Table Of Contents
Chapter 01 — Introduction
Chapter 02 — Architecture
Chapter 03 — Cryptographic Primitives
Chapter 04 — Secure Channel
Chapter 05 — Commissioning
Chapter 06 — Device Attestation
Chapter 07 — Data Model Document
Chapter 08 — Interaction Model
Chapter 09 — System Model
Chapter 10 — Interaction Encoding
Chapter 11 — Device Management
Chapter 12 — Multiple Fabrics
Chapter 13 — Security Requirements
1 | Introduction | 4 | Secure Channel | |
1.1. | Scope and Purpose | 4.1. | General Description | |
1.2. | Acronyms and Abbreviations | 4.1.1. | Messages | |
1.3. | Definitions | 4.2. | IPv6 Reachability | |
1.4. | Standards Terminology Mapping | 4.2.1. | Stub Router Behavior | |
1.5. | Conformance Levels | 4.2.2. | Matter Node Behavior | |
1.6. | References | 4.3. | Discovery | |
1.6.1. | CSA Reference Documents | 4.3.1. | Commissionable Node Discovery | |
1.6.2. | External Reference Documents | 4.3.2. | Operational Discovery | |
1.7. | Informative References | 4.3.3. | Commissioner Discovery | |
1.7.1. | CSA Reference Documents | 4.3.4. | Common TXT Key/Value Pairs | |
1.8. | Conventions | 4.4. | Message Frame Format | |
1.8.1. | Enumerations and Reserved Values | 4.4.1. | Message Header Field Descriptions | |
1.8.2. | Reserved Bit Fields | 4.4.2. | Message Footer Field Descriptions | |
1.8.3. | Number Format | 4.4.3. | Protocol Header Field Descriptions | |
1.8.4. | Provisional | 4.4.4. | Message Size Requirements | |
4.5. | Message Counters | |||
4.5.1. | Message Counter Types | |||
2 | Architecture | 4.5.2. | Secure Session Message Counters | |
2.1. | Overview | 4.5.3. | Message Counters as Encryption Nonces | |
2.2. | Layered Architecture | 4.5.4. | Replay Prevention and Duplicate Message Detection | |
2.3. | Network Topology | 4.5.5. | Counter Processing of Outgoing Messages | |
2.3.1. | Single network | 4.5.6. | Counter Processing of Incoming Messages | |
2.3.2. | Star network topology | 4.6. | Message Processing | |
2.4. | Scoped names | 4.6.1. | Message Transmission | |
2.5. | Identifiers | 4.6.2. | Message Reception | |
2.5.1. | Fabric References and Fabric Identifier | 4.7. | Message Security | |
2.5.2. | Vendor Identifier (Vendor ID, VID) | 4.7.1. | Data confidentiality and integrity with data origin authentication parameters | |
2.5.3. | Product Identifier (Product ID, PID) | 4.7.2. | Security Processing of Outgoing Messages | |
2.5.4. | Group Identifier (GID) | 4.7.3. | Security Processing of Incoming Messages | |
2.5.5. | Node Identifier | 4.8. | Message Privacy | |
2.5.6. | IPv6 Addressing | 4.8.1. | Privacy Key | |
2.6. | Device identity | 4.8.2. | Privacy Nonce | |
2.7. | Security | 4.8.3. | Privacy Processing of Outgoing Messages | |
2.8. | Device Commissioning | 4.8.4. | Privacy Processing of Incoming Messages | |
2.9. | Sleepy End Device (SED) | 4.9. | Message Exchanges | |
2.10. | Data Model Root | 4.9.1. | Exchange Role | |
2.11. | Stack Limits | 4.9.2. | Exchange ID | |
2.11.1. | System Model Limits | 4.9.3. | Exchange Context | |
2.11.2. | Interaction Model Limits | 4.9.4. | Exchange Message Dispatch | |
2.12. | List of Provisional Items | 4.9.5. | Exchange Message Processing | |
2.12.1. | Invoke Multiple Paths | 4.10. | Secure Channel Protocol | |
2.12.2. | EventList Global Attribute | 4.10.1. | Secure Channel Protocol Messages | |
2.12.3. | Proxy Service | 4.10.2. | Parameters and Constants | |
2.12.4. | Time Synchronization | 4.11. | Message Reliability Protocol (MRP) | |
2.12.5. | Diagnostics Logs Cluster | 4.11.1. | Reliable Messaging Header Fields | |
2.12.6. | Parameters and Constants | 4.11.2. | Reliable transfer | |
4.11.3. | Peer Exchange Management | |||
4.11.4. | Transport Considerations | |||
3 | Cryptographic Primitives | 4.11.5. | Reliable Message Processing | |
3.1. | Deterministic Random Bit Generator (DRBG) | 4.11.6. | Reliable Message State | |
3.2. | True Random Number Generator (TRNG) | 4.11.7. | MRP Messages | |
3.3. | Hash function (Hash) | 4.11.8. | Parameters and Constants | |
3.4. | Keyed-Hash Message Authentication Code (HMAC) | 4.12. | Unicast Communication | |
3.5. | Public Key Cryptography | 4.12.1. | Session Establishment Phase | |
3.5.1. | Group | 4.12.2. | Application Data Phase | |
3.5.2. | Key generation | 4.13. | Session Establishment | |
3.5.3. | Signature and verification | 4.13.1. | Passcode-Authenticated Session Establishment (PASE) | |
3.5.4. | ECDH | 4.13.2. | Certificate Authenticated Session Establishment (CASE) | |
3.5.5. | Certificate validation | 4.14. | Group Communication | |
3.5.6. | Time and date considerations for certificate path validation | 4.14.1. | Groupcast Session Context | |
3.6. | Data Confidentiality and Integrity | 4.14.2. | Sending a group message | |
3.6.1. | Generate and encrypt | 4.14.3. | Receiving a group message | |
3.6.2. | Decrypt and verify | 4.15. | Group Key Management | |
3.7. | Message privacy | 4.15.1. | Operational Groups | |
3.7.1. | Privacy encryption | 4.15.2. | Operational Group Key Derivation | |
3.7.2. | Privacy decryption | 4.15.3. | Epoch Keys | |
3.8. | Key Derivation Function (KDF) | 4.15.4. | Distribution of Key Material | |
3.9. | Password-Based Key Derivation Function (PBKDF) | 4.16. | Message Counter Synchronization Protocol (MCSP) | |
3.10. | Password-Authenticated Key Exchange (PAKE) | 4.16.1. | Message Counter Synchronization Methods | |
3.10.1. | Computation of pA | 4.16.2. | Group Peer State | |
3.10.2. | Computation of pB | 4.16.3. | MCSP Messages | |
3.10.3. | Computation of transcript TT | 4.16.4. | Unsynchronized Message Processing | |
3.10.4. | Computation of cA, cB and Ke | 4.16.5. | Message Counter Synchronization Exchange | |
3.8. | Key Derivation Function (KDF) | 4.16.6. | Message Counter Synchronization Session Context | |
3.9. | Password-Based Key Derivation Function (PBKDF) | 4.16.7. | Sequence Diagram | |
3.10. | Password-Authenticated Key Exchange (PAKE) | 4.17. | Bluetooth Transport Protocol (BTP) | |
3.10.1. | Computation of pA | 4.17.1. | BTP Session Interface | |
3.10.2. | Computation of pB | 4.17.2. | BTP Frame Formats | |
3.10.3. | Computation of transcript TT | 4.17.3. | BTP GATT Service | |
3.10.4. | Computation of cA, cB and Ke | 4.17.4. | Parameters and Constants | |
4.17.5. | Bluetooth SIG Considerations | |||
5 | Commissioning | |||
5.1. | Onboarding Payload | 6 | Device Attestation and Operational Credentials | |
5.1.1. | Onboarding Payload Contents | 6.1. | Common Conventions | |
5.1.2. | Onboarding Material Representation | 6.1.1. | Encoding of Matter-specific RDNs | |
5.1.3. | QR Code | 6.1.2. | Key Identifier Extension Constraints | |
5.1.4. | Manual Pairing Code | 6.1.3. | Certificate Sizes | |
5.1.5. | TLV Content | 6.1.4. | Presentation of example certificates | |
5.1.6. | Concatenation | 6.2. | Device Attestation | |
