-
Notifications
You must be signed in to change notification settings - Fork 44
Support for newer type #11
Copy link
Copy link
Closed
Description
Hi,
I've got some strips that report as MELK (found device: BE:16:71:00:18:91 0 MELK-OA10 ) instead of ELK and they use the DuoCo StripX app from the play store. By default they don't seem to work. For what I can tell, it looks as if these are looking for some initial (auth?) packet before they accept commands.
After I send char-write-cmd 0x0009 7e0783 and then 7e0404 I got them to work. From then on they seem happy to accept all existing commands.
gattool reports:
[BE:16:71:00:18:91][LE]> primary
attr handle: 0x0001, end grp handle: 0x0003 uuid: 00001800-0000-1000-8000-00805f9b34fb
attr handle: 0x0004, end grp handle: 0x0009 uuid: 0000fff0-0000-1000-8000-00805f9b34fb
[BE:16:71:00:18:91][LE]> characteristics
handle: 0x0002, char properties: 0x12, char value handle: 0x0003, uuid: 00002a00-0000-1000-8000-00805f9b34fb
handle: 0x0005, char properties: 0x10, char value handle: 0x0006, uuid: 0000fff4-0000-1000-8000-00805f9b34fb
handle: 0x0008, char properties: 0x06, char value handle: 0x0009, uuid: 0000fff3-0000-1000-8000-00805f9b34fb
Here's the base64-encoded btsnoop log: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(save as melk.txt, then cat melk.txt | base64 -d > melk.log and open that in wireshark)
Any ideas what more you would need to support these?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels