] = checksum & 0xff # Checksum 1 position
|
|
|
|
payload[0x21] = checksum >> 8 # Checksum 2 position
|
2017-04-22 21:48:02 +02:00
|
|
|
|
2019-05-19 17:54:14 +02:00
|
|
|
sock = socket.socket(socket.AF_INET, # Internet
|
|
|
|
socket.SOCK_DGRAM) # UDP
|
|
|
|
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
|
|
|
|
sock.sendto(payload, ('255.255.255.255', 80))
|
2020-04-25 11:40:48 +02:00
|
|
|
sock.close()
|