5.1.7. | Generation of the Passcode | 6.2.1. | Introduction | |
5.1.8. | NFC Tag | 6.2.2. | Device Attestation Certificate (DAC) | |
5.2. | Initiating Commissioning | 6.2.3. | Device Attestation Procedure | |
5.2.1. | Purpose and Scope | 6.3. | Certification Declaration | |
5.2.2. | User Journey Details | 6.3.1. | Certification Declaration (CD) Format | |
5.3. | User Directed Commissioning | 6.3.2. | Firmware Information | |
5.3.1. | Overview | 6.3.3. | Firmware information validation examples | |
5.3.2. | UDC Protocol Messages | 6.4. | Node Operational Credentials Specification | |
5.3.3. | Message format | 6.4.1. | Introduction | |
5.3.4. | Message Exchanges | 6.4.2. | Node Operational Credentials Management | |
5.3.5. | IdentificationDeclaration Message | 6.4.3. | Node Operational Identifier Composition | |
5.4. | Device Discovery | 6.4.4. | Node Operational Key Pair | |
5.4.1. | Purpose and Scope | 6.4.5. | Node Operational Credentials Certificates | |
5.4.2. | Announcement by Device | 6.4.6. | Node Operational Credentials Procedure | |
5.4.3. | Discovery by Commissioner | 6.4.7. | Node Operational Certificate Signing Request (NOCSR) | |
5.5. | Commissioning Flows | 6.4.8. | Node Operational Certificate Renewal | |
5.5.1. | Commissioning Flows Error Handling | 6.4.9. | Node Operational Certificate Revocation | |
5.5.2. | Commissioning Flow Diagrams | 6.4.10. | Security Considerations | |
5.6. | Administrator Assisted Commissioning Flows | 6.5. | Operational Certificate Encoding | |
5.6.1. | Introduction | 6.5.1. | Introduction | |
5.6.2. | Basic Commissioning Method (BCM) | 6.5.2. | Matter certificate | |
5.6.3. | Enhanced Commissioning Method (ECM) | 6.5.3. | Version Number | |
5.6.4. | Open Commissioning Window | 6.5.4. | Serial Number | |
5.7. | Device Commissioning Flows | 6.5.5. | Signature Algorithm | |
5.7.1. | Standard Commissioning Flow | 6.5.6. | Issuer and Subject | |
5.7.2. | User-Intent Commissioning Flow | 6.5.7. | Validity | |
5.7.3. | Custom Commissioning Flow | 6.5.8. | Public Key Algorithm | |
5.7.4. | Manual Pairing Code and QR Code Inclusion | 6.5.9. | EC Curve Identifier | |
5.8. | In-field Upgrade to Matter | 6.5.10. | Public Key | |
6.5.11. | Extensions | |||
6.5.12. | Matter certificate Extensions Encoding Rules | |||
7 | Data Model Specification | 6.5.13. | Signature | |
7.1. | Practical Information | 6.5.14. | Invalid Matter certificates | |
7.1.1. | Revision History | 6.5.15. | Examples | |
7.1.2. | Scope & Purpose | 6.6. | Access Control | |
7.1.3. | Origin Story | 6.6.1. | Scope and Purpose | |
7.1.4. | Overview | 6.6.2. | Model | |
7.1.5. | Glossary | 6.6.3. | Access Control List Examples | |
7.1.6. | Conventions | 6.6.4. | Access Control Cluster update side-effects | |
7.1.7. | Reserved Bit Fields | 6.6.5. | Conceptual Access Control Privilege Granting Algorithm | |
7.2. | Data Qualities | 6.6.6. | Applying Privileges to Action Paths | |
7.2.1. | Common Data Table Columns | |||
7.2.2. | Description Section | |||
7.2.3. | Other Data Table Columns | 8 | Interaction Model Specification | |
7.3. | Conformance | 8.1. | Practical Information | |
7.3.1. | Optional | 8.1.1. | Revision History | |
7.3.2. | Provisional | 8.1.2. | Scope & Purpose | |
7.3.3. | Mandatory | 8.1.3. | Origin Story | |
7.3.4. | Disallowed | 8.1.4. | Purpose | |
7.3.5. | Deprecated | 8.1.5. | Glossary | |
7.3.6. | Exclusivity | 8.1.6. | Conventions & Conformance | |
