-
Notifications
You must be signed in to change notification settings - Fork 222
Open
Labels
tuya_deviceSupport for specific Tuya DevicesSupport for specific Tuya Devices
Description
Hi everyone, I have two of the TH01, one on main module v2.1.8 and the other on v2.1.12. For some reason, the v2.1.8 doesn't report all the IDs using tinytuya. Any help is welcome.
Using this code I can get the correct device status for the v2.1.12
sensor = tinytuya.Device(device["deviceid"], ip, device["localkey"], version=float(device["version"]), connection_timeout=2)
data = sensor.status()
protocol version is set to 3.4
v2.1.8: {'protocol': 4, 't': 1740820874, 'data': {'dps': {'1': 127}}, 'dps': {'1': 127}}
v2.1.12: {'protocol': 4, 't': 1740820874, 'data': {'dps': {'1': 239,'2': 72,'3': 'high'}},'dps': {'1': 239,'2': 72,'3': 'high'}}
Here is the debug output for the v2.1.8 device:
DEBUG:TinyTuya [1.16.1]
DEBUG:Python 3.12.3 (main, Feb 4 2025, 14:48:35) [GCC 13.3.0] on linux
DEBUG:Using pyca/cryptography 44.0.1 for crypto, GCM is supported
DEBUG:status() entry (dev_type is default)
DEBUG:final payload_dict for 'bff38005b71079dd5earww' ('v3.4'/'default'): {1: {'command': {'gwId': '', 'devId': '', 'uid': '', 't': ''}}, 7: {'command': {'protocol': 5, 't': 'int', 'data': {}}, 'command_override': 13}, 8: {'command': {'gwId': '', 'devId': ''}}, 9: {'command': {'gwId': '', 'devId': ''}}, 10: {'command': {}, 'command_overrid
e': 16}, 13: {'command': {'protocol': 5, 't': 'int', 'data': {}}}, 16: {'command': {}}, 18: {'command': {'dpId': [18, 19, 20]}}, 64: {'command': {'reqType': '', 'data': {}}}}
DEBUG:building command 10 payload=b'{}'
DEBUG:sending payload quick
DEBUG:final payload: b'0123456789abcdef'
DEBUG:payload encrypted=b'000055aa000000010000000300000044ddf0b90a6559879641a0781da9251ad9f2b5401ac8ad0e78dc3af1c88a24daff72d90be522214949587e22c8adfce64afcf52f7ae7437b6817efd6bef1d17cc00000aa55'
DEBUG:received data=b'000055aa0000c023000000040000006800000000bfd1befdc195edad5d1522a73522f49e69622e2e043602662fc5f62b84bd6706835fb5ed5cd42e15aaa4c47aa218c06df2b5401ac8ad0e78dc3af1c88a24daff48ed791cef5f9646006efb60a6f0e28896a2895b19d6eefe56b243219c9900c90000aa55'
DEBUG:decrypting=b'\xbf\xd1\xbe\xfd\xc1\x95\xed\xad]\x15"\xa75"\xf4\x9eib..\x046\x02f/\xc5\xf6+\x84\xbdg\x06\x83_\xb5\xed\\\xd4.\x15\xaa\xa4\xc4z\xa2\x18\xc0m\xf2\xb5@\x1a\xc8\xad\x0ex\xdc:\xf1\xc8\x8a$\xda\xff'
