SILICON LABS 7.4.0.0 Zigbee EmberZNet SDK Software User Guide

Silicon Labs Logo

Zigbee EmberZNet SDK 7.4.0.0 GA Gecko SDK Suite 4.4  

December 13, 2023 

Silicon Labs is the vendor of choice for OEMs developing Zigbee networking into  their products. The Silicon Labs Zigbee platform is the most integrated, complete,  and feature-rich Zigbee solution available.

Silicon Labs EmberZNet SDK contains Silicon Labs’ implementation of the Zigbee stack specification.

These release notes cover SDK version(s):

7.4.0.0 released December 13, 2023

Zigbee Logo

KEY FEATURES 

Zigbee 

  • Zigbee R23 compliance
  • Zigbee Smart Energy 1.4a compliance – pro duction
  • Zigbee GP 1.1.2 compliance – Alpha
  • MG27 support – production
  • Improved support for Secure Vault parts
  • Sleepy support on NCP SPI (non-CPC) appli cations – Alpha

Multiprotocol 

  • Concurrent Listening support (RCP) – MG21  and MG24
  • Concurrent Multiprotocol (CMP) Zigbee NCP  + OpenThread RCP – production
  • Dynamic Multiprotocol Bluetooth + Concurrent  Multiprotocol (CMP) Zigbee and OpenThread  support on SoC

Compatibility and Use Notices 

For information about security updates and notices, see the Security chapter of the Gecko Platform Release notes installed with this SDK or on the TECH DOCS tab on https://www.silabs.com/developers/zigbee-emberznet. Silicon Labs also strongly recommends that you subscribe to Security Advisories for up-to-date information. For instructions,  or if you are new to the Zigbee EmberZNet SDK, see Using This Release.

Compatible Compilers:  

IAR Embedded Workbench for ARM (IAR-EWARM) version 9.40.1.

  • Usingwine to build with the IarBuild.exe command line utility or IAR Embedded Workbench GUI on macOS or Linux could result in  incorrect files being used due to collisions in wine’s hashing algorithm for generating short file names.
  • Customers on macOS or Linux are advised not to build with IAR outside of Simplicity Studio. Customers who do should carefully verify that the correct files are being used.

GCC (The GNU Compiler Collection) version 12.2.1, provided with Simplicity Studio.

The EZSP protocol version for this release is 0x0D.

New Items

This release of the Gecko SDK (GSDK) will be the last with combined support for all EFM and EFR devices, except for patches to this  version as needed. Starting in mid-2024 we will introduce separate SDKs:

  • The existing Gecko SDK will continue with support for Series 0 and 1 devices.
  • A new SDK will cater specifically to Series 2 and 3 devices.

The Gecko SDK will continue to support all Series 0 and 1 devices with no change to the long-term support, maintenance, quality, and  responsiveness provided under our software policy.

The new SDK will branch from Gecko SDK and begin to offer new features that help developers take advantage of the advanced capa bilities of our Series 2 and 3 products.

This decision aligns with customer feedback, reflecting our commitment to elevate quality, ensure stability, and enhance performance for  an exceptional user experience across our software SDKs.

New Components

New in release 7.4.0.0

  • The “zigbee_direct_security_p256” and “zigbee_direct_security_curve25519” components have been added so that users can con figure a specific Zigbee Direct security option.

Users are allowed to have multiple “zigbee_direct_security” components enabled on a Zigbee direct device (ZDD) application. In this  case, the actual security option depends on the Zigbee Virtual Device (ZVD) configuration.

New APIs

New in release 7.4.0.0

  • Added a new API sl_zigbee_token_factory_reset to reset Zigbee NVM3 tokens to their default value.
  • Added the API bool sl_zigbee_sec_man_link_key_slot_available(EmberEUI64 eui), which returns true if the link key table can  add or update an entry with this address (table is not full).

Added a new API bool sl_zb_sec_man_compare_key_to_value (sl_zb_sec_man_context_t* context, sl_zb_sec_man_key_t* key),  which returns true if the key being referenced by context has the same value as the key supplied in the argument.

New Platform Support

New in release 7.4.0.0

  • Zigbee stack support for the following new parts is added in this release: EFR32MG24A010F768IM40 and  EFR32MG24A020F768IM40.
New Documentation

New in release 7.4.0.0

Updated the description for the Zigbee Secure Key Storage component to reflect the addition of Zigbee Secure Key Storage Upgrade  (which adds backwards compatibility with existing projects).

