<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/100826/nrf7002dk-and-tls-sockets--7100-error</link><description>Hey everyone, 
 We have been struggling to get our nRF7002DK connected to any HTTPS server. We&amp;#39;ve stripped back our evaluation setup to use &amp;quot;google.com&amp;quot; with the example &amp;quot;globalsign_r1&amp;quot; cert and are still running into the same -7100 TLS handshake error</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 14 Jan 2025 14:13:11 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/100826/nrf7002dk-and-tls-sockets--7100-error" /><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/518255?ContentTypeID=1</link><pubDate>Tue, 14 Jan 2025 14:13:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:959001e5-b551-4d22-9db5-76ee33a31587</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;My colleague Amanda will handle your existing case. Please continue discussion there.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/518207?ContentTypeID=1</link><pubDate>Mon, 13 Jan 2025 15:54:50 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fac179fd-8933-485b-a2e4-738eb0b7f261</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;The ticket for my diificulties getting a &amp;#39;good&amp;#39; minimal TLS config on NCS2.8 is here:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e"&gt;nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Any insight into a way to get a config that takes up minimal flash for TLS1.2 operation (equivalent to the zephyr &amp;#39;pure&amp;#39; config in zephyr/modules/mbedtls/configs/config-mini-tls1_2.h) on NCS2.8 would be great!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/518120?ContentTypeID=1</link><pubDate>Mon, 13 Jan 2025 10:27:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:020c8237-77c1-4c2a-b02e-3e1d019bd056</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi Brian&lt;/p&gt;
&lt;p&gt;Please note that a lot have changed in the last years, and NCS 2.8.0 was not out when Torbjørn made this reply, so there are a few things that likely have changed. If you&amp;#39;re not able to find answers in this post. Please create a new ticket on DevZone, describing your problem in detail, and an engineer will be assigned and take a proper look.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/518010?ContentTypeID=1</link><pubDate>Fri, 10 Jan 2025 16:47:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:64c08ff5-11ce-4465-bdf2-c07755d70463</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;the NCS 2.8 documentation indicates that both CC3xx and Oberon backends are limited to 3K RSA keys in &amp;#39;legacy&amp;#39; mode it seems:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-2.8.0/page/nrf/libraries/security/nrf_security/doc/backend_config.html#rsa_configurations"&gt;https://docs.nordicsemi.com/bundle/ncs-2.8.0/page/nrf/libraries/security/nrf_security/doc/backend_config.html#rsa_configurations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;and here it says in PSA type operation CC310 limited to 3K, but Oberon can do 4K!&lt;/p&gt;
&lt;p&gt;Will attempt to try this...&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/517996?ContentTypeID=1</link><pubDate>Fri, 10 Jan 2025 15:37:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:15d050a7-fda3-4e3d-89a8-cdeeb6c45e1c</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;I have the same problem : but the change to the CC3XX isn&amp;#39;t working for me (breaks the build) - I&amp;#39;m using NCS 2.8 - what version did you test on?&lt;/p&gt;
&lt;p&gt;What is the Nordic recommendation to getting https to work? I would also note that the flash space required for mbedtls and associated code (wifi WPA supp for example) is bloated, and causing me serious issues on nrf5340.... A prj.conf &amp;#39;minimal TLS 1.2&amp;#39; example that will work for 4K RSA certificate (very common on the web services now) would be very useful!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/466422?ContentTypeID=1</link><pubDate>Mon, 29 Jan 2024 09:13:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:24abbf61-5df7-46a1-99fb-2f07f06d2900</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi Gilles&lt;/p&gt;