DEBUG:decrypted session key negotiation step 2 payload=b'e6ca753f8821e5a2i\xd1\xc4&\xa3\x0c\x90\xa8z\x8f\xce\xdfm\xbd\xf0\xdf\x004kX6J\xcb\x02\x8f\x91\xd9l\xf5\x8c\x0f{'
DEBUG:payload type = <class 'bytes'> len = 48
DEBUG:session local nonce: b'0123456789abcdef' remote nonce: b'e6ca753f8821e5a2'
DEBUG:sending payload quick
DEBUG:final payload: b"\x10\x87\xbf\xc7o\x17^\xb9\xfeR_\xc8\x89\xd6\xd2\x92\xfa\x1b\xb1'#o\xbfoa\xa0`\x98Pos\x9a"
DEBUG:payload encrypted=b'000055aa0000000200000005000000545b9334dd62de1a918415ffdf18dd361e4c3a15402c7c235882f241d750ff59a9f2b5401ac8ad0e78dc3af1c88a24daff261607fbb07488cd0291bb6ec0a0245960f1b466380bb635f4bd35d9721259af0000aa55'
DEBUG:Session nonce XOR'd: b'U\x07QR\x03\x00\x05Q\x00\x01SS\x06Q\x04T'
DEBUG:Session key negotiate success! session key: b'\xcbHY\x08>\xdb_/\xee\x90\xafc\xa0\x84s\xea'
DEBUG:sending payload
DEBUG:final payload: b'{}'
DEBUG:payload encrypted=b'000055aa000000030000001000000034c017aada9ef41997f306df5e5385aca6adfde3b595a7948dec60c4e577a9847e7844ee508a6fba5dd6d191ddb56810f30000aa55'
DEBUG:received data=b'000055aa0000c024000000100000004800000001b8e501b29d4bbb63bd1142a7fdf75d54fb78d800dc3338859f38a4c841abbee679e5a62e503e91b73814949457b16fc93afc5c9eecf14d549400fc737ef0866b0000aa55'
DEBUG:received message=TuyaMessage(seqno=49188, cmd=16, retcode=1, payload=b'\xb8\xe5\x01\xb2\x9dK\xbbc\xbd\x11B\xa7\xfd\xf7]T\xfbx\xd8\x00\xdc38\x85\x9f8\xa4\xc8A\xab\xbe\xe6', crc=b'y\xe5\xa6.P>\x91\xb78\x14\x94\x94W\xb1o\xc9:\xfc\\\x9e\xec\xf1MT\x94\x00\xfcs~\xf0\x86k', crc_good=True, prefix=21930, iv=None)
DEBUG:raw unpacked message = TuyaMessage(seqno=49188, cmd=16, retcode=1, payload=b'\xb8\xe5\x01\xb2\x9dK\xbbc\xbd\x11B\xa7\xfd\xf7]T\xfbx\xd8\x00\xdc38\x85\x9f8\xa4\xc8A\xab\xbe\xe6', crc=b'y\xe5\xa6.P>\x91\xb78\x14\x94\x94W\xb1o\xc9:\xfc\\\x9e\xec\xf1MT\x94\x00\xfcs~\xf0\x86k', crc_good=True, prefix=21930, iv=None)
DEBUG:decode payload=b'\xb8\xe5\x01\xb2\x9dK\xbbc\xbd\x11B\xa7\xfd\xf7]T\xfbx\xd8\x00\xdc38\x85\x9f8\xa4\xc8A\xab\xbe\xe6'
DEBUG:decrypting=b'\xb8\xe5\x01\xb2\x9dK\xbbc\xbd\x11B\xa7\xfd\xf7]T\xfbx\xd8\x00\xdc38\x85\x9f8\xa4\xc8A\xab\xbe\xe6'
DEBUG:decrypted 3.x payload=b'json obj data unvalid'
DEBUG:payload type = <class 'bytes'>
DEBUG:'data unvalid' error detected: switching to dev_type 'device22'
DEBUG:_decode_payload() failed!