7.3.7. | List | 8.2. | Concepts | |
7.3.8. | Expressions and Optionality | 8.2.1. | Path | |
7.3.9. | Choice | 8.2.2. | Interaction | |
7.3.10. | Blank Conformance | 8.2.3. | Transaction | |
7.3.11. | Feature Conformance | 8.2.4. | Action | |
7.4. | Element | 8.2.5. | Common Action Behavior | |
7.4.1. | Encoded Element Processing | 8.3. | Status and Interaction | |
7.5. | Fabric | 8.3.1. | Status Response Action | |
7.5.1. | Accessing Fabric | 8.4. | Read Interaction | |
7.5.2. | Fabric-Index | 8.4.1. | Read Transaction | |
7.5.3. | Fabric-Scoped Data | 8.4.2. | Read Request Action | |
7.5.4. | Fabric-Scoped IDs | 8.4.3. | Report Data Action | |
7.6. | Access | 8.5. | Subscribe Interaction | |
7.6.1. | Read Access | 8.5.1. | Subscribe Transaction | |
7.6.2. | Write Access | 8.5.2. | Subscribe Request Action | |
7.6.3. | Invoke Access | 8.5.3. | Subscribe Response Action | |
7.6.4. | Fabric-Scoped Quality | 8.6. | Report Transaction | |
7.6.5. | Fabric-Sensitive Quality | 8.6.1. | Report Transaction Non-Empty | |
7.6.6. | View Privilege | 8.6.2. | Report Transaction Empty | |
7.6.7. | Operate Privilege | 8.7. | Write Interaction | |
7.6.8. | Manage Privilege | 8.7.1. | Write Transaction | |
7.6.9. | Administer Privilege | 8.7.2. | Write Request Action | |
7.6.10. | Timed Interaction | 8.7.3. | Write Response Action | |
7.7. | Other Qualities | 8.7.4. | Timed Request Action | |
7.7.1. | Nullable Quality | 8.8. | Invoke Interaction | |
7.7.2. | Non-Volatile Quality | 8.8.1. | Invoke Transaction | |
7.7.3. | Fixed Quality | 8.8.2. | Invoke Request Action | |
7.7.4. | Scene Quality | 8.8.3. | Invoke Response Action | |
7.7.5. | Reportable Quality | 8.9. | Common Action Information Blocks and Paths | |
7.7.6. | Changes Omitted Quality | 8.9.1. | Path Information | |
7.7.7. | Singleton | 8.9.2. | Attribute Information Blocks | |
7.8. | Node | 8.9.3. | Event Information Blocks and Paths | |
7.9. | Endpoint | 8.9.4. | Command Information Blocks and Paths | |
7.10. | Cluster | 8.9.5. | Status Information Blocks and Paths | |
7.10.1. | Cluster Revision | 8.10. | Status Codes | |
7.10.2. | Cluster Optional Features | 8.10.1. | Status Code Table | |
7.10.3. | Cluster Data Version | |||
7.10.4. | New Cluster | |||
7.10.5. | Cluster Aliasing | 9 | System Model Specification | |
7.10.6. | Cluster Inheritance | 9.1. | Practical Information | |
7.10.7. | Status Codes | 9.1.1. | Revision History | |
7.10.8. | Cluster Classification | 9.1.2. | Scope and Purpose | |
7.11. | Command | 9.1.3. | Origin Story | |
7.11.1. | Command Fields | 9.1.4. | Overview | |
7.12. | Attribute | 9.2. | Endpoint Composition | |
7.12.1. | Persistence | 9.2.1. | Dynamic Endpoint allocation | |
7.13. | Global Elements | 9.3. | Interaction Model Relationships | |
7.13.1. | ClusterRevision Attribute | 9.3.1. | Subscription | |
7.13.2. | FeatureMap Attribute | 9.4. | Binding Relationship | |
7.13.3. | AttributeList Attribute | 9.5. | Descriptor Cluster | |
7.13.4. | AcceptedCommandList Attribute | 9.5.1. | Revision History | |
7.13.5. | GeneratedCommandList Attribute | 9.5.2. | Classification | |
7.13.6. | EventList Attribute | 9.5.3. | Cluster ID | |
7.13.7. | FabricIndex Field | 9.5.4. | Data Types | |
7.14. | Event | 9.5.5. | Attributes | |
7.14.1. | Priority | 9.6. | Binding Cluster | |
7.14.2. | Event Record | 9.6.1. | Binding Mutation | |
