<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/122372/tls-credential-cannot-make-amazon-root-ca-2-and-4-to-work</link><description>Hello, 
 
 We are working on an NRF5340/NRF7002 based project with NCS 2.7.0 SDK. We have been able to get Amazon Root CA 1 and 3 working with the following .conf: 
 
 
 Now with this config when I replace Amazon Root CA 1 and 3 by the 2 and 4, I always</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 15 Jul 2025 09:22:01 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/122372/tls-credential-cannot-make-amazon-root-ca-2-and-4-to-work" /><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/542492?ContentTypeID=1</link><pubDate>Tue, 15 Jul 2025 09:22:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bdb3a3d0-86e6-4be9-af13-ee1ddb84cb1d</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;No worries, indeed those config where necessary to reduce the heap size.&amp;nbsp;&lt;br /&gt;It now works and I better understand how can a tweak the config depending on our needs.&lt;br /&gt;Thanks for your help.&lt;br /&gt;&lt;br /&gt;Best regard,&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Charles&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/542196?ContentTypeID=1</link><pubDate>Fri, 11 Jul 2025 08:13:48 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2dbf9e09-75b4-4d0b-a90b-403cc9fcaadc</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi again&lt;/p&gt;
&lt;p&gt;Sorry, I meant to share the memory optimized .conf file here, but it seems I forgot to add the link in my last reply:&amp;nbsp;&lt;a href="https://github.com/nrfconnect/sdk-nrf/blob/main/samples/wifi/throughput/overlay-memory-optimized.conf"&gt;https://github.com/nrfconnect/sdk-nrf/blob/main/samples/wifi/throughput/overlay-memory-optimized.conf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mainly what&amp;#39;s missing is CONFIG_NRF70_RX_NUM_BUFS. The default is 48, which would explain why you need the high heap size. It can be reduced with the following from the .conf file I now shared.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;CONFIG_NET_PKT_TX_COUNT=6&lt;/span&gt;&lt;br /&gt;&lt;span&gt;CONFIG_NET_PKT_RX_COUNT=6&lt;/span&gt;&lt;br /&gt;&lt;span&gt;CONFIG_NET_BUF_TX_COUNT=12&lt;/span&gt;&lt;br /&gt;&lt;span&gt;CONFIG_NET_BUF_RX_COUNT=6&lt;/span&gt;&lt;br /&gt;&lt;span&gt;CONFIG_NRF70_RX_NUM_BUFS=6&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Simon&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/542134?ContentTypeID=1</link><pubDate>Thu, 10 Jul 2025 14:32:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2c4aadad-451f-469e-9bc5-a97e6f2988c2</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;br /&gt;&lt;br /&gt;Thanks for the suggestion, however there must be some dependencies that I have missed to mention because anything less than 80000 on &lt;span&gt;WIFI_DATA_HEAP_SIZE&amp;nbsp;&amp;nbsp;&lt;/span&gt;does not work.&lt;br /&gt;When I say that I does not work, the device hang on boot, locked in &amp;quot;net_if_up&amp;quot; function, the function just never returns...&lt;br /&gt;Here is my wifi configuration overlay:&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;# Wifi is nrf7002 based
CONFIG_WIFI=y
CONFIG_WIFI_NRF70=y
CONFIG_NRF70_AP_MODE=n
CONFIG_NRF70_P2P_MODE=n
CONFIG_NRF70_MAX_TX_PENDING_QLEN=12
CONFIG_NRF70_QSPI_LOW_POWER=y
CONFIG_NRF_WIFI_IF_AUTO_START=n
CONFIG_NRF_WIFI_LOW_POWER=y
CONFIG_NRF_WIFI_RPU_RECOVERY=y
CONFIG_WIFI_READY_LIB=y

# WPA supplicant
CONFIG_WIFI_NM_WPA_SUPPLICANT=y
CONFIG_WIFI_NM_WPA_SUPPLICANT_WEP=n
CONFIG_WIFI_NM_WPA_SUPPLICANT_NO_DEBUG=y

# Memory
# Must not be changed
CONFIG_HEAP_MEM_POOL_SIZE=40144
# Must not be changed 
CONFIG_NRF_WIFI_CTRL_HEAP_SIZE=20000
# This value can be changed depending on the wanted throughput of WiFi
CONFIG_NRF_WIFI_DATA_HEAP_SIZE=89000