Added a new application note for interacting with the Zigbee Security Manager group of components (AN1412: Zigbee Security Manager).

Intended Behavior

Users are reminded that Zigbee unsynchronized CSL transmissions are subject to protocol preemption at the radio scheduler. In the  SleepyToSleepy applications, BLE can and will preempt a Zigbee CSL transmission, which will terminate the transmission. Scheduler  preemption is more common for unsynchronized CSL, given that a potentially lengthy wake up frame sequence may be used. Users  wishing to adjust transmission priorities may use the DMP Tuning and Testing component to do so. Users may also consult UG305:  Dynamic Multiprotocol User’s Guide for more information.

Improvements

Changed in release 7.4.0.0

emberCounterHandler API Doc Changes 

In previous versions, the Counter Handler callback for MAC and APS layer EmberCounterTypes concerning packet RX and TX was not  being passed the passing proper target node ID or data arguments, and API documentation concerning behavior of certain counters that  used these parameters was unclear or misleading.

While the signature of emberCounterHandler() has not changed, the way its parameters are populated have changed slightly.

  • Comments around EmberCounterType enums in ember-types.h have been expanded for clarity.
  • The Node ID parameter to the Counter Handler for TX-related counters now checks whether the destination address mode indicates  a valid short ID before using it. (If not, no destination address is populated, and a placeholder value of  EMBER_UNKNOWN_NODE_ID is used instead.)
  • The Node ID parameter to the Counter Handler for RX-related counters now reflects the source node ID, not the destination node  ID.
  • Retry count is *not* passed as the data parameter for EMBER_COUNTER_MAC_TX_UNICAST_ SUCCESS/FAILED counters as  described in ember-types.h in previous versions, but this was never properly populated in previously released versions so its value  in previous releases would always have been 0. This behavior has been clarified in the description of those EmberCounterTypes.  However, the Retry count for APS layer retries continues to be populated in the data parameter for  EMBER_COUNTER_APS_TX_UNICAST_SUCCESS/FAILED counter types, to be consistent with prior releases.
  • All counters that populate the Node ID or data parameter for the callback have been audited to ensure they pass the expected data,  address, or EMBER_UNKNOWN_NODE_ID, if a Node ID was expected but could not be obtained from the packet, as described in  the revised ember-types.h documentation.
  • The Counter handler for EMBER_COUNTER_MAC_TX_UNICAST_RETRY now correctly reflects the MAC layer destination node  ID and number of retries in its Destination Node ID and data parameters.
  • The Counter handler for EMBER_COUNTER_PHY_CCA_FAIL_COUNT now provides destination node ID information through the  Node ID parameter about the intended MAC layer target of the message that failed transmission.

Updated Green Power Code 

Green power server code is updated with various improvements including:

  • Added more validation code for incoming commands with invalid endpoint when receiving on the GP server.
  • Added code to handle the case when there is no more space to build green power messages.
  • The sink now drops pairing configuration with action remove pairing in some cases per spec section A.3.5.2.4.1.
  • The sink now saves the existing group list of an entry before removing when processing Pairing Configuration with action extend.
  • The Translation query command returns “NOT FOUND” as the error code when the translation table is empty or the index is bigger  than number of entries in the table.
  • Changed the version of GP endpoint in some apps from 1 to 0.

Using CSMA in the GPDF Send function is restricted because Green Power Devices are minimal energy devices and do not use CSMA  in most of the designs. Instead, the preferred design is to send out multiple packets using the same energy budget.

Removed the use of a hidden endpoint in the Green Power Server plugin option. Use one of the application endpoints instead.

Network Key Update Plugin Code Improvements 

  • Changed the periodic network key update period to be as long as 1 year.

Restructured Some APIs to Avoid Unnecessary Key Export 

Made changes to favor the use of key contexts over plaintext key data.

  • sl_zigbee_send_security_challenge_request now takes in an sl_zb_sec_man_context_t argument in place of EmberKeyData.
  • The sl_zb_sec_man_derived_key_type enum’s values are now a 16-bit bitmask to directly support certain key derivations that com bine multiple derived types.