&lt;p&gt;The Oberon backend doesn&amp;#39;t support key sizes larger than 3K, which is the reason this didn&amp;#39;t work.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have&amp;nbsp;registered a ticket internally to add support for 4k keys, but exactly when this will happen is not yet known.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/466211?ContentTypeID=1</link><pubDate>Fri, 26 Jan 2024 12:38:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c30657e4-2066-45ee-8259-158517b43469</guid><dc:creator>GilDev</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Any news about this matter?&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/435137?ContentTypeID=1</link><pubDate>Fri, 07 Jul 2023 08:01:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fa5a96df-9842-4f38-bd5a-b9ea5b66493b</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Oberon backend seems to struggle with 4096 bit RSA operations, but unfortunately we won&amp;#39;t really be able to look into this until the crypto experts are back from vacation over the summer.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In August most people should be back in office, and we will try to provide a more satisfactory conclusion to this issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/435050?ContentTypeID=1</link><pubDate>Thu, 06 Jul 2023 15:17:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9c195268-f685-4e26-9e68-4581512c5cd2</guid><dc:creator>nealjack</dc:creator><description>&lt;p&gt;Can you update us when you figure out why the cryptocell backend works but the oberon one does not? I am currently unable to use the cryptocell backend due to a conflict with Openthread (see &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/98717/zephyr-bus-fault-when-using-psa-crypto-with-cc310-and-openthread-l2-layer"&gt;this issue&lt;/a&gt;), and am having the same issue with mbedtls (&lt;span&gt;0x3b00) trying to parse a&amp;nbsp;certificate.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/434112?ContentTypeID=1</link><pubDate>Mon, 03 Jul 2023 08:22:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:81db188b-1cc2-47ca-ab73-83b729706fdf</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Great that you were able to get it working Eric &lt;span class="emoticon" data-url="https://devzone.nordicsemi.com/cfs-file/__key/system/emoji/1f642.svg" title="Slight smile"&gt;&amp;#x1f642;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;It seems you have both got it working then, and I will consider this case resolved.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433806?ContentTypeID=1</link><pubDate>Thu, 29 Jun 2023 22:53:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f3d9aa5e-ab6d-4e91-b8c8-0670ce01faa7</guid><dc:creator>erichotterbeefcurry</dc:creator><description>&lt;p&gt;I was able to make HTTPS request too! I followed Kyle&amp;#39;s steps where I had to convert my .pem to .der using openssh and I had to add an authroziation bearer token with my GET request, but I was able to correctly receive response from both Google and our internal server. Thanks Nordic folks for keep working on this!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433783?ContentTypeID=1</link><pubDate>Thu, 29 Jun 2023 18:36:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:542c9878-bd9d-4734-9075-720b01bbccc9</guid><dc:creator>Kyle1</dc:creator><description>&lt;p&gt;I ended up digging into it a little further, the cert needs to be the cert for the root CA and not for the domain, So i was able to get the cert for `DigiCertGlobalRootG2` which signed the&amp;nbsp;&lt;span&gt;`*.azurewebsites.net`&amp;nbsp;certificate, converted it into the der format, using command mentioned above and now I get data back from the azure site.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433772?ContentTypeID=1</link><pubDate>Thu, 29 Jun 2023 17:53:50 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:85a2fbca-4963-44f8-a841-0aee65d96b26</guid><dc:creator>Kyle1</dc:creator><description>&lt;p&gt;I&amp;#39;ve changed it to hit an azurewebsites.net domain instead of google.com and I am running into this issue&lt;/p&gt;
&lt;p&gt;&amp;lt;err&amp;gt; net_sock_tls: TLS handshake error: -2700&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;I tried keeping the `globalsign_r1.der` then I tried to get the wildcard cert for `*.azurewebsites.net` and converetd it into a der from a pem with&lt;/p&gt;
&lt;p&gt;`openssl x509 -in ./azurewebsites.pem -out azurewebsites.der -outform DER`&lt;/p&gt;
&lt;p&gt;Updated CMakeList.txt and ca_certificate.h for the change in cert&lt;/p&gt;
&lt;p&gt;But still got the -2700 error.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Is there any more information on how that .der certificate should be generated? is it site specific? of is this -2700 error something unrelated?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433763?ContentTypeID=1</link><pubDate>Thu, 29 Jun 2023 16:32:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1faeee4e-32eb-4d1d-9664-f58f0a074259</guid><dc:creator>erichotterbeefcurry</dc:creator><description>&lt;p&gt;Hi Torbjoin, ah ok I didn&amp;#39;t realize the client request can return positive values too. Thank you and the team so much for working on top of this! Do you mind elaborating more on why I got the 301 request error, &amp;quot;Moved Permanently&amp;quot;? I suppose that meant we made a HTTPS connection to Google but something went wrong, and it sounds like Jeremy didn&amp;#39;t get this request error.&lt;/p&gt;
