Other Parts Discussed in Thread: SHA-256
Tool/software:
Currently, we are utilizing the EAP-TLS functionality of the cc3235 module, and a self-signed certificate chain—including the intermediate certificate—can successfully establish a connection with the RADIUS server. However, when using a commercially signed certificate, the TLS handshake process prompts an "unknown CA" error. This commercial certificate is included in the trust list provided by the SDK, and we have verified its compatibility with TLS communication in our application, confirming that it is recognized by NWP. Therefore, we would like to understand how to properly validate the commercial certificate in EAP-TLS mode.
The organization we use the root certificate is
CN = DigiCert Global Root G2
OU = www.digicert.com
O = DigiCert Inc
C = US