7.14.3. | Buffering | 9.6.2. | Revision History | |
7.14.4. | Event Filtering | 9.6.3. | Classification | |
7.14.5. | Fabric-Sensitive Event | 9.6.4. | Cluster ID | |
7.15. | Device Type | 9.6.5. | Data Types | |
7.15.1. | Device Type Revision | 9.6.6. | Attributes | |
7.15.2. | Device Type Composition | 9.7. | Label Cluster | |
7.15.3. | Device Type Classification | 9.7.1. | Revision History | |
7.15.4. | Extra Clusters on an Endpoint | 9.7.2. | Classification | |
7.16. | Non-Standard | 9.7.3. | Cluster ID | |
7.17. | Data Field | 9.7.4. | Data Types | |
7.17.1. | Nullable | 9.7.5. | Attributes | |
7.17.2. | Optional or Deprecated | 9.8. | Fixed Label Cluster | |
7.17.3. | Constraint & Value | 9.8.1. | Revision History | |
7.17.4. | Default Column | 9.8.2. | Classification | |
7.18. | Data Types | 9.8.3. | Cluster ID | |
7.18.1. | Base Data Types | 9.8.4. | Attributes | |
7.18.2. | Derived Data Types | 9.9. | User Label Cluster | |
7.19. | Manufacturer Specific Extensions | 9.9.1. | Revision History | |
7.19.1. | Manufacturer Extensible Identifiers | 9.9.2. | Classification | |
7.19.2. | Manufacturer Extensible Identifier (MEI) | 9.9.3. | Cluster ID | |
7.19.3. | Manufacturer Extensions | 9.9.4. | Attributes | |
7.19.4. | Discoverability | 9.10. | Access Control Cluster | |
9.10.1. | Revision History | |||
9.10.2. | Classification | |||
10 | Interaction Encoding | 9.10.3. | Cluster ID | |
10.1. | Overview | 9.10.4. | Data Types | |
10.2. | Messages | 9.10.5. | Attributes | |
10.2.1. | IM Protocol Messages | 9.10.6. | Error handling | |
10.2.2. | Common Action Information Encoding | 9.10.7. | Events | |
10.2.3. | Chunking | 9.11. | Group Relationship | |
10.2.4. | Transaction Flows | 9.12. | Bridge for non-Matter devices | |
10.3. | Data Types | 9.12.1. | Introduction | |
10.3.1. | Analog – Integer | 9.12.2. | Exposing functionality and metadata of Bridged Devices | |
10.3.2. | Analog – Floating Point | 9.12.3. | Discovery of Bridged Devices | |
10.3.3. | Discrete – Enumeration | 9.12.4. | Configuration of Bridged Devices | |
10.3.4. | Discrete – Bitmap | 9.12.5. | New features for Bridged Devices | |
10.3.5. | Composite – String | 9.12.6. | Changes to the set of Bridged Devices | |
10.3.6. | Composite – Octet String | 9.12.7. | Changes to device names and grouping of Bridged Devices | |
10.3.7. | Collection – Struct | 9.12.8. | Setup flow for a Bridge (plus Bridged Devices) | |
10.3.8. | Collection – List | 9.12.9. | Access Control | |
10.3.9. | Derived Types | 9.12.10. | Software update (OTA) | |
10.3.10. | Field IDs | 9.12.11. | Best practices for Bridge Manufacturers | |
10.4. | Sample Cluster | 9.12.12. | Best practices for Administrators | |
10.4.1. | Disco Ball Cluster | 9.13. | Bridged Device Basic Information Cluster | |
10.4.2. | Super Disco Ball Cluster | 9.13.1. | Revision History | |
10.5. | Information Blocks | 9.13.2. | Classification | |
10.5.1. | Tag Rules | 9.13.3. | Cluster ID | |
10.5.2. | AttributePathIB | 9.13.4. | Attributes | |
10.5.3. | DataVersionFilterIB | 9.13.5. | Events | |
10.5.4. | AttributeDataIB | 9.14. | Actions Cluster | |
10.5.5. | AttributeReportIB | 9.14.1. | Revision History | |
10.5.6. | EventFilterIB | 9.14.2. | Classification | |
10.5.7. | ClusterPathIB | 9.14.3. | Cluster ID | |
10.5.8. | EventPathIB | 9.14.4. | Data Types | |
10.5.9. | EventDataIB | 9.14.5. | Attributes | |
10.5.10. | EventReportIB | 9.14.6. | Commands | |