&lt;p&gt;-Best,&lt;/p&gt;
&lt;p&gt;Eric&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433641?ContentTypeID=1</link><pubDate>Thu, 29 Jun 2023 10:38:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:77708634-ff2a-495c-a46d-03df85a5c6a8</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi guys&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Glad to hear you got it working Jeremy &lt;span class="emoticon" data-url="https://devzone.nordicsemi.com/cfs-file/__key/system/emoji/1f642.svg" title="Slight smile"&gt;&amp;#x1f642;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The crypto experts are still discussing this. The assumption was that the CC312 backend did not support 4096 bit keys, and that is why&amp;nbsp;the Oberon backend was enabled instead. It seems the CC312 do indeed support various 4096 bit key operations, it is just key generation that is limited to 3072 bits. Why Oberon doesn&amp;#39;t work is not properly understood yet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We might have to continue this discussion over the summer as a lot of people are on vacation at the moment, but we will try to get to the bottom of this eventually.&amp;nbsp;&lt;/p&gt;
[quote user="libochengll"]but am still getting a&amp;nbsp;http_client_req() failed?, err 40 (which is Lv3 Reset...?)[/quote]
&lt;p&gt;I think this is just an inconsistency in the application. A positive return from the http_client_req() function is actually not an error, it just tells you how many bytes were returned. A negative value would indicate an error.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433556?ContentTypeID=1</link><pubDate>Wed, 28 Jun 2023 21:25:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a88dc267-443b-43e7-892f-d7a4deb9adea</guid><dc:creator>erichotterbeefcurry</dc:creator><description>&lt;p&gt;Hi Jeremy, I tried using Tobjorn&amp;#39;s updated prj.conf and the code from your wifi_zeph_2_4.zip but am still getting a&amp;nbsp;http_client_req() failed?, err 40 (which is Lv3 Reset...?), with the http response saying &amp;quot;Moved Permanently&amp;quot;, which is a 301 error.&amp;nbsp; I&amp;#39;m wondering if you had to change anything from the&amp;nbsp;zipped folder&amp;nbsp;to make it work or did I do anything wrong?&lt;/p&gt;
&lt;p&gt;-Eric&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433547?ContentTypeID=1</link><pubDate>Wed, 28 Jun 2023 20:00:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:405b48ca-8c0e-4dcc-9643-0e00ee57cc2e</guid><dc:creator>ATC-Jeremy</dc:creator><description>&lt;p&gt;Hey Torbj&amp;oslash;rn,&lt;/p&gt;
&lt;p&gt;This worked great for &amp;quot;google.com&amp;quot; with the provided cert! I&amp;#39;ll verify this answer for now since this seems like it would help most people get up and running with TLS on the 7002. Unfortunately, we&amp;#39;re still running into issues with our actual production webserver and certs, but at this point it could easily be a misconfiguration on our end.&lt;/p&gt;
&lt;p&gt;Let us know if you guys figure out anything else (e.g. Why doesn&amp;#39;t Oberon work? Do all of the supported ciphersuites work with CC3XX? etc), and we&amp;#39;ll continue testing/reconfiguring on our end.&lt;/p&gt;
&lt;p&gt;Thank you, this was a great step forward!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433368?ContentTypeID=1</link><pubDate>Wed, 28 Jun 2023 07:21:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:89ac9370-e1dc-456a-8f6f-71cedc17283a</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi Jeremy&lt;/p&gt;
&lt;p&gt;The hunt for a fix continues.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;One of my colleagues was able to get TLS working by changing the crypto backend used from the Oberon backend to the CC3XX backend. We still don&amp;#39;t quite understand why this fixes the issue, but I double checked that this worked on my end as well &lt;span class="emoticon" data-url="https://devzone.nordicsemi.com/cfs-file/__key/system/emoji/1f609.svg" title="Wink"&gt;&amp;#x1f609;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Could you give this a go?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Updated prj.conf below:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;# WiFi Console Support.
CONFIG_EARLY_CONSOLE=y