Fixed Issues

Fixed in release 7.4.0.0

ID #  Description
1019348 Fixed the dependency requirements for the Zigbee ZCL Cli component so that it can be removed when not  needed.
1024246 Updated the function description for emberHaveLinkKey() and sl_zb_sec_man_have_link_key().
1036503 Added a description to recommend use of the Micrium Kernel for DMP sample apps.
1037661 An issue that was preventing the application to install either pro stack or leaf stack has been fixed.
1078136 Fixed an intermittent crash when modifying events from interrupt context
1081548 Users are reminded that Zigbee unsynchronized CSL transmissions are subject to protocol preemption at the  radio scheduler. In the SleepyToSleepy applications, BLE can and will preempt a Zigbee CSL transmission,  which will terminate the transmission. Scheduler preemption is more common for unsynchronized CSL, given  that a potentially lengthy wake up frame sequence may be used. Users wishing to adjust transmission priorities  may use the DMP Tuning and Testing component to do so. Users may also consult UG305: Dynamic  Multiprotocol User’s Guide for more information.

An issue has been fixed in CSL where a new wake up frame sequence that is received immediately following a  previous payload frame would not be recorded correctly. This would result in a missed payload frame.

1084111 Initial sleepy SPI-NCP support for MG24 based boards are updated as part of this release.
1104056 Added support for network-steering to run on secondary network in case of multi-network
1120515 Fixed an issue where the channel did notchange when using the mfglib set-channel command.
1141109 Fixed an issue that caused the generated sample application ncp-uart-gp-multi-rail to miss some header files  when using the Green Power adapter component with the -cp option.
1144316 Updated the description of some data structure types in gp-types.h documentation.
1144884 Fixed spurious frame pending bit set when there is no data pending.
1152512 Fixed a potential crash in low-mac-rail when modifying the event in isr context.
1154616 Added an exception for the condition to initialize the network with the case “Switching role from Sleepy End  device to Non-sleepy End device”.
1157289 Fixed an issue that may cause BDB test failure DN-TLM-TC-02B.
1157426 Fixed a build issue when building zigbee_simple_app with green_power_adapter component.
1157932 Added a condition to check if the “transition time” field is missing and set a default value 0xFFFF for this  missing field.
1166340 Fixed an issue that was preventing the emberAfGpdfSend from sending out the intended number of repeated  transmissions.
1167807 Fixed an issue where devices acting as Trust Centers in distributed networks would incorrectly clear their  transient link keys each time a new device joined.
1169504 Fixed an issue that caused reset of a sleepy device upon force wake up.
1169966 Fixed missing return value validation in buffer allocation code.
1171477,

172270

With mfglib start 1 no messages are transmitted but received, so the displayed terminal message “mfglib send  complete” is wrong andchanged to “RXed %d packets in the last %d ms”.
1171935 Changed the periodic network key update period to be as long as 1 year.
1172778 Added the missing invocation of the emberAfPluginGreenPowerServerUpdateAliasCallback to the Green  Power server..
1174288 Fixed an issue that causes the network steering process to assert if a call to stop ongoing scan is called.
1178393 Updated a documentation error.
1180445 In Smart Energy, f OTA now continues to download if the Coordinator reaches Limited Duty Cycle.
1185509 Fixed an issue in CSL where a new wake up frame sequence that is received immediately following a previous  payload frame would not be recorded correctly. This would result in a missed payload frame.

 

ID #  Description
1186107 Fixed an issue that caused the unsuccessful decryption of received GPDFs to replace the incoming GPDF in  the gp commissioning notification.
1188397 Fixed an issue that caused a compilation error when enabling extended report table size.
1194090 Corrected the failure status in the default response for Sink Commissioning Mode command – following section  3.3.4.8.2
1194963 Fixed an issue that memset the commissioningGpd structure before calling user callback  emberAfGreenPowerServerPairingStatusCallback.
1194966 Fixed an issue where the endpoint and proxiesInvolved fields were not set with the Exit Commissioning action.
1196698 Fixed a spurious frame pending bit set when there was no data pending.
1199958 Added code to handle the case when there is no more space to build green power messages.
1202034 Fixed an issue where sl_zb_sec_man_context_t stack variable was not initialized correctly, causing joining with  install code to fail.
1206040 Calling emberRemoveChild() during a secure rejoin attempt by an end device can potentially lead to an extra  decrement of the Child Count, potentially leading to a Child Count of -1 (255), inhibiting end devices from  joining/rejoining due to an indicated lack of capacity in the Beacon.
1207580 Child Table search functions within the stack are inconsistent in use of 0x0000 versus 0xFFFF for node ID  return value representing invalid/empty entries, leading to problems checking for unused entries in APIs like  emberRemoveChild().
1210706 Destination and PHY Index provided in EmberExtraCounterInfo struct as part of emberCounterHandler() may  have been incorrect for MAC TX Unicast counter types.
1211610

