Tuya's IR blasters, like the ZS08, have the ability to both learn and blast generic IR codes. These IR codes are given to the user as an opaque string, like this:
A/IEiwFAAwbJAfIE8gSLIAUBiwFAC+ADAwuLAfIE8gSLAckBRx9AB0ADBskB8gTyBIsgBQGLAUALA4sB8gRAB8ADBfIEiwHJAeARLwHJAeAFAwHyBOC5LwGLAeA97wOLAfIE4RcfBYsB8gTyBEAFAYsB4AcrCYsB8gTyBIsByQHgPY8DyQHyBOAHAwHyBEAX4BVfBIsB8gTJoAMF8gSLAckB4BUvAckB4AEDBfIEiwHJAQ==
Not much is known about the format of these IR code strings, which makes it difficult to use codes obtained through other means (such as a manual implementation of the IR protocol for a particular device, or public Internet code tables) with these blasters, as well as to use codes learnt through these blasters with other brands of blasters and study their contents.
So far I've only been able to find one person who dug into this before me, who was able to understand it enough to create their own codes to blast, but not enough to understand codes learnt by the device.
This document attempts to fully document the format and also provides a (hopefully) working Python implementation.
There is no standard for IR codes, so appliances use different methods to encode the data into an IR signal, often called "IR protocols". A popular one, which could be considered an unofficial standard, is the NEC protocol. NEC specifies a way to encode 16 bits as a series of pulses of modulated IR light, but it's just one protocol.
Tuya's IR blasters are meant to be generic and work with just about any protocol. To do that, they work at a lower level and record the IR signal directly instead of detecting a particular protocol and decoding the bits. In particular, the blaster records a binary signal like this one:
+------+ +----------+ +-+
| | | | | |
--+ +-----+ +--+ +---
Such a signal can be represented by noting the times at which the signal flips from low to high and viceversa. It is better to record the differences of these times as they will be smaller numbers. For example, the above signal is represented as:
[7, 6, 11, 3, 2]
Meaning, the signal stays high for 7 units of time, then low for 6 units of time, then high for 11 units, and so on. The first time is always for a high state, which means even times (2nd, 4th, 6th...) are always low periods while odd times (1st, 3rd, 5th...) are always high periods.
The blaster takes these numbers (in units of microseconds) and encodes each of them as a little-endian 16-bit integer, resulting in the following 10 bytes:
07 00 06 00 0B 00 03 00 02 00
Because we're recording a signal rather than high-level protocol data, this results in very long messages in real life. So, the blaster compresses these bytes using a weird algorithm (see below), and then encodes the resulting bytes using base64 so the user can copy/paste the code easily.
Update: Turns out this is FastLZ compression. No need to read this section, you can go to their website instead.
I was unable to find a public algorithm that matched this, so I'm
assuming it's a custom lossless compression algorithm that a
random Tuya employee hacked to make my life more complicated.
Jokes aside it seems to be doing a very poor job, and if I were
them I would've just used Huffman coding or something.
Anyway, the algorithm is LZ77-based, with a fixed 8kB window. The stream contains a series of blocks. Each block begins with a "header byte", and the 3 MSBs of this byte determine the type of block:
-
If the 3 bits are zero, then this is a literal block and the other 5 bits specify a length L minus one.
Upon encountering this block, the decoder consumes the next L bytes from the stream and emits them as output.
+---------+-----------------------------+ |000LLLLLL| 1..32 bytes, depending on L | +---------+-----------------------------+
-
If the 3 bits have any other value, then this is a length-distance pair block; the 3 bits specify a length L minus 2, and the concatenation of the other 5 bits with the next byte specifies a distance D minus 1.
Upon encountering this block, the decoder copies L bytes from the previous output. It begins copying D bytes before the output cursor, so if D = 1, the first copied byte is the most recently emitted byte; if D = 2, the byte before that one, and so on.
As usual, it may happen that L > D, in which case the output repeats as necessary (for example if L = 5 and D = 2, and the 2 last emitted bytes are X and Y, the decoder would emit XYXYX).
+--------+--------+ |LLLDDDDD|DDDDDDDD| +--------+--------+
As a special case, if the 3 bits are one, then there's an extra byte preceding the distance byte, which specifies a value to be added to L:
+--------+--------+--------+ |111DDDDD|LLLLLLLL|DDDDDDDD| +--------+--------+--------+
Yes they are custom, but they are not refined, and I am taking a break from the universal remote project for a few. If you're still interested I'm on Discord @burkminipup (I'm new to Github, so not sure how code sharing works).
I have 4 python scripts and a script in PATH for "brands" searching/downloading. Two for generating irdb codes to decimal, and 2 specifically for taking those outputs and generating them to Tuya using the script above. As mentioned in my last post, the scripts are only "fully" tested with NEC protocol, but could be re-written for more (I don't have the time to debug all 143 protocols).
The scripts are great for bulk code converting based on file path (you don't have to do it per CSV). They can also bulk convert an entire remote output to Tuya format (only using the specific output format provided through the scripts). The snippet above was the script for a specific remote (or CSV file).
Example for bulk testing when irdb has unknown or not very well documented labels for devices (pretty much a majority on irdb):
[This is where Enter and Ctrl+D were pressed]
[This is where I pressed Ctrl+D twice]
I have some scratch documentation that I will run through the steps to see if I can replicate it before any dissemination. This is just on a Proxmox Debian 12 Bookworm LXC, so I am unsure about other device compatibility.