10.5.11. | CommandPathIB | 9.14.7. | Events | |
10.5.12. | CommandDataIB | 9.14.8. | Examples | |
10.5.13. | InvokeResponseIB | 9.15. | Proxy Architecture | |
10.5.14. | CommandStatusIB | 9.15.1. | Motivation | |
10.5.15. | EventStatusIB | 9.15.2. | Subscription Proxy: Overview | |
10.5.16. | AttributeStatusIB | 9.15.3. | Composition & Paths | |
10.5.17. | StatusIB | 9.15.4. | Proxy Subscriptions | |
9.15.5. | Schemas and Data Serialization/Deserialization | |||
9.15.6. | Indirect Proxies | |||
11 | Service and Device Management | 9.15.7. | Proxy Discovery & Assignment Flow | |
11.1. | Basic Information Cluster | 9.15.8. | Constraints | |
11.1.1. | Revision History | 9.15.9. | Certification | |
11.1.2. | Classification | 9.15.10. | Security & Privacy | |
11.1.3. | Cluster ID | 9.15.11. | Parameters and Constants | |
11.1.4. | Data Types | 9.15.12. | Clusters | |
11.1.5. | Attributes | 9.15.13. | Proxy Discovery Cluster | |
11.1.6. | Events | 9.15.14. | Proxy Configuration Cluster | |
11.2. | Group Key Management Cluster | 9.15.15. | Valid Proxies Cluster | |
11.2.1. | Scope & Purpose | |||
11.2.2. | Revision History | |||
11.2.3. | Classification | 12 | Multiple Fabrics | |
11.2.4. | Cluster ID | 12.1. | Multiple Fabrics | |
11.2.5. | Features | 12.1.1. | Introduction | |
11.2.6. | Data Types | 12.1.2. | User Consent | |
11.2.7. | Attributes | 12.1.3. | Administrator-Assisted Commissioning Method | |
11.2.8. | Commands | 12.1.4. | Node Behavior | |
11.3. | Localization Configuration Cluster | |||
11.3.1. | Revision History | 13 | Security Requirements | |
11.3.2. | Classification | 13.1. | Overview | |
11.3.3. | Cluster ID | 13.2. | Device vs. Node | |
11.3.4. | Attributes | 13.3. | Commissioning | |
11.4. | Time Format Localization Cluster | 13.4. | Factory Reset | |
11.4.1. | Revision History | 13.5. | Firmware | |
11.4.2. | Classification | 13.6. | Security Best Practices | |
11.4.3. | Cluster ID | 13.6.1. | Cryptography | |
11.4.4. | Features | 13.6.2. | Commissioning | |
11.4.5. | Data Types | 13.6.3. | Firmware | |
11.4.6. | Attributes | 13.6.4. | Manufacturing | |
11.5. | Unit Localization Cluster | 13.6.5. | Resiliency | |
11.5.1. | Revision History | 13.6.6. | Battery Powered Devices | |
11.5.2. | Classification | 13.6.7. | Tamper Resistance | |
11.5.3. | Cluster ID | 13.6.8. | Bridging | |
11.5.4. | Features | 13.6.9. | Distributed Compliance Ledger | |
11.5.5. | Data Types | 13.7. | Threats and Countermeasures | |
11.5.6. | Attributes | |||
11.6. | Power Source Configuration Cluster | |||
11.6.1. | Revision History | Appendix A: Tag-length-value (TLV) Encoding Format | ||
11.6.2. | Classification | A.1. | Scope & Purpose | |
11.6.3. | Cluster ID | A.2. | Tags | |
11.6.4. | Attributes | A.2.1. | Profile-Specific Tags | |
11.7. | Power Source Cluster | A.2.2. | Context-Specific Tags | |
11.7.1. | Revision History | A.2.3. | Anonymous Tags | |
11.7.2. | Classification | A.2.4. | Canonical Ordering of Tags | |
11.7.3. | Cluster ID | A.3. | Lengths | |
11.7.4. | Features | A.4. | Primitive Types | |
11.7.5. | Data Types | A.5. | Container Types | |
11.7.6. | Attributes | A.5.1. | Structures | |
11.7.7. | Events | A.5.2. | Arrays | |
11.7.8. | Configuration Examples | A.5.3. | Lists | |
11.8. | Network Commissioning Cluster | A.6. | Element Encoding | |
11.8.1. | Revision History | A.7. | Control Octet Encoding | |