DEBUG:Device22 detected and updated (default -> device22) - Update payload and try again
DEBUG:ERROR Device22 Detected: Retry Command - 908 - payload: null
DEBUG:status() received data={'Error': 'Device22 Detected: Retry Command', 'Err': '908', 'Payload': None}
DEBUG:status() rebuilding payload for device22
DEBUG:final payload_dict for 'bff38005b71079dd5earww' ('v3.4'/'device22'): {1: {'command': {'gwId': '', 'devId': '', 'uid': '', 't': ''}}, 7: {'command': {'protocol': 5, 't': 'int', 'data': {}}, 'command_override': 13}, 8: {'command': {'gwId': '', 'devId': ''}}, 9: {'command': {'gwId': '', 'devId': ''}}, 10: {'command': {'devId': '', 'uid'
: '', 't': ''}, 'command_override': 13}, 13: {'command': {'protocol': 5, 't': 'int', 'data': {}}}, 16: {'command': {}}, 18: {'command': {'dpId': [18, 19, 20]}}, 64: {'command': {'reqType': '', 'data': {}}}}
DEBUG:building command 10 payload=b'{"devId":"bff38005b71079dd5earww","uid":"bff38005b71079dd5earww","t":"1740821416","dps":{"1":null}}'
DEBUG:sending payload quick
DEBUG:final payload: b'0123456789abcdef'
DEBUG:payload encrypted=b'000055aa000000040000000300000044ddf0b90a6559879641a0781da9251ad9f2b5401ac8ad0e78dc3af1c88a24daffee681d0ec77d9173152a538a9fd983ec87d6325e8b1196aba65c60b9d6f7cb1d0000aa55'
DEBUG:received data=b'000055aa0000c237000000040000006800000000ed9ad718ec641fd1ba587f890c7fdab369622e2e043602662fc5f62b84bd6706835fb5ed5cd42e15aaa4c47aa218c06df2b5401ac8ad0e78dc3af1c88a24daff8878f60260891370b5e45920f3d8ba8fe230f2e7f44954fd8ac08cf1bfe5e1010000aa55'
DEBUG:decrypting=b'\xed\x9a\xd7\x18\xecd\x1f\xd1\xbaX\x7f\x89\x0c\x7f\xda\xb3ib..\x046\x02f/\xc5\xf6+\x84\xbdg\x06\x83_\xb5\xed\\\xd4.\x15\xaa\xa4\xc4z\xa2\x18\xc0m\xf2\xb5@\x1a\xc8\xad\x0ex\xdc:\xf1\xc8\x8a$\xda\xff'
DEBUG:decrypted session key negotiation step 2 payload=b'4e2d0da5becedf07i\xd1\xc4&\xa3\x0c\x90\xa8z\x8f\xce\xdfm\xbd\xf0\xdf\x004kX6J\xcb\x02\x8f\x91\xd9l\xf5\x8c\x0f{'
DEBUG:payload type = <class 'bytes'> len = 48
DEBUG:session local nonce: b'0123456789abcdef' remote nonce: b'4e2d0da5becedf07'
DEBUG:sending payload quick
DEBUG:final payload: b'\x8e\x8f\x1d\x18\x7f\xc0\x1d\xe2\x98\xe6\xd4\n\x9a\xf5\x12\xf6\x9c"4\xeb\xe4\xd5\x89\xc6\xcd\x96$\x86\x1cG\xd4\xb8'
DEBUG:payload encrypted=b'000055aa00000005000000050000005424950275f4a5340762b65a32c910afcfacd60862fdbb5e8171a70b46bb6eecadf2b5401ac8ad0e78dc3af1c88a24daff3af9015e3cf0881ca24407cc50a8ebf18d01c40ec0c4c761ccfcacb583960abb0000aa55'