# Networking
CONFIG_NETWORKING=y
CONFIG_NET_SOCKETS=y
CONFIG_POSIX_API=y
CONFIG_NET_IPV4=y
CONFIG_NET_UDP=y
CONFIG_NET_TCP=y
CONFIG_NET_DHCPV4=y
CONFIG_NET_CONFIG_SETTINGS=n
# CONFIG_NET_CONFIG_INIT_TIMEOUT=0
# CONFIG_NET_CONFIG_AUTO_INIT=n


CONFIG_NET_NATIVE=y
CONFIG_DNS_RESOLVER=y

# Need 16 FDs for WiFi
CONFIG_POSIX_MAX_FDS=32
CONFIG_NET_IPV6=y


# Net Management
CONFIG_NET_L2_ETHERNET=y # This is mandatory even for WIFI 
CONFIG_NET_L2_WIFI_MGMT=y
CONFIG_NET_MGMT_EVENT=y
CONFIG_NET_L2_ETHERNET_MGMT=y
CONFIG_NET_MAX_CONTEXTS=4
CONFIG_NET_SOCKETS_OFFLOAD=n

CONFIG_NET_MGMT_EVENT_QUEUE_TIMEOUT=5000
&lt;/pre&gt;&lt;br /&gt;Is there anything, that could cause this higher memory requirement ?&amp;nbsp;&lt;br /&gt;Also, if I can boot up the device and make it communicate properly with 90000, will it still be the case after multiple net_if_up/net_if_down or if the network configuration changes ?&lt;br /&gt;&lt;br /&gt;Thank you for your help&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Have a nice day,&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Charles&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/542010?ContentTypeID=1</link><pubDate>Thu, 10 Jul 2025 05:34:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c293c54a-d88f-420d-a66e-c024901d3b24</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi again&lt;/p&gt;
&lt;p&gt;Here&amp;#39;s a suggested memory optimization overlay from our developers. For reference, setting the heap_size config to 25000 with this configuration should be sufficient for your requirement and cover up to 1Mbps throughput.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/541633?ContentTypeID=1</link><pubDate>Mon, 07 Jul 2025 13:00:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:03ff0f19-0283-4eaf-9aac-d6b50dd1641a</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hi !&amp;nbsp;&lt;br /&gt;&lt;br /&gt;I would say the maximum that we use for now is around 0.5 Mbps.&lt;br /&gt;We could make use of 1 Mbps in some case scenario.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Could you give me suggestion for both of those value ?&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Thank you&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/541419?ContentTypeID=1</link><pubDate>Fri, 04 Jul 2025 09:16:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9ba7562a-fffd-4f8d-bf39-82d07b87135b</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi Charles&lt;/p&gt;
&lt;p&gt;I spoke to the developer today, and the main dependency for WIFI_DATA_HEAP_SIZE depends on the throughput requirements of your application, so can you share some details on what throughput numbers you need/would like to see in your application, and we can come back with some suggestions for HEAP_SIZE&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/541277?ContentTypeID=1</link><pubDate>Thu, 03 Jul 2025 07:57:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1af52e7f-c181-4fd4-ad90-cea9e755759a</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;br /&gt;&lt;br /&gt;Thank you for your answers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Indeed, I would like to know more about the recommendation for our use case, we use scan mode and station mode with WPA2, WPA2_256 and WPA3 security supported, also if relevant we use any link mode from WiFi4 to WiFi6.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;&lt;br /&gt;Charles&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/541272?ContentTypeID=1</link><pubDate>Thu, 03 Jul 2025 07:38:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:cae783d2-1f18-48c1-809b-7c0a378d0bc2</guid><dc:creator>Simonr</dc:creator><description>&lt;ol&gt;
&lt;li&gt;Yes, it should be fine to manually set the&amp;nbsp;&lt;span&gt;CONFIG_MBEDTLS_MPI_MAX_SIZE, as it only have 256 and 384 as defaults if the CC310/312 backends are set.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;mbedtls will only provide a runtime error if not enough memory is located, so trial and error is the way to go.&lt;/li&gt;
&lt;li&gt;8000 should be sufficient if the application only does scanning, but other than that there aren&amp;#39;t really any recommended minimum values here. If you&amp;#39;d like I can ask the developers, but could you share what Wi-Fi features you&amp;#39;re using, as generic numbers will vary a lot depending on what features are used exactly.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/541132?ContentTypeID=1</link><pubDate>Wed, 02 Jul 2025 08:49:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b23b7374-b680-4382-977a-6de131fc053c</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;&lt;span&gt;Hello,&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;I finally managed to make Amazon Root CA 2 work, but I still have some trouble with root CA 4.&lt;br /&gt;However, I have a few question about the kConfig that I had to enable/modify.&lt;br /&gt;Here is the list I had to add, note that I&amp;#39;m now using NCS 3.0.2.&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;CONFIG_MBEDTLS_HEAP_SIZE=85000