11.8.2. | Classification | A.7.1. | Element Type Field | |
11.8.3. | Cluster ID | A.7.2. | Tag Control Field | |
11.8.4. | Features | A.8. | Tag Encoding | |
11.8.5. | Data Types | A.8.1. | Fully-Qualified Tag Form | |
11.8.6. | Attributes | A.8.2. | Implicit Profile Tag Form | |
11.8.7. | Commands | A.8.3. | Common Profile Tag Form | |
11.8.8. | Usage of networking configurations | A.8.4. | Context-Specific Tag Form | |
11.9. | General Commissioning Cluster | A.8.5. | Anonymous Tag Form | |
11.9.1. | Revision History | A.9. | Length Encoding | |
11.9.2. | Classification | A.10. | End of Container Encoding | |
11.9.3. | Cluster ID | A.11. | Value Encodings | |
11.9.4. | Data Types | A.11.1. | Integers | |
11.9.5. | Attributes | A.11.2. | UTF-8 and Octet Strings | |
11.9.6. | Commands | A.11.3. | Booleans | |
11.10. | Diagnostic Logs Cluster | A.11.4. | Arrays, Structures and Lists | |
11.10.1. | Revision History | A.11.5. | Floating Point Numbers | |
11.10.2. | Classification | A.11.6. | Nulls | |
11.10.3. | Cluster ID | A.12. | TLV Encoding Examples | |
11.10.4. | Data Types | |||
11.10.5. | Commands | |||
11.11. | General Diagnostics Cluster | Appendix B: Tag-length-value (TLV) Schema Definitions | ||
11.11.1. | Revision History | B.1. | Introduction | |
11.11.2. | Classification | B.1.1. | Basic Structure | |
11.11.3. | Cluster ID | B.1.2. | Keywords | |
11.11.4. | Data Types | B.1.3. | Naming | |
11.11.5. | Status Codes | B.1.4. | Namespaces | |
11.11.6. | Attributes | B.1.5. | Qualifiers | |
11.11.7. | Commands | B.1.6. | Tagging | |
11.11.8. | Events | B.2. | Definitions | |
11.12. | Software Diagnostics Cluster | B.2.1. | Type Definition (type-def ) | |
11.12.1. | Revision History | B.2.2. | FIELD GROUP Definition (field-group-def ) | |
11.12.2. | Classification | B.2.3. | Namespace Definition (namespace-def ) | |
11.12.3. | Cluster ID | B.2.4. | PROTOCOL Definition (protocol-def ) | |
11.12.4. | Features | B.2.5. | VENDOR Definition (vendor-def ) | |
11.12.5. | Data Types | B.3. | Types | |
11.12.6. | Attributes | B.3.1. | ARRAY / ARRAY OF | |
11.12.7. | Commands | B.3.2. | BOOLEAN | |
11.12.8. | Events | B.3.3. | FLOAT32 / FLOAT64 | |
11.13. | Thread Network Diagnostics Cluster | B.3.4. | SIGNED INTEGER / UNSIGNED INTEGER | |
11.13.1. | Revision History | B.3.5. | LIST / LIST OF | |
11.13.2. | Classification | B.3.6. | OCTET STRING | |
11.13.3. | Cluster ID | B.3.7. | NULL | |
11.13.4. | Features | B.3.8. | STRING | |
11.13.5. | Data Types | B.3.9. | STRUCTURE | |
11.13.6. | Attributes | B.4. | Pseudo-Types | |
11.13.7. | Commands | B.4.1. | ANY | |
11.13.8. | Events | B.4.2. | CHOICE OF | |
11.14. | Wi-Fi Network Diagnostics Cluster | B.5. | Qualifiers | |
11.14.1. | Revision History | B.5.1. | any-order / schema-order / tag-order | |
11.14.2. | Classification | B.5.2. | extensible | |
11.14.3. | Cluster ID | B.5.3. | id | |
11.14.4. | Features | B.5.4. | length | |
11.14.5. | Data Types | B.5.5. | nullable | |
11.14.6. | Attributes | B.5.6. | optional | |
11.14.7. | Commands | B.5.7. | range | |
11.14.8. | Events | B.5.8. | tag | |
11.15. | Ethernet Network Diagnostics Cluster | B.5.9. | Documentation and Comments | |
11.15.1. | Revision History | |||
11.15.2. | Classification | |||
11.15.3. | Cluster ID |
Appendix C: Tag-length-value (TLV) Payload Text Representation Format |
||
11.15.4. | Features | C.1. | Introduction | |
11.15.5. | Data Types | C.2. | Format Specification | |