DEBUG:Session nonce XOR'd: b'\x04T\x00W\x04QW\x02Z\\\x02\x07\x07\x02UQ'
DEBUG:Session key negotiate success! session key: b'x\x05\x84Lw!\x01\x16o<\xa9YK\x8c\x02\x1a'
DEBUG:sending payload
DEBUG:final payload: b'3.4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00{"devId":"bff38005b71079dd5earww","uid":"bff38005b71079dd5earww","t":"1740821416","dps":{"1":null}}'
DEBUG:payload encrypted=b'000055aa000000060000000d000000a4206be9935fab5e85e57eaf8d59e275416cd3aeb8e9e38312fb16636477ce2488861298588814450dbf7194cd5af98b1969226d19bc6f6f53e6b1e1a01ba312df94ae01643e18ff0807f19a762237b2584355d284a697be5fec8abce712d1df467b0ac4240a53add6907156778f9550b020ad3788881519aca96db2327716b69ae16a56ede45710c3a9c587c5292
dff811811e18db2ba49f547627fdcbca957ae0000aa55'
DEBUG:received data=b'000055aa0000c2380000000800000068000000000c7165168f2d1081b4a5b74aa3a59576421a3132db110892686f2d8d1e9d715394391f13a10a19d4a7ef313d9e5cb87f265a78a5ad22b3c17c2da17701206422ed0e12f574bcb944380fb571850ce22ce78d1c99bddcffc25c3cd3fdcfc80e1a0000aa55'
DEBUG:received message=TuyaMessage(seqno=49720, cmd=8, retcode=0, payload=b'\x0cqe\x16\x8f-\x10\x81\xb4\xa5\xb7J\xa3\xa5\x95vB\x1a12\xdb\x11\x08\x92ho-\x8d\x1e\x9dqS\x949\x1f\x13\xa1\n\x19\xd4\xa7\xef1=\x9e\\\xb8\x7f&Zx\xa5\xad"\xb3\xc1|-\xa1w\x01 d"', crc=b'\xed\x0e\x12\xf5t\xbc\xb9D8\x0f\xb5q\x85\x0c\xe2,\xe7\x8d\x1c\x99\xbd\xdc\xff\xc2\
\<\xd3\xfd\xcf\xc8\x0e\x1a', crc_good=True, prefix=21930, iv=None)
DEBUG:raw unpacked message = TuyaMessage(seqno=49720, cmd=8, retcode=0, payload=b'\x0cqe\x16\x8f-\x10\x81\xb4\xa5\xb7J\xa3\xa5\x95vB\x1a12\xdb\x11\x08\x92ho-\x8d\x1e\x9dqS\x949\x1f\x13\xa1\n\x19\xd4\xa7\xef1=\x9e\\\xb8\x7f&Zx\xa5\xad"\xb3\xc1|-\xa1w\x01 d"', crc=b'\xed\x0e\x12\xf5t\xbc\xb9D8\x0f\xb5q\x85\x0c\xe2,\xe7\x8d\x1c\x99\xbd\xdc\xf
f\xc2\\<\xd3\xfd\xcf\xc8\x0e\x1a', crc_good=True, prefix=21930, iv=None)
DEBUG:decode payload=b'\x0cqe\x16\x8f-\x10\x81\xb4\xa5\xb7J\xa3\xa5\x95vB\x1a12\xdb\x11\x08\x92ho-\x8d\x1e\x9dqS\x949\x1f\x13\xa1\n\x19\xd4\xa7\xef1=\x9e\\\xb8\x7f&Zx\xa5\xad"\xb3\xc1|-\xa1w\x01 d"'
DEBUG:decrypting=b'\x0cqe\x16\x8f-\x10\x81\xb4\xa5\xb7J\xa3\xa5\x95vB\x1a12\xdb\x11\x08\x92ho-\x8d\x1e\x9dqS\x949\x1f\x13\xa1\n\x19\xd4\xa7\xef1=\x9e\\\xb8\x7f&Zx\xa5\xad"\xb3\xc1|-\xa1w\x01 d"'
