esp-matter-mfg-tool helps generate the Matter compatible manufacturing and secure certificate partitions.
Manufacturing partition can contain the Matter specific data as well as it supports adding custom manufacturer specific data using csv files.
esp-matter-mfg-tool can be installed using package installer for Python
python3 -m pip install esp-matter-mfg-tool
Open the project configuration menu using -
cd <your_app>
idf.py menuconfig
In the configuration menu, set the following additional configuration to use custom factory partition and different values for Data and Device Info Providers.
-
Enable the
ESP32 Factory Data Provider
[Component config → CHIP Device Layer → Commissioning options → Use ESP32 Factory Data Provider] to use the ESP32-specific implementation of CommissionableDataProvider and DeviceAttestationCredentialsProvider. -
Enable the ESP32 Device Instance Info Provider options to get device instance info from the factory partition during attestation.
Enable
ENABLE_ESP32_DEVICE_INSTANCE_INFO_PROVIDER
[Component config → CHIP Device Layer → Commissioning options → Use ESP32 Device Instance Info Provider].Enable
FACTORY_DEVICE_INSTANCE_INFO_PROVIDER
[Component config → ESP Matter → Device Instance Info Provider options → Device Instance Info - Factory]. -
Enable either of the following options to use DAC certificates during attestion from a valid partition (the default is Attestation - Test):
Enable
FACTORY_PARTITION_DAC_PROVIDER
[Component config → ESP Matter → DAC Provider options → Attestation - Factory] to use DAC certificates from the factory partition.OR
Enable
SEC_CERT_DAC_PROVIDER
[Component config → ESP Matter → DAC Provider options → Attestation - Secure Cert] to use DAC certificates from the secure cert partition. -
Set the
chip-factory namespace partition label
[Component config → CHIP Device Layer → Matter Manufacturing Options → chip-factory namespace partition label] to choose the label of the partition to store key-values in the "chip-factory" namespace. The default partition label is nvs.
out
└── fff1_8000
├── 11fe2c53-9a38-445c-b58f-2ff0554cd981
│ ├── 11fe2c53-9a38-445c-b58f-2ff0554cd981-onb_codes.csv
│ ├── 11fe2c53-9a38-445c-b58f-2ff0554cd981-partition.bin
│ ├── 11fe2c53-9a38-445c-b58f-2ff0554cd981-qrcode.png
│ └── internal
│ ├── DAC_cert.der
│ ├── DAC_cert.pem
│ ├── DAC_key.pem
│ ├── DAC_private_key.bin
│ ├── DAC_public_key.bin
│ ├── PAI_cert.der
│ └── partition.csv
├── 14874525-30b5-4c66-a00e-30e4af5dfb20
│ ├── 14874525-30b5-4c66-a00e-30e4af5dfb20-onb_codes.csv
│ ├── 14874525-30b5-4c66-a00e-30e4af5dfb20-partition.bin
│ ├── 14874525-30b5-4c66-a00e-30e4af5dfb20-qrcode.png
│ └── internal
│ ├── DAC_cert.der
│ ├── DAC_cert.pem
│ ├── DAC_key.pem
│ ├── DAC_private_key.bin
│ ├── DAC_public_key.bin
│ ├── PAI_cert.der
│ └── partition.csv
└── staging
├── config.csv
├── master.csv
├── pai_cert.der
└── pin_disc.csv
Tool generates following output files:
- Partition Binary :
<uuid>-partition.bin
- Onboarding codes :
<uuid>-onb_codes.csv
- QR Code image :
<uuid>-qrcode.png
Other intermediate files are stored in internal/
directory:
- Partition CSV :
partition.csv
- PAI Certificate :
PAI_cert.der
- DAC Certificates :
DAC_cert.der
,DAC_cert.pem
- DAC Private Key :
DAC_private_key.bin
- DAC Public Key :
DAC_public_key.bin
Above files are stored at out/<vid_pid>/<UUID>
. Each device is identified with an unique UUID.
Common intermediate files are stored at out/<vid_pid>/staging
.
esp-matter-mfg-tool -h
lists the options.
Below commands uses the test PAI signing certificate and key, test certificate declaration present in Matter SDK, Vendor ID: 0xFFF2, and Product ID: 0x8001.