1212525

Fixed an issue where Dynamic Multiprotocol applications crashed after enabling Secure Key Storage Upgrade  component.
1211847 While the signature of emberCounterHandler() has not changed, the way its parameters are populated have  changed slightly. Changes around this API is explained in section 2 above.
1212449 Outgoing Beacons were incorrectly categorized by the MAC layer, leading to emberCounterHandler() failing to  catch these packets with the EMBER_COUNTER_MAC_TX_BROADCAST counter type and instead counting  the Beacons with the EMBER_COUNTER_MAC_TX_UNICAST_SUCCESS counter type. That potentially  resulted in unreliable values for the dest EmberNodeId parameter passed to the EmberCounterInfo struct
1214866 Sending data poll packet in certain high traffic configurations may result in a bus fault.
1216552 An issue that causes an assertion under busy traffic conditions is fixed.
1216613 Fixed an issue which led to an incorrect value of groupcast radius in the proxy table.
1222509 Router/coordinator sends a leave & rejoin request to a non-child polling end device, but the MAC destination is  0xFFFF instead of matching the NWK destination address.
1223842 Fixed an issue with generation of the sl_component_catalog.h that was leaving unwanted code in it causing  compilation failure.
756628 Changed the invocation of application callback emberAfMacFilterMatchMessageCallback to only be called for  the ZLL messages that are validated by the stack.
816088 Moved EMBER configuration from zigbeed_configuration.h to zigbeed.slcp.
829508 To avoid a race condition, additional validation was added in emberSetLogicalAndRadioChannel to return  unsuccessful if the lower layers are busy or not in a state to change the channel.

Known Issues in the Current Release

Issues in bold were added since the previous release. If you have missed a release, recent release notes are available on https://www.silabs.com/developers/zigbee-emberznet in the Tech Docs tab.

ID #  Description  Workaround
N/A • The following apps/components is not supported in  this release: EM4 support Feature will be enabled in subsequent releases.
193492 emberAfFillCommandGlobalServerToClientConfigureReporting macro is broken. The filling of buffer creates  incorrect command packet. Use the “zcl global send-me-a-report” CLI command  instead of the API.
278063 Smart Energy Tunneling plugins have conflicting  treatment/usage of address table index. No known workaround
289569 Network-creator component power level picklist doesn’t  offer full range of supported values for EFR32 Edit the range <-8..20> specified in the CMSIS comment  for

EMBER_AF_PLUGIN_NETWORK_CREATOR_RADIO_P OWER in the

<sdk>/protocol/zigbee/app/framework/plugin/network creator/config/network-creator-config.h file. For example,  change to <-26..20>.

295498 UART reception sometimes drops bytes under heavy  load in Zigbee+BLE dynamic multiprotocol use case. Use hardware flow control or lower the baud rate.
312291 EMHAL: The halCommonGetIntxxMillisecondTick  functions on Linux hosts currently use the gettimeofday  function, which is not guaranteed to be monotonic. If the  system time changes, it can cause issues with stack  timing. Modify these functions to use clock_gettime with the  CLOCK_MONOTONIC source instead.
338151 Initializing NCP with a low packet buffer count value may  cause corrupt packets. Use the 0xFF reserved value for packet buffer count to  avoid the too-low default value
387750 Issue with Route Table Request formats on end device. Under Investigation
400418 A touchlink initiator cannot link to a non-factory-new end device target. No known workaround.
424355 A non-factory-new sleepy end device touchlink target capable initiator is not able to receive a device  information response in certain circumstances. Under Investigation
465180 The Coexistence Radio Blocker Optimization item  “Enable Runtime Control” may block proper Zigbee  operation. Optional ‘Wi-Fi Select’ Control of Blocker Optimization  should be left “Disabled”.
480550 The OTA cluster has its own built-in fragmentation  method, hence it should not use APS fragmentation.  Although, in case APS encryption is enabled it grows the  payload of the ImageBlockResponses to a size where  the APS fragmentation is activated. This could lead to  the OTA process failing. No known workaround
481128 Detailed Reset Cause and crash details should be  available by default via the Virtual UART (Serial 0) on  NCP platforms when Diagnostics plugin and Virtual  UART peripheral are enabled. Since Serial 0 is already initialized in the NCP, customers  can enable the emberAfNcpInitCallback in the Zigbee NCP  Framework and call the appropriate diagnostic functions  (halGetExtendedResetInfo, halGetExtendedResetString,  halPrintCrashSummary, halPrintCrashDetails, and  halPrintCrashData) in this callback to print this data to  Serial 0 for viewing in the Network Analyzer capture log.  For an example of how to use these functions, refer to the  code included in af-main-soc.c’s emberAfMainInit() when  EXTENDED_RESET_INFO is defined.