DEBUG:decrypted 3.x payload=b'3.4\x00\x00\x00\x00\x00\x00\xe0\xed\x00\x00\x00\x01{"protocol":4,"t":4,"data":{"dps":{"1":122}}}'
DEBUG:payload type = <class 'bytes'>
DEBUG:removing 3.x=b'{"protocol":4,"t":4,"data":{"dps":{"1":122}}}'
DEBUG:decoded results='{"protocol":4,"t":4,"data":{"dps":{"1":122}}}'
Here is the debug output for the v2.1.12 device:
DEBUG:TinyTuya [1.16.1]
DEBUG:Python 3.12.3 (main, Feb 4 2025, 14:48:35) [GCC 13.3.0] on linux
DEBUG:Using pyca/cryptography 44.0.1 for crypto, GCM is supported
DEBUG:status() entry (dev_type is default)
DEBUG:final payload_dict for 'bffad491413e4161c7lrzs' ('v3.4'/'default'): {1: {'command': {'gwId': '', 'devId': '', 'uid': '', 't': ''}}, 7: {'command': {'protocol': 5, 't': 'int', 'data': {}}, 'command_override': 13}, 8: {'command': {'gwId': '', 'devId': ''}}, 9: {'command': {'gwId': '', 'devId': ''}}, 10: {'command': {}, 'command_overrid
e': 16}, 13: {'command': {'protocol': 5, 't': 'int', 'data': {}}}, 16: {'command': {}}, 18: {'command': {'dpId': [18, 19, 20]}}, 64: {'command': {'reqType': '', 'data': {}}}}
DEBUG:building command 10 payload=b'{}'
DEBUG:sending payload quick
DEBUG:final payload: b'0123456789abcdef'
DEBUG:payload encrypted=b'000055aa000000010000000300000044761d1c80e696889a2e820f74f7b85b4d3ef35194488c2a9d543a1c3be16c41f826958a7fd5cd46d3db61e7341066e52f702bf3f83f2d054189a461fe803f9a7c0000aa55'
DEBUG:received data=b'000055aa00002cda0000000400000068000000008fd3e8e35b58583c5ebf44d5e68d94ec4b17fb6ab3d4c89f72547c4217376fa3e2f5692686205b1c5555fc16e1e0224c3ef35194488c2a9d543a1c3be16c41f81f28cf9d4a8ca9b22fc64ff1c6055f384a7967b6f52499b95ea94c019dd0c6c50000aa55'
DEBUG:decrypting=b'\x8f\xd3\xe8\xe3[XX<^\xbfD\xd5\xe6\x8d\x94\xecK\x17\xfbj\xb3\xd4\xc8\x9frT|B\x177o\xa3\xe2\xf5i&\x86 [\x1cUU\xfc\x16\xe1\xe0"L>\xf3Q\x94H\x8c*\x9dT:\x1c;\xe1lA\xf8'
DEBUG:decrypted session key negotiation step 2 payload=b'73a05d8f7f3c44b8\x88\x12\x03\xfc\xbcW\x98G\xa2\xe0\xfagJc-\xbc\x0e\xb55\xe3c\x1b\xca\xc5\xdd\xb9\x07\x9f\x89\x8b\xe8y'
DEBUG:payload type = <class 'bytes'> len = 48
DEBUG:session local nonce: b'0123456789abcdef' remote nonce: b'73a05d8f7f3c44b8'
DEBUG:sending payload quick
DEBUG:final payload: b'/]\xc5@S\x9c\t\xab\x9e\xdf2\xfc\xf9\x1e\xfe\xbb+o@\xf4\xa5\xd1\x0eY\x85\xc0n\xd0&\xe3\x8d\xff'
DEBUG:payload encrypted=b'000055aa000000020000000500000054e86512ac762baf09f66f2a7f6d9635c409311e504be6fab735fffccb482629a23ef35194488c2a9d543a1c3be16c41f85abff8f55b819eb057f90431002f9003e77675e86cf2e7b2db204e606237cde30000aa55'
DEBUG:Session nonce XOR'd: b'\x07\x02S\x03\x01Q\x0eQ\x0f_R\x01WP\x07^'
DEBUG:Session key negotiate success! session key: b'~\x9fr\x8f\x94_\xbf\xa9\x11\x9d\x02\xbd\x84\xf9\x8eF'
DEBUG:sending payload
DEBUG:final payload: b'{}'
DEBUG:payload encrypted=b'000055aa000000030000001000000034ab384619909a26abb40fde6306d673d8b2d87838ec47611a5e1091681367f7fe0a2d2c01fc9767a2f71dab59ec407b8d0000aa55'
DEBUG:received data=b'000055aa00002cdb00000010000000480000000148d59319ceb34e8d9a95b2606e67dbd15ecd10c981f42664103e8f223a2ad6e3d238406030c2bb8b6c7bbbc0e5a4905bc0cd716bcf25f74c58c9a221d5e9c8920000aa55'
DEBUG:received message=TuyaMessage(seqno=11483, cmd=16, retcode=1, payload=b'H\xd5\x93\x19\xce\xb3N\x8d\x9a\x95\xb2`ng\xdb\xd1^\xcd\x10\xc9\x81\xf4&d\x10>\x8f":*\xd6\xe3', crc=b'\xd28@`0\xc2\xbb\x8bl{\xbb\xc0\xe5\xa4\x90[\xc0\xcdqk\xcf%\xf7LX\xc9\xa2!\xd5\xe9\xc8\x92', crc_good=True, prefix=21930, iv=None)
DEBUG:raw unpacked message = TuyaMessage(seqno=11483, cmd=16, retcode=1, payload=b'H\xd5\x93\x19\xce\xb3N\x8d\x9a\x95\xb2`ng\xdb\xd1^\xcd\x10\xc9\x81\xf4&d\x10>\x8f":*\xd6\xe3', crc=b'\xd28@`0\xc2\xbb\x8bl{\xbb\xc0\xe5\xa4\x90[\xc0\xcdqk\xcf%\xf7LX\xc9\xa2!\xd5\xe9\xc8\x92', crc_good=True, prefix=21930, iv=None)
DEBUG:decode payload=b'H\xd5\x93\x19\xce\xb3N\x8d\x9a\x95\xb2`ng\xdb\xd1^\xcd\x10\xc9\x81\xf4&d\x10>\x8f":*\xd6\xe3'
DEBUG:decrypting=b'H\xd5\x93\x19\xce\xb3N\x8d\x9a\x95\xb2`ng\xdb\xd1^\xcd\x10\xc9\x81\xf4&d\x10>\x8f":*\xd6\xe3'
DEBUG:decrypted 3.x payload=b'json obj data unvalid'
DEBUG:payload type = <class 'bytes'>
DEBUG:'data unvalid' error detected: switching to dev_type 'device22'
DEBUG:_decode_payload() failed!
DEBUG:Device22 detected and updated (default -> device22) - Update payload and try again
DEBUG:ERROR Device22 Detected: Retry Command - 908 - payload: null
DEBUG:status() received data={'Error': 'Device22 Detected: Retry Command', 'Err': '908', 'Payload': None}
DEBUG:status() rebuilding payload for device22
DEBUG:final payload_dict for 'bffad491413e4161c7lrzs' ('v3.4'/'device22'): {1: {'command': {'gwId': '', 'devId': '', 'uid': '', 't': ''}}, 7: {'command': {'protocol': 5, 't': 'int', 'data': {}}, 'command_override': 13}, 8: {'command': {'gwId': '', 'devId': ''}}, 9: {'command': {'gwId': '', 'devId': ''}}, 10: {'command': {'devId': '', 'uid': '', 't': ''}, 'command_override': 13}, 13: {'command': {'protocol': 5, 't': 'int', 'data': {}}}, 16: {'command': {}}, 18: {'command': {'dpId': [18, 19, 20]}}, 64: {'command': {'reqType': '', 'data': {}}}}