# Another way to set this ? 
CONFIG_MBEDTLS_MPI_MAX_SIZE=1024

# new 
CONFIG_NRF_SECURITY=y
CONFIG_PSA_CRYPTO_DRIVER_OBERON=y
CONFIG_PSA_WANT_ALG_SHA_384=y
CONFIG_PSA_WANT_RSA_KEY_SIZE_4096=y

# Required RSA and SHA algorithms
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_SIGN=y
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_CRYPT=y
CONFIG_PSA_WANT_ALG_RSA_PSS=y
CONFIG_PSA_WANT_ALG_RSA_PSS_ANY_SALT=y
CONFIG_PSA_WANT_ALG_SHA_256=y

# ECDSA
CONFIG_PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY=y
CONFIG_PSA_WANT_ALG_ECDSA=y
CONFIG_PSA_WANT_ALG_ECDSA_ANY=y
CONFIG_PSA_WANT_ECC_SECP_R1_256=y&lt;/pre&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;I figured that I had to increase&amp;nbsp;&lt;/span&gt;&lt;/span&gt;CONFIG_MBEDTLS_MPI_MAX_SIZE to 1024 otherwise the default value of 256 is not enough for MBEDTLS to parse the certificate. Is this the proper way of doing this ? Is there another config that I should use, instead of this one that is never mentioned in example code ?&amp;nbsp;&lt;/li&gt;
&lt;li&gt;I had to increase CONFIG_MBEDTLS_HEAP_SIZE from ~60k to 85k. Is there a way to be sure about this value other than trial and error ?&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Also since we use many feature from NCS, our program is pretty RAM hungry, I had to decrease CONFIG_NRF_WIFI_DATA_HEAP_SIZE to 90k cf:&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;# Memory
CONFIG_HEAP_MEM_POOL_SIZE=40144
CONFIG_NRF_WIFI_CTRL_HEAP_SIZE=20000
CONFIG_NRF_WIFI_DATA_HEAP_SIZE=90000&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;Is there a minimum value to ensure that the wifi stack will be working properly ?&lt;/p&gt;
&lt;p&gt;Thank you for your time&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Best regard,&lt;br /&gt;&lt;br /&gt;Charles&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/540289?ContentTypeID=1</link><pubDate>Tue, 24 Jun 2025 09:31:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9fa2685b-2543-473e-85d8-f2e4646d7da8</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Ah, okay, so the SHA384 is the &amp;quot;main&amp;quot; difference then. Sorry I missed that initially. We don&amp;#39;t have a specific sample project for using the SHA384 hash, but it should be supported. However, note that it&amp;#39;s not supported by the Cryptocell (3xx) driver, so you will need to use the nrf-oberon driver instead.&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/security/crypto/drivers.html#crypto-drivers-oberon"&gt;https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/security/crypto/drivers.html#crypto-drivers-oberon&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/540163?ContentTypeID=1</link><pubDate>Mon, 23 Jun 2025 09:15:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8b14bd93-9351-4d17-b494-ef77f7152856</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;br /&gt;&lt;br /&gt;Using openssl I found the following result:&lt;br /&gt;&lt;br /&gt;Amazon Root CA 1 : &amp;quot;sha256WithRSAEncryption&amp;quot; and 2048 bit public key&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Amazon Root CA 2 : &amp;quot;sha384WithRSAEncryption&amp;quot; and a 4096 bit public key&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Amazon Root CA 3 : &amp;quot;ecdsa-with-SHA256&amp;quot; and a 256 bit public key&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Amazon Root CA 4 : &amp;quot;ecdsa-with-SHA384&amp;quot; and a 384 bit public key&amp;nbsp;&lt;br /&gt;&lt;br /&gt;I have tried enabling some config related to sha384, 4096 bit public key and ECDSA in addition to those described in the first post but without success:&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_4096=y
CONFIG_PSA_WANT_ALG_SHA3_384=y

# ECC
CONFIG_PSA_WANT_ALG_ECDH=y
CONFIG_PSA_WANT_ALG_ECDSA=y
CONFIG_PSA_WANT_ALG_DETERMINISTIC_ECDSA=y

CONFIG_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE=y
CONFIG_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT=y
CONFIG_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT=y