 

ID #  Description  Workaround
486369 If a DynamicMultiProtocolLightSoc forming a new  network has child nodes remaining from a network it has  left, emberAfGetChildTableSize returns a non-zero value  in startIdentifyOnAllChildNodes, causing Tx 66 error  messages when addressing the “ghost” children. Mass-erase the part if possible before creating a new  network or programmatically check the child table after  leaving the network and delete all children using  emberRemoveChild prior to forming a new network.
495563 Joining SPI NCP Sleepy End Device Sample App  doesn’t short poll, therefore the joining attempt fails at  the state of Update TC Link Key. The device that wishes to join should be in Short Poll  mode before attempting to join. This mode can be forced  by the End Device Support plugin.
497832 In Network Analyzer the Zigbee Application Support  Command Breakdown for the Verify Key Request Frame  mistakenly references the part of the payload that  indicates the frame Source Address as the Destination  Address. No known workaround
519905

521782

Spi-NCP may very rarely fail to start up bootloader  communication using the ‘bootload’ CLI command of the  ota-client plugin. Restart the bootload process
620596 NCP SPI Example for BRD4181A (EFR32xGMG21)  nWake default pin defined cannot be used as a wake-up  pin. Change the default pin for nWake from PD03 to a EM2/3  wake-up-enabled pin in the NCP-SPI Plugin.
631713 A Zigbee End Device will report address conflicts  repeatedly if the plugin “Zigbee PRO Stack Library” is  used instead of “Zigbee PRO Leaf Library”. Use the”Zigbee PRO Leaf Library” instead of the “Zigbee  PRO Stack Library” plugin.
670702 Inefficiencies within the Reporting plugin can lead to  significant latency based on data write frequency and  table size, which may interfere with customer application  code, including event timing. If doing frequent writes, consider checking reporting  conditions and sending reports manually rather than using  the plugin.
708258 Uninitialized value in groups-server.c via

addEntryToGroupTable() can create a spurious binding  and cause groupcast reporting messages to be sent.

Add “binding.clusterId =

EMBER_AF_INVALID_CLUSTER_ID;” after “binding.type  = EMBER_MULTICAST_BINDING;”

757775 All EFR32 parts have a unique RSSI offset. In addition,  board design, antennas and enclosure can impact RSSI. When creating a new project, install the RAIL Utility, RSSI  component. This feature includes the default RSSI Offset  Silabs has measured for each part. This offset can be  modified if necessary after RF testing of your complete  product.
758965 ZCL cluster components and ZCL command discovery  table are not synchronized. Therefore, when enabling or  disabling a ZCL cluster component, implemented  commands will not be enabled/disabled in the  corresponding ZCL Advanced Configurator command  tab. Manually enable/disable discovery for the desired ZCL  commands in the ZCL Advanced Configurator.
765735 The OTA update fails on Sleepy End Device with  enabled Page Request. Use Block Request instead of Page Request.
845649 Removing CLI:Core component does not eliminate  EEPROM cli calls to sl_cli.h. Delete the eeprom-cli.c file that calls the sl_cli.h.  Additionally, calls to sl_cli.h as well as

sl_cli_command_arg_t in the ota-storage-simple-eeprom  can be commented out.