DEBUG:building command 10 payload=b'{"devId":"bffad491413e4161c7lrzs","uid":"bffad491413e4161c7lrzs","t":"1740821655","dps":{"1":null}}'
DEBUG:sending payload quick
DEBUG:final payload: b'0123456789abcdef'
DEBUG:payload encrypted=b'000055aa000000040000000300000044761d1c80e696889a2e820f74f7b85b4d3ef35194488c2a9d543a1c3be16c41f8fdc8a4bc62d88f20e06e46952485f25a1c3ed0a5e83fcbd57b661f009a2986ee0000aa55'
DEBUG:received data=b'000055aa00008eb600000004000000680000000023dc1422155e9796ba23b9c12393cdca4b17fb6ab3d4c89f72547c4217376fa3e2f5692686205b1c5555fc16e1e0224c3ef35194488c2a9d543a1c3be16c41f81d872bcfbd4a0c6e73a06b6387227cdf31d8c6a5d1dd7dc0257d9211faabb19e0000aa55'
DEBUG:decrypting=b'#\xdc\x14"\x15^\x97\x96\xba#\xb9\xc1#\x93\xcd\xcaK\x17\xfbj\xb3\xd4\xc8\x9frT|B\x177o\xa3\xe2\xf5i&\x86 [\x1cUU\xfc\x16\xe1\xe0"L>\xf3Q\x94H\x8c*\x9dT:\x1c;\xe1lA\xf8'
DEBUG:decrypted session key negotiation step 2 payload=b'aa88832e9265cdef\x88\x12\x03\xfc\xbcW\x98G\xa2\xe0\xfagJc-\xbc\x0e\xb55\xe3c\x1b\xca\xc5\xdd\xb9\x07\x9f\x89\x8b\xe8y'
DEBUG:payload type = <class 'bytes'> len = 48
DEBUG:session local nonce: b'0123456789abcdef' remote nonce: b'aa88832e9265cdef'
DEBUG:sending payload quick
DEBUG:final payload: b'j\xd1\xfa\x8c\xd6a.w\x1cuD{\xaakHHB\xce\n\x881\xf2\x91C}\x15$E";\xf8p'
DEBUG:payload encrypted=b'000055aa00000005000000050000005495bbd92df26c510d29084b70b66ad75b8852d4d03accf43243e11718468fbf003ef35194488c2a9d543a1c3be16c41f86bd262f1445ab4f19b3227618accd0439dfccbf08a4cb0004f07f842974dacf40000aa55'
DEBUG:Session nonce XOR'd: b'QP\n\x0b\x0c\x06\x04R\x01\x0bWW\x00\x00\x00\x00'
DEBUG:Session key negotiate success! session key: b'p2\x8c\x95h\xe5\xc8\xc6O\xb6a\xf2\x84@\xa5 '
DEBUG:sending payload
DEBUG:final payload: b'3.4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00{"devId":"bffad491413e4161c7lrzs","uid":"bffad491413e4161c7lrzs","t":"1740821655","dps":{"1":null}}'
DEBUG:payload encrypted=b'000055aa000000060000000d000000a424fb36a2ee509e2bc14cee383a4377985968a383bd0fcfc29d0c47be26996fe9905614786515988b7ff2b77e85e42f36dfca6f7cb410f030a4ce7b2011acd2b6b81ee72f25161eb15ff302d15729909a60c47aa5d391c6a6e43c25b7e402c177787d4838aee0afd75dee5d280ebd8859ec2bb647a39b1841ec50b06c0dfd3daf14bd1e4ee7baf7ba2f41820bbc2e124dd0b1e7565f77ce018d8974d0983b40000000aa55'
