<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Certificate based DTLS handshake debugging questions</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/65512/certificate-based-dtls-handshake-debugging-questions</link><description>Short version: 
 - Can you enable debug output in the mbedtls used for DTLS in OpenThread, available through the nRF SDK? If so, how? 
 - Can you at all chan ge the list of supported ECC groups that will be communicated as part of a certificate based</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 16 Sep 2020 07:59:47 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/65512/certificate-based-dtls-handshake-debugging-questions" /><item><title>RE: Certificate based DTLS handshake debugging questions</title><link>https://devzone.nordicsemi.com/thread/269774?ContentTypeID=1</link><pubDate>Wed, 16 Sep 2020 07:59:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d868b5bf-9b6d-496c-9fb9-96b1d67e7124</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;I received an update from our Thread team today:&lt;/p&gt;
&lt;p&gt;Most likely, the mbedTLS doesn&amp;#39;t have sufficient heap size to perform some cryptographic operation. For our examples in the nRF5 SDK, the mbedTLS uses tje mem_manager module for dynamic memory allocation. You can adjust the sizes and amount of memory buckets in the example&amp;#39;s sdk_config.h, e.g.: &amp;quot;MEMORY_MANAGER_XLARGE_BLOCK_SIZE&amp;quot;.&lt;/p&gt;
&lt;p&gt;I think we need more debug details to understand what the memory requirements are. I would recommend to modify the &amp;quot;ot_calloc&amp;quot; function inside the thread_util.c file and put a breakpoint when nrf_calloc results in a NULL pointer. You can then try to understand what the size of the buffer requested by mbedTLS and adjust that in sdk_config.h accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Can you look into this, and see if you can see if there seems to be too little memory in ot_calloc?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;BR,&lt;br /&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Certificate based DTLS handshake debugging questions</title><link>https://devzone.nordicsemi.com/thread/267988?ContentTypeID=1</link><pubDate>Fri, 04 Sep 2020 08:52:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2e0dedeb-d294-42cf-b11f-bde154af7ca9</guid><dc:creator>Joel H</dc:creator><description>&lt;p&gt;Thanks for the update!&lt;/p&gt;
&lt;p&gt;(We are happy to share any&amp;nbsp;local project settings, but since there are so many config files involved I thought it was better to start a bit more generic, and hopefully get suggestions on where/how to narrow down the debugging.)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Certificate based DTLS handshake debugging questions</title><link>https://devzone.nordicsemi.com/thread/267982?ContentTypeID=1</link><pubDate>Fri, 04 Sep 2020 08:36:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:85d24c26-864e-4e26-bf7d-3cc4d6cffa97</guid><dc:creator>Edvin</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Sorry for the late reply. I am trying to reach out to our Thread team. I will keep you updated as soon as I know more. Just wanted to let you know that this ticket isn&amp;#39;t &amp;quot;lost&amp;quot;.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Edvin&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>