857200 ias-zone-server.c allows for a binding to be created with  a “0000000000000000” CIE address and posteriorly  does not allow further bindings. No known workaround
1019961 Generated Z3Gateway makefile hardcodes “gcc” as CC No known workaround

 

ID #  Description  Workaround
1039767 Zigbee router network retry queue overflow issue in multi  thread RTOS use case. Zigbee Stack is not thread-safe. As a result, calling Zigbee stack APIs from another task is not supported in OS  environment and may put the stack into “non-working”  state. Refer to the following App note for more information  and workaround using event handler.

https://www.silabs.com/documents/public/application notes/an1322-dynamic-multiprotocol-bluetooth-zigbee-sdk 7x.pdf .

1064370 The Z3Switch sample application only enabled one button (instance : btn1) by default that leads to mismatch in but ton description in the projectfile. Workaround: Install the btn0 instance manually during  Z3Switch project creation.
1161063 Z3Light and potentially other applications report incorrect  cluster revision values. Manually update the cluster revision attribute to their appro priate revision.
1164768,

1171478,

1171479

ERROR: ezspErrorHandler s0x34 reported repeatedly  during mfglib receive mode To reduce the error messages printed, configure  EMBER_AF_PLUGIN_GATEWAY_MAX_WAIT_FOR_EV ENT_TIMEOUT_MS on the host app to 100, so the  callback queue is freed more quickly.

Deprecated Items

Deprecated in release 7.4.0.0

Removed the following deprecated security APIs:

emberGetKey()

emberGetKeyTableEntry()

emberSetKeyTableEntry()

emberHaveLinkKey()

emberAddOrUpdateKeyTableEntry()

emberAddTransientLinkKey()

emberGetTransientKeyTableEntry()

emberGetTransientLinkKey()

emberHmacAesHash()

Use the APIs provided by Zigbee Security Manager for access to key storage and HMAC hashing.

Removed Items

Removed in release 7.4.0.0

  • Removed duplicate public APIs in public header file gp-types.h.
  • The zigbee_end_device_bind component has been removed. This component was used for the coordinator to broker binding re quests for end devices. This optional functionality was removed from R22 of the Zigbee core spec.
  • Removed setPacketBufferCount() in af-host.c and useless check case EZSP_CONFIG_PACKET_BUFFER_COUNT: in command handlers.c.
  • Removed memoryAllocation argument because there is no need to divide into two phases when initializing NCP.
  • Removed emberAfNcpInitCallback() in se14-comms-hub, se14-ihd, and se14-meter-gas ‘s app.c.
  • Removed setting EZSP_CONFIG_RETRY_QUEUE_SIZE value during ncp initialization in ncp-configuration.c

Multiprotocol Gateway and RCP

New Items

Added in release 7.4.0.0

Concurrent listening, the ability for the Zigbee and OpenThread stacks to operate on independent 802.15.4 channels when using an  EFR32xG24 or xG21 RCP, is released. Concurrent listening is not available for the 802.15.4 RCP/Bluetooth RCP combination, the Zigbee  NCP/OpenThread RCP combination, or for the Zigbee/OpenThread system-on-chip (SoC). It will be added to those products in a future  release.

The OpenThread CLI vendor extension has been added to the OpenThread host apps of multiprotocol containers. This includes the coex  cli commands.

Improvements

Changed in release 7.4.0.0

The Zigbee NCP/OpenThread RCP multiprotocol combination is now production quality.

Fixed Issues

Fixed in release 7.4.0.0

ID #  Description
1081828 Throughput issue with FreeRTOS-based Zigbee/BLE DMP sample applications.
1090921 Z3GatewayCpc had trouble forming a network in a noisy environment.
1153055 An assert on the host was caused when there was a communication failure when reading the NCP version from the  zigbee_ncp-ble_ncp-uart sample app.
1155676 The 802.15.4 RCP discarded all received unicast packets (after MAC acking) if multiple 15.4 interfaces shared the same  16-bit node ID.
1173178 The host falsely reported hundreds of packets received with mfglib in the Host-RCP setup.
1190859 EZSP error when sending mfglib random packets in the Host-RCP setup.
1199706 Data polls from forgotten end device children were not properly setting a pending frame on the RCP to queue a Leave &  Rejoin command to the former child.
1207967 The “mfglib send random” command was sending out extra packets on Zigbeed.
1208012 The mfglib rx mode did not update packet info correctly when receiving on the RCP.
1214359 The coordinator node crashed when 80 or more routers tried to join simultaneously in the Host-RCP setup.
1216470 After relaying a broadcast for address mask 0xFFFF, a Zigbee RCP acting as a parent device would leave the pending  data flag set for each child. This resulted in each child staying awake expecting data after each poll, and required some  other pending data transaction to each end device to eventually clear this state.
Known Issues in the Current Release

Issues in bold were added since the previous release. If you have missed a release, recent release notes are available on https://www.silabs.com/developers/gecko-software-development-kit.