DEBUG:received data=b'000055aa00008eb70000000800000078000000004c1e7ac7df7ab51bedef2f74fa7c8ff3579ec3cbdaadddd4c4869a99e533571c261ba9ba2676e4dae567e7845c2c1ef8588c9246377f419315cf1ee0d448bcae3f22eb88c1927667dd2b44a2d6e5fc982e50510a912b5b0b022e3cd404b13afe8e646f3ae40022df866ceec19b3d27d30000aa55'
DEBUG:received message=TuyaMessage(seqno=36535, cmd=8, retcode=0, payload=b'L\x1ez\xc7\xdfz\xb5\x1b\xed\xef/t\xfa|\x8f\xf3W\x9e\xc3\xcb\xda\xad\xdd\xd4\xc4\x86\x9a\x99\xe53W\x1c&\x1b\xa9\xba&v\xe4\xda\xe5g\xe7\x84\\,\x1e\xf8X\x8c\x92F7\x7fA\x93\x15\xcf\x1e\xe0\xd4H\xbc\xae?"\xeb\x88\xc1\x92vg\xdd+D\xa2\xd6\xe5\xfc\x98', crc=b'.PQ\n\x91+[\x0b\x02.<\xd4\x04\xb1:\xfe\x8edo:\xe4\x00"\xdf\x86l\xee\xc1\x9b=\'\xd3', crc_good=True, prefix=21930, iv=None)
DEBUG:raw unpacked message = TuyaMessage(seqno=36535, cmd=8, retcode=0, payload=b'L\x1ez\xc7\xdfz\xb5\x1b\xed\xef/t\xfa|\x8f\xf3W\x9e\xc3\xcb\xda\xad\xdd\xd4\xc4\x86\x9a\x99\xe53W\x1c&\x1b\xa9\xba&v\xe4\xda\xe5g\xe7\x84\\,\x1e\xf8X\x8c\x92F7\x7fA\x93\x15\xcf\x1e\xe0\xd4H\xbc\xae?"\xeb\x88\xc1\x92vg\xdd+D\xa2\xd6\xe5\xfc\x98', crc=b'.PQ\n\x91+[\x0b\x02.<\xd4\x04\xb1:\xfe\x8edo:\xe4\x00"\xdf\x86l\xee\xc1\x9b=\'\xd3', crc_good=True, prefix=21930, iv=None)
DEBUG:decode payload=b'L\x1ez\xc7\xdfz\xb5\x1b\xed\xef/t\xfa|\x8f\xf3W\x9e\xc3\xcb\xda\xad\xdd\xd4\xc4\x86\x9a\x99\xe53W\x1c&\x1b\xa9\xba&v\xe4\xda\xe5g\xe7\x84\\,\x1e\xf8X\x8c\x92F7\x7fA\x93\x15\xcf\x1e\xe0\xd4H\xbc\xae?"\xeb\x88\xc1\x92vg\xdd+D\xa2\xd6\xe5\xfc\x98'
DEBUG:decrypting=b'L\x1ez\xc7\xdfz\xb5\x1b\xed\xef/t\xfa|\x8f\xf3W\x9e\xc3\xcb\xda\xad\xdd\xd4\xc4\x86\x9a\x99\xe53W\x1c&\x1b\xa9\xba&v\xe4\xda\xe5g\xe7\x84\\,\x1e\xf8X\x8c\x92F7\x7fA\x93\x15\xcf\x1e\xe0\xd4H\xbc\xae?"\xeb\x88\xc1\x92vg\xdd+D\xa2\xd6\xe5\xfc\x98'
DEBUG:decrypted 3.x payload=b'3.4\x00\x00\x00\x00\x00\x00\xf9\x86\x00\x00\x00\x01{"protocol":4,"t":3,"data":{"dps":{"1":210,"2":39,"3":"high"}}}'
DEBUG:payload type = <class 'bytes'>
DEBUG:removing 3.x=b'{"protocol":4,"t":3,"data":{"dps":{"1":210,"2":39,"3":"high"}}}'
DEBUG:decoded results='{"protocol":4,"t":3,"data":{"dps":{"1":210,"2":39,"3":"high"}}}'
Metadata
Metadata
Assignees
Labels
tuya_deviceSupport for specific Tuya DevicesSupport for specific Tuya Devices