<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PSA Crypto (key derivation)  fault on NRF54L15 when called from BLE callbacks</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/124485/psa-crypto-key-derivation-fault-on-nrf54l15-when-called-from-ble-callbacks</link><description>Dear Nordic Team, 
 I have to use PSA Crypto key derivation in my NRF54L15 firmware during BLE communication with BLE Central, however, I am experiencing a problem when I am trying to call key derivation from any of Bluetooth callbacks - the call to simply</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 22 Sep 2025 12:53:19 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/124485/psa-crypto-key-derivation-fault-on-nrf54l15-when-called-from-ble-callbacks" /><item><title>RE: PSA Crypto (key derivation)  fault on NRF54L15 when called from BLE callbacks</title><link>https://devzone.nordicsemi.com/thread/549443?ContentTypeID=1</link><pubDate>Mon, 22 Sep 2025 12:53:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:226b7768-4753-4987-aa4d-7f93c2e1ea5f</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Thanks for the update. Then it&amp;#39;s not the issue with context priority but about the memory buffer.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: PSA Crypto (key derivation)  fault on NRF54L15 when called from BLE callbacks</title><link>https://devzone.nordicsemi.com/thread/549438?ContentTypeID=1</link><pubDate>Mon, 22 Sep 2025 12:31:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1521c8e5-64fd-4534-9546-423b030c7c7e</guid><dc:creator>Alex P</dc:creator><description>&lt;p&gt;Hi Hung,&lt;/p&gt;
&lt;p&gt;If it helps, I have managed to resolve the issue by increasing Bluetooth RX thread stack size to 4096 bytes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: PSA Crypto (key derivation)  fault on NRF54L15 when called from BLE callbacks</title><link>https://devzone.nordicsemi.com/thread/549397?ContentTypeID=1</link><pubDate>Mon, 22 Sep 2025 09:23:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:202bcc10-226b-4bbd-9741-3f4ffa2bbf14</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Alex,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You are right that the PSA API is supposed to run in thread context, not in event handler context. But it&amp;#39;s quite strange that even with a worker call you still see the problem.&amp;nbsp;&lt;br /&gt;Could you try to do a test to first start the work in main() then try to start the same work in the BLE event handler.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Please send us the log when you see the assert.&amp;nbsp;&lt;br /&gt;And please send us the sample that does&amp;nbsp;the test above so we can test here.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>