11.15.6. | Attributes | C.2.1. | Tag/Value | |
11.15.7. | Commands | C.2.2. | Context-Specific Tags | |
11.16. | Time Synchronization Cluster | C.2.3. | Protocol-Specific Tags | |
11.16.1. | Revision History | C.2.4. | Anonymous Tags | |
11.16.2. | Classification | C.2.5. | Primitive Types | |
11.16.3. | Cluster ID | C.2.6. | Complex Types: Structure | |
11.16.4. | Terminology | C.2.7. | Complex Types: Arrays | |
11.16.5. | Features | C.2.8. | Complex Types: List | |
11.16.6. | Data Types | C.3. | Examples | |
11.16.7. | Status Codes | C.3.1. | TLV Schema | |
11.16.8. | Attributes | C.3.2. | TLV Payloads | |
11.16.9. | Commands | |||
11.16.10. | Events | |||
11.16.11. | Time Synchronization at Commissioning | Appendix D: Status Report Messages | ||
11.16.12. | Time Synchronization during operation | D.1. | Overview | |
11.16.13. | Time source prioritization | D.2. | Status Report elements | |
11.16.14. | Time synchronization maintenance | D.3. | Message Format | |
11.16.15. | Acting as an NTP Server | D.3.1. | General status codes (GeneralCode) | |
11.16.16. | Implementation Guidance | D.3.2. | Protocol-specific codes (ProtocolId and ProtocolCode) | |
11.17. | Node Operational Credentials Cluster | D.3.3. | Protocol-specific data (ProtocolData) | |
11.17.1. | Revision History | D.4. | Presenting StatusReport messages in protocol specifications | |
11.17.2. | Classification | |||
11.17.3. | Cluster ID | |||
11.17.4. | Data Types | Appendix E: Matter-Specific ASN.1 Object Identifiers (OIDs) | ||
11.17.5. | Attributes | |||
11.17.6. | Commands | |||
11.18. | Administrator Commissioning Cluster | Appendix F: Cryptographic test vectors for some procedures | ||
11.18.1. | Revision History | F.1. | Certification Declaration CMS test vector | |
11.18.2. | Classification | F.2. | Device Attestation Response test vector | |
11.18.3. | Cluster ID | F.3. | Node Operational CSR Response test vector | |
11.18.4. | Features | Appendix G: Minimal Resource Requirements | ||
11.18.5. | Data Types | |||
11.18.6. | Status Codes | |||
11.18.7. | Attributes | |||
11.18.8. | Commands | |||
11.19. | Over-the-Air (OTA) Software Update | |||
11.19.1. | Scope & Purpose | |||
11.19.2. | Functional overview | |||
11.19.3. | Software update workflow | |||
11.19.4. | Security considerations | |||
11.19.5. | Some special situations | |||
11.19.6. | OTA Software Update Provider Cluster | |||
11.19.7. | OTA Software Update Requestor Cluster | |||
11.20. | Over-the-Air (OTA) Software Update File Format | |||
11.20.1. | Scope & Purpose | |||
11.20.2. | General Structure | |||
11.20.3. | Security considerations | |||
11.21. | Bulk Data Exchange Protocol (BDX) | |||
11.21.1. | Overview | |||
11.21.2. | Terminology | |||
11.21.3. | Protocol Opcodes and Status Report Values | |||
11.21.4. | Security and Transport Constraints | |||
11.21.5. | Transfer Management Messages | |||
11.21.6. | Data Transfer Messages | |||
11.21.7. | Synchronous Transfers Message Flows | |||
11.21.8. | Asynchronous Tranfers Message Flows | |||
11.22. | Distributed Compliance Ledger | |||
11.22.1. | Scope & Purpose | |||
11.22.2. | Schemas | |||
11.22.3. | Vendor Schema | |||
11.22.4. | PAA Schema | |||
11.22.5. | DeviceModel Schema | |||
11.22.6. | DeviceSoftwareVersionModel Schema | |||
11.22.7. | DeviceSoftwareCompliance / Compliance test result Schema | |||
11.22.8. | APIs / CLI |