Export the Matter SDK path to simplify the certificate and key paths.
export MATTER_SDK_PATH=$ESP_MATTER_PATH/connectedhomeip/connectedhomeip
esp-matter-mfg-tool -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der
Generate a factory partition and store DAC certificate and private key in secure cert partition [Optional argument : --dac-in-secure-cert
and --target
]
esp-matter-mfg-tool -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der \
--dac-in-secure-cert --target esp32
NOTE: By default, DAC certificates and private key is stored in the NVS factory partition.
Generate a factory partition and store DAC certificate and private key in secure cert partition using DS Peripheral
esp-matter-mfg-tool -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der \
--dac-in-secure-cert --ds-peripheral --target esp32h2 --efuse-key-id 1
NOTE: Currently, only esp32h2 supports DS peripheral.
esp-matter-mfg-tool -n 5 -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der
Generate factory partition using existing DAC certificate and private key [Optional arguments : --dac-cert
and --dac-key
]
esp-matter-mfg-tool -cn "My Bulb" -v 0xFFF2 -p 0x8001 --pai \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der \
--dac-key DAC_key.pem --dac-cert DAC_cert.pem
Generate factory partitions using existing Passcode, Discriminator, and rotating device ID [Optional arguments : --passcode
, --discriminator
, and --rd-id-uid
]
esp-matter-mfg-tool -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der \
--passcode 20202021 --discriminator 3840 --enable-rotating-device-id --rd-id-uid d2f351f57bb9387445a5f92a601d1c14
- NOTE: Script generates only one factory partition if DAC or Discriminator or Passcode or Rotating-Device-ID is specified.
Generate factory partitions with extra NVS key-values specified using csv and mcsv file [Optional arguments : --csv
and --mcsv
]
esp-matter-mfg-tool -cn "My bulb" -v 0xFFF2 -p 0x8001 --pai \
-k $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Key.pem \
-c $MATTER_SDK_PATH/credentials/test/attestation/Chip-Test-PAI-FFF2-8001-Cert.pem \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der \
--csv extra_nvs_key_config.csv --mcsv extra_nvs_key_value.csv
Above command will generate n
number of partitions. Where n
is the rows in the mcsv file.
Output binary contains all the chip specific key/value and key/values specified using --csv
and --mcsv
option.
esp-matter-mfg-tool -v 0xFFF2 -p 0x8001 \
-cd $MATTER_SDK_PATH/credentials/test/certification-declaration/Chip-Test-CD-FFF2-8001.der
- NOTE: These factory partitions are only for firmwares with other ways to get the certificates and sign message with the private key.
Please note that esp-matter-mfg-tool
only generates manufacturing binary images which need to be flashed onto device using esptool.py
.
- Flashing a binary image to the device
esptool.py -p <serial_port> write_flash <address> path/to/<uuid>-partition.bin
- NOTE: First flash your app firmware and then followed by the custom partition binary on the device.
Please flash the manufacturing binary at the corresponding address of the configured factory partition set by
CHIP_FACTORY_NAMESPACE_PARTITION_LABEL
which by default isnvs
.
You can commission the device by using either -
- The QR code for Matter commissioners is generated at
out/<vid_pid>/<uuid>/<uuid>-qrcode.png
. If QR code is not visible, paste the below link into the browser replacing<qr_code>
with the QR code string (eg.MT:Y.K9042C00KA0648G00
- this is also the default test QR code) and scan the QR code.
https://project-chip.github.io/connectedhomeip/qrcode.html?data=<qr_code>
- Refer the docs
for other methods using onboarding payload found at
out/<vid_pid>/<uuid>/<uuid>-onb_codes.csv
. This contains theQR Code String, Manual Pairing Code, Passcode and Discriminator
.
Below are the steps for encrypting the application and factory partition but before proceeding further please READ THE DOCS FIRST. Documentation References:
Provide -e
option along with other options to generate the encrypted NVS partition binary.
It will generate additional partition binary (<uuid>-keys-partition.bin
) containing the key for decrypting encrypted partition.
- Flash the partition binary containing factory data, as NVS encryption works differently, please flash is without
--encrypt
option
esptool.py -p (PORT) write_flash (FACTORY_PARTITION_ADDR) path/to/factory_partition.bin
- Flash the partition binary containing encryption keys, these SHALL be flashed with
--encrypt
option
esptool.py -p (PORT) write_flash --encrypt (NVS_KEYS_PARTITION_ADDR) path/to/nvs_key_partition.bin