# ECC curves
CONFIG_PSA_WANT_ECC_MONTGOMERY_255=y
CONFIG_PSA_WANT_ECC_TWISTED_EDWARDS_255=y
CONFIG_PSA_WANT_ECC_SECP_R1_224=y
CONFIG_PSA_WANT_ECC_SECP_R1_256=y
CONFIG_PSA_WANT_ECC_SECP_R1_384=y&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I dived deeper in the code to see where the error comes from, the -22 error is thrown by &amp;quot;&lt;/span&gt;tls_mbedtls_set_credentials&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1750670122900v2.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;Hope this helps, please tell me if you need more information.&lt;br /&gt;&lt;br /&gt;Best regards,&lt;br /&gt;Charles&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/540146?ContentTypeID=1</link><pubDate>Mon, 23 Jun 2025 07:40:48 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f1e4b8fc-633a-4b20-9093-647bcede4e0f</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi again&lt;/p&gt;
&lt;p&gt;I don&amp;#39;t know the specific differences between Amazons Root certificates, so the first step here would be to find what the differences between these are, and then we can try finding out what configs are necessary to change here.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/540026?ContentTypeID=1</link><pubDate>Fri, 20 Jun 2025 12:37:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b9684d54-3793-4a02-82eb-9e6c77a2c102</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Indeed I suspected that those certificates would require different kConfig options but I have not yet found a combination that would make them at least not throw an &amp;quot;invalid argument&amp;#39; error. That is why I&amp;#39;m asking if is there any documentation or code example that could help us make those certificate work ?&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Also, the issue I have with those certificate is the same if I put all four certificate, my socket openning fail with a -22 error before even trying to reach the server even though it has at least one working certificate that I have validated with our server (Amazon root CA 1 and 3).&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Best regard,&lt;/p&gt;
&lt;p&gt;Charles&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/540022?ContentTypeID=1</link><pubDate>Fri, 20 Jun 2025 12:20:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:68e6d71a-c321-4870-9bcb-a94c2ee77976</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;Okay, had a chat with a couple colleauges about this, and typically, differenc certs have different cryptographic/curves and thus require different kConfig options. Also, a domain name is signed with a given chain, and at the top, a CA root. It&amp;#39;s not expected to work to just change the root CA and keep the domain name the same.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/539905?ContentTypeID=1</link><pubDate>Thu, 19 Jun 2025 14:00:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:28cd8d8b-7de7-4609-acc2-0656b4a7a5a0</guid><dc:creator>c.lancea</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Yes I am reffering to this lesson, but I am actually testing within our project that is why I posted the .conf we use for wifi/http/tls.&lt;br /&gt;&lt;br /&gt;What I mean by &amp;quot;replacing the Amazon Root CA&amp;quot; is that the tls socket opening works perfecty when using both Amazon Root CA 1 and 3. But if I use any combinaison of certificates containing Amazon root CA 2 and 4 the tls socket opening will fail with a -22 error.&amp;nbsp;&lt;br /&gt;Those certificate come from the &lt;a href="https://www.amazontrust.com/repository/"&gt;&amp;quot;Amazon trust services repository&amp;quot;&amp;nbsp;&lt;/a&gt;&amp;nbsp;and are converted to a header using the same script that we use for Root CA 1 and 3 which works.&lt;/p&gt;
&lt;p&gt;I have already verified that the data in the header is similar to each .pem before conversion.&lt;/p&gt;
&lt;p&gt;What I was wondering is if any exemple exist where certificate that uses SHA384 are working, or If you could help us with our .conf to make it work.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: TLS Credential: cannot make Amazon root CA 2 and 4 to work</title><link>https://devzone.nordicsemi.com/thread/539896?ContentTypeID=1</link><pubDate>Thu, 19 Jun 2025 13:23:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:db2c5d82-4944-4c7d-906b-1731959921ac</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;I assume you&amp;#39;re referring to the&lt;a href="https://academy.nordicsemi.com/courses/wi-fi-fundamentals/lessons/lesson-5-wifi-fundamentals/topic/lesson-5-exercise-2-2/"&gt; lesson 5, exercise 2 project in DevAcademy here&lt;/a&gt;, correct? Can you explain what you mean by &amp;quot;replacing the Amazon Root CA&amp;quot;? Error message -22 points to there being an invalid argument somewhere, so can you confirm the certificate you replace it with is a valid replacement?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>