@@ -49,7 +49,7 @@ network.
49
49
50
50
## Introduction
51
51
52
- ![ K32W061 DK6] ( ../../../platform/ nxp/k32w0/doc/images/k32w-dk6.jpg )
52
+ ![ K32W061 DK6] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/doc/images/k32w-dk6.jpg )
53
53
54
54
The K32W061 contact sensor example application provides a working demonstration
55
55
of a connected contact sensor device, built using the Project CHIP codebase and
@@ -79,7 +79,7 @@ Deployment of this firmware configuration requires the K32W061 board setups
79
79
using the K32W061 module board, SE051 Expansion board and Generic Expansion
80
80
board as shown below:
81
81
82
- ![ SE051H + K32W061 DK6] ( ../../../platform/ nxp/k32w0/doc/images/k32w-se.jpg )
82
+ ![ SE051H + K32W061 DK6] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/doc/images/k32w-se.jpg )
83
83
84
84
The SE051H Secure Element extension may be used for best in class security and
85
85
offloading some of the Project CHIP cryptographic operations. Depending on your
@@ -356,17 +356,17 @@ See
356
356
[ Guide for writing manufacturing data on NXP devices] ( ../../../../docs/guides/nxp/nxp_manufacturing_flow.md ) .
357
357
358
358
There are factory data generated binaries available in
359
- examples/platform/nxp/ k32w0/scripts/demo_generated_factory_data folder.
359
+ ` third_party/nxp/nxp_matter_support/ examples/platform/k32w0/scripts/demo_generated_factory_data` folder.
360
360
These are based on the DAC, PAI and PAA certificates found in
361
361
scripts/tools/nxp/demo_generated_certs folder. The demo_factory_data_dut1.bin
362
362
uses the DAC certificate and private key found in
363
- examples/platform/nxp/ k32w0/scripts/demo_generated_factory_data/dac/dut1
363
+ ` third_party/nxp/nxp_matter_support/ examples/platform/k32w0/scripts/demo_generated_factory_data/dac/dut1`
364
364
folder. The demo_factory_data_dut2.bin uses the DAC certificate and private key
365
365
found in
366
- examples/platform/nxp/ k32w0/scripts/demo_generated_factory_data/dac/dut2
366
+ ` third_party/nxp/nxp_matter_support/ examples/platform/k32w0/scripts/demo_generated_factory_data/dac/dut2`
367
367
folder. These two factory data binaries can be used for testing topologies with
368
368
2 DUTS. They contain the corresponding DACs/PAIs generated using
369
- generate_nxp_chip_factory_bin.py script. The discriminator is 14014 and the
369
+ ` generate_nxp_chip_factory_bin.py ` script. The discriminator is 14014 and the
370
370
passcode is 1000. These demo certificates are working with the CDs installed in
371
371
CHIPProjectConfig.h.
372
372
@@ -375,7 +375,7 @@ Regarding factory data provider, there are two options:
375
375
- use the default factory data provider: ` FactoryDataProviderImpl ` by setting
376
376
` chip_with_factory_data=1 ` in the gn build command.
377
377
- use a custom factory data provider: please see
378
- [ Guide for implementing a custom factory data provider] ( ../../../platform/ nxp/k32w0/common/README.md ) .
378
+ [ Guide for implementing a custom factory data provider] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/common/README.md ) .
379
379
This can be enabled when ` chip_with_factory_data=1 ` by setting
380
380
` use_custom_factory_provider=1 ` in the gn build command.
381
381
@@ -509,7 +509,7 @@ needed for parsing the hashed scripts.
509
509
510
510
The python3 script detokenizer.py is a script that decodes the tokenized logs
511
511
either from a file or from a serial port. It is located in the following path
512
- ` examples/platform/nxp /k32w0/scripts/detokenizer.py ` .
512
+ ` third_party/nxp/nxp_matter_support/ examples/platform/k32w0/scripts/detokenizer.py` .
513
513
514
514
The script can be used in the following ways:
515
515
@@ -544,7 +544,7 @@ by the script is loaded by the environment. An example of running the
544
544
detokenizer script to see logs of a contact-sensor app:
545
545
546
546
```
547
- python3 ../../../../examples/platform/nxp /k32w0/scripts/detokenizer.py serial -i /dev/ttyACM0 -d out/debug/chip-k32w0x-contact-example-database.bin -o device.txt
547
+ python3 ../../../../third_party/nxp/nxp_matter_support/ examples/platform/k32w0/scripts/detokenizer.py serial -i /dev/ttyACM0 -d out/debug/chip-k32w0x-contact-example-database.bin -o device.txt
548
548
```
549
549
550
550
### Known issues tokenizer
@@ -616,7 +616,7 @@ is done.
616
616
The OTA topology used for OTA testing is illustrated in the figure below.
617
617
Topology is similar with the one used for Matter Test Events.
618
618
619
- ![ OTA_TOPOLOGY] ( ../../../platform/ nxp/k32w0/doc/images/ota_topology.JPG )
619
+ ![ OTA_TOPOLOGY] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/doc/images/ota_topology.JPG )
620
620
621
621
The concept for OTA is the next one:
622
622
@@ -795,13 +795,13 @@ Power Measurement Tool can be used inside MCUXpresso for checking the power
795
795
consumption pattern: Window -> Show View -> Other -> Power Measurement Tool. The
796
796
configuration for this tool is the next one:
797
797
798
- ![ POWER_CONF] ( ../../../platform/ nxp/k32w0/doc/images/power_conf.JPG )
798
+ ![ POWER_CONF] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/doc/images/power_conf.JPG )
799
799
800
800
Also, please make sure that the J14 jumper is set to the _ ENABLED_ position and
801
801
no expansion board is attached to the DK6. A view from this tool is illustrated
802
802
below:
803
803
804
- ![ POWER_VIEW] ( ../../../platform/ nxp/k32w0/doc/images/power_view.JPG )
804
+ ![ POWER_VIEW] ( ../../../../third_party/ nxp/nxp_matter_support/examples/platform /k32w0/doc/images/power_view.JPG )
805
805
806
806
Please note that that the Power Measurement Tool is not very accurate and
807
807
professional tools must be used if exact power consumption needs to be known.
0 commit comments