ID #  Description  Workaround
811732 Custom token support is not available when using  Zigbeed. Support is planned in a future release.
937562 Bluetoothctl ‘advertise on’ command fails with rcp-uart 802154-blehci app on Raspberry Pi OS 11. Use btmgmt app instead of bluetoothctl.

 

ID #  Description  Workaround
1022972  Coex not working on ZB NCP + OT RCP.  Support is planned for a future release.
1074205 The CMP RCP does not support two networks on the  same PAN id. Use different PAN ids for each network. Support is  planned in a future release.
1122723 In a busy environment the CLI may become unresponsive  in the z3-light_ot-ftd_soc app. No known workaround.
1170052 CMP Zigbee NCP + OT RCP and DMP Zigbee NCP +  BLE NCP may not fit on 64KB and lower RAM parts in  this current release. 64KB parts not currently supported for these apps.
1213701 RCP may fail to indicate pending data for sleepy child  during OTA upgrade to child in a noisy environment,  resulting in update process terminating unexpectedly. Will be addressed in a future release.
1221299  Mfglib RSSI readings differ between RCP and NCP.  Will be addressed in a future release.
Deprecated Items

None

Removed Items

Removed in release 7.4.0.0

The “NONCOMPLIANT_ACK_TIMING_WORKAROUND” macro has been removed. All RCP apps now by default support 192 µsec  turnaround time for non-enhanced acks while still using 256 µsec turnaround time for enhanced acks required by CSL.

Using This Release

This release contains the following:

  • Zigbee stack
  • Zigbee Application Framework
  • Zigbee Sample Applications

For more information about Zigbee and the EmberZNet SDK see UG103.02: Zigbee Fundamentals.

If you are a first-time user, see QSG180: Z Zigbee EmberZNet Quick-Start Guide for SDK 7.0 and Higher, for instructions on configuring  your development environment, building and flashing a sample application, and documentation references pointing to next steps.

Installation and Use

The Zigbee EmberZNet SDK is provided as part of the Gecko SDK (GSDK), the suite of Silicon Labs SDKs. To quickly get started with  the GSDK, install Simplicity Studio 5, which will set up your development environment and walk you through GSDK installation. Simplicity  Studio 5 includes everything needed for IoT product development with Silicon Labs devices, including a resource and project launcher,  software configuration tools, full IDE with GNU toolchain, and analysis tools. Installation instructions are provided in the online Simplicity  Studio 5 User’s Guide.

Alternatively, Gecko SDK may be installed manually by downloading or cloning the latest from GitHub. See https://github.com/SiliconLabs/gecko_sdk for more information.

Simplicity Studio installs the GSDK by default in:

  • (Windows): C:\Users\<NAME>\SimplicityStudio\SDKs\gecko_sdk
  • (MacOS): /Users/<NAME>/SimplicityStudio/SDKs/gecko_sdk

Documentation specific to the SDK version is installed with the SDK. Additional information can often be found in the knowledge base  articles (KBAs). API references and other information about this and earlier releases is available on https://docs.silabs.com/.

Security Information

Secure Vault Integration 

For applications that choose to store keys securely using the Secure Key Storage component on Secure Vault-High parts, the following  table shows the protected keys and their storage protection characteristics that the Zigbee Security Manager component manages.

Wrapped Key  Exportable / Non-Exportable  Notes
Network Key Exportable
Trust Center Link Key Exportable
Transient Link Key Exportable Indexed key table, stored as volatile key
Application Link Key Exportable Indexed key table
Secure EZSP Key Exportable
ZLL Encryption Key Exportable
ZLL Preconfigured Key Exportable
GPD Proxy Key Exportable Indexed key table
GPD Sink Key Exportable Indexed key table
Internal/Placeholder Key Exportable Internal key for use by Zigbee Security  Manager

 

Wrapped keys that are marked as “Non-Exportable” can be used but cannot be viewed or shared at runtime.

Wrapped keys that are marked as “Exportable” can be used or shared at runtime but remain encrypted while stored in flash.

User applications never need to interact with the majority of these keys. Existing APIs to manage Link Key Table keys or Transient Keys  are still available to the user application and now route through the Zigbee Security Manager component.

Some of these keys may become non-exportable to the user application in the future. User applications are encouraged to not rely on  the exporting of keys unless absolutely necessary.

For more information on Secure Vault Key Management functionality, see AN1271: Secure Key Storage.

Security Advisories

To subscribe to Security Advisories, log in to the Silicon Labs customer portal, then select Account Home. Click HOME to go to the  portal home page and then click the Manage Notifications tile. Make sure that ‘Software/Security Advisory Notices & Product Change  Notices (PCNs)’ is checked, and that you are subscribed at minimum for your platform and protocol. Click Save to save any changes.

Security Advisories

Support

Development Kit customers are eligible for training and technical support. Use the Silicon Laboratories Zigbee web page to obtain infor mation about all Silicon Labs Zigbee products and services, and to sign up for product support.

You can contact Silicon Laboratories support at http://www.silabs.com/support.

Simplicity Studio

Disclaimer 

Silicon Labs intends to provide customers with the latest, accurate, and in-depth documentation of all peripherals and modules available for system and software imple menters using or intending to use the Silicon Labs products. Characterization data, available modules and peripherals, memory sizes and memory addresses refer to each  specific device, and “Typical” parameters provided can and do vary in different applications. Application examples described herein are for illustrative purposes only. Silicon  Labs reserves the right to make changes without further notice to the product information, specifications, and descriptions herein, and does not give warranties as to the  accuracy or completeness of the included information. Without prior notification, Silicon Labs may update product firmware during the manufacturing process for security or  reliability reasons. Such changes will not alter the specifications or the performance of the product. Silicon Labs shall have no liability for the consequences of use of the infor mation supplied in this document. This document does not imply or expressly grant any license to design or fabricate any integrated circuits. The products are not designed or  authorized to be used within any FDA Class III devices, applications for which FDA premarket approval is required or Life Support Systems without the specific written consent  of Silicon Labs. A “Life Support System” is any product or system intended to support or sustain life and/or health, which, if it fails, can be reasonably expected to result in  significant personal injury or death. Silicon Labs products are not designed or authorized for military applications. Silicon Labs products shall under no circumstances be used  in weapons of mass destruction including (but not limited to) nuclear, biological or chemical weapons, or missiles capable of delivering such weapons. Silicon Labs disclaims  all express and implied warranties and shall not be responsible or liable for any injuries or damages related to use of a Silicon Labs product in such unauthorized applications.  Note: This content may contain offensive terminology that is now obsolete. Silicon Labs is replacing these terms with inclusive language wherever possible. For more  information, visit www.silabs.com/about-us/inclusive-lexicon-project 

Trademark Information 

Silicon Laboratories Inc.®, Silicon Laboratories®, Silicon Labs®, SiLabs® and the Silicon Labs logo®, Bluegiga®, Bluegiga Logo®, EFM®, EFM32®, EFR, Ember®, Energy Micro, Energy  Micro logo and combinations thereof, “the world’s most energy friendly microcontrollers”, Redpine Signals®, WiSeConnect , n-Link, ThreadArch®, EZLink®, EZRadio®, EZRadioPRO®,  Gecko®, Gecko OS, Gecko OS Studio, Precision32®, Simplicity Studio®, Telegesis, the Telegesis Logo®, USBXpress® , Zentri, the Zentri logo and Zentri DMS, Z-Wave®, and others  are trademarks or registered trademarks of Silicon Labs. ARM, CORTEX, Cortex-M3 and THUMB are trademarks or registered trademarks of ARM Holdings. Keil is a registered  trademark of ARM Limited. Wi-Fi is a registered trademark of the Wi-Fi Alliance. All other products or brand names mentioned herein are trademarks of their respective holders.

Silicon Labs Logo

Silicon Laboratories Inc.
400 West Cesar Chavez
Austin, TX 78701
USA 

www.silabs.com

Documents / Resources

SILICON LABS 7.4.0.0 Zigbee EmberZNet SDK Software [pdf] User Guide
7.4.0.0 Zigbee EmberZNet SDK Software, 7.4.0.0, Zigbee EmberZNet SDK Software, EmberZNet SDK Software, SDK Software, Software

References

Leave a comment

Your email address will not be published. Required fields are marked *