# Network buffers
CONFIG_NET_MAX_CONTEXTS=6
CONFIG_NET_PKT_RX_COUNT=16
CONFIG_NET_PKT_TX_COUNT=16
CONFIG_NET_BUF_RX_COUNT=80
CONFIG_NET_BUF_TX_COUNT=80
CONFIG_NET_BUF_DATA_SIZE=512
CONFIG_HEAP_MEM_POOL_SIZE=120000
CONFIG_NET_TC_TX_COUNT=0

CONFIG_INIT_STACKS=y

CONFIG_NET_SHELL=y

CONFIG_NET_STATISTICS=y
CONFIG_NET_STATISTICS_PERIODIC_OUTPUT=n

# Networking
CONFIG_WIFI=y
CONFIG_WIFI_LOG_LEVEL_ERR=y
CONFIG_NET_L2_WIFI_SHELL=y
CONFIG_NET_CONFIG_SETTINGS=y
CONFIG_NETWORKING=y
CONFIG_NET_LOG=y
CONFIG_NET_IPV6=n
CONFIG_NET_IPV4=y
CONFIG_NET_UDP=y
CONFIG_NET_TCP=y
CONFIG_NET_DHCPV4=y

CONFIG_NET_IF_UNICAST_IPV4_ADDR_COUNT=1
CONFIG_NET_CONTEXT_SYNC_RECV=y

CONFIG_DNS_RESOLVER=y
CONFIG_JSON_LIBRARY=y

# Memories
CONFIG_MAIN_STACK_SIZE=8192
CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=4096
CONFIG_NET_TX_STACK_SIZE=4096
CONFIG_NET_RX_STACK_SIZE=4096

CONFIG_IDLE_STACK_SIZE=640
CONFIG_ISR_STACK_SIZE=4096
CONFIG_SHELL_STACK_SIZE=4096

# Debugging
CONFIG_STACK_SENTINEL=y
CONFIG_DEBUG_COREDUMP=y
CONFIG_DEBUG_COREDUMP_BACKEND_LOGGING=y
CONFIG_DEBUG_COREDUMP_MEMORY_DUMP_MIN=y
CONFIG_SHELL_CMDS_RESIZE=n

CONFIG_NET_SOCKETS_LOG_LEVEL_DBG=y
CONFIG_NET_DEBUG_NET_PKT_ALLOC=y
CONFIG_NET_BUF_POOL_USAGE=y
CONFIG_MBEDTLS_DEBUG_C=y
CONFIG_MBEDTLS_DEBUG_LEVEL=4

# Logging
CONFIG_LOG=y
CONFIG_LOG_BUFFER_SIZE=2048
CONFIG_POSIX_CLOCK=y
#CONFIG_LOG_DEFAULT_LEVEL=4

# HTTP
CONFIG_HTTP_CLIENT=y

# Websockets Support.
CONFIG_NET_SOCKETS=y
CONFIG_NET_SOCKETS_POSIX_NAMES=y
# TLS networking
CONFIG_POSIX_MAX_FDS=16
CONFIG_NET_SOCKETS_ENABLE_DTLS=n
CONFIG_NET_SOCKETS_TLS_MAX_CIPHERSUITES=16
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y
CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=6
CONFIG_TLS_CREDENTIALS=y

# mbed TLS and security
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_SSL_IN_CONTENT_LEN=16384
CONFIG_MBEDTLS_SSL_OUT_CONTENT_LEN=16384
CONFIG_MBEDTLS_HEAP_SIZE=128000
CONFIG_MBEDTLS_TLS_LIBRARY=y
CONFIG_MBEDTLS_X509_LIBRARY=y
CONFIG_MBEDTLS_PKCS1_V15=y
CONFIG_NRF_SECURITY_ADVANCED=y
CONFIG_NORDIC_SECURITY_BACKEND=y
CONFIG_PSA_WANT_ALG_SHA_1=y
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_CRYPT=y
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_SIGN=y
CONFIG_PSA_WANT_ECC_SECP_R1_256=y
CONFIG_MBEDTLS_SSL_DEBUG_ALL=y
CONFIG_MBEDTLS_LOG_LEVEL_DBG=y
CONFIG_CC3XX_BACKEND=y
CONFIG_OBERON_BACKEND=n

CONFIG_MBEDTLS_DEBUG=n
#CONFIG_MBEDTLS_LOG_LEVEL_INF=y

CONFIG_MBEDTLS_SSL_RENEGOTIATION=y
CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y
CONFIG_MBEDTLS_KEY_EXCHANGE_ALL_ENABLED=y
CONFIG_MBEDTLS_ECP_ALL_ENABLED=y
CONFIG_MBEDTLS_CIPHER_ALL_ENABLED=y
CONFIG_MBEDTLS_SSL_SESSION_TICKETS=y
CONFIG_MBEDTLS_SSL_CACHE_C=y
CONFIG_MBEDTLS_SSL_TICKET_C=y
CONFIG_PSA_WANT_ECC_TWISTED_EDWARDS_255=y
CONFIG_PSA_CRYPTO_DRIVER_ECC_TWISTED_EDWARDS_255_OBERON=y
CONFIG_MBEDTLS_RSA_C=y

# SNTP Support.
CONFIG_SNTP=y

# Glue - Fixes documented bugs in nRF7002 implementation.
CONFIG_WIFI_NRF700X=y
CONFIG_NET_L2_ETHERNET=y

# Include WPA Supplement. Requires POSIX_API &amp;amp; NET_SOCKETS.
CONFIG_WPA_SUPP=y

# Required to prevent error in \wifi\nrf700x\zephyr\src\shim.c:14:10: fatal error: sys/time.h: No such file or directory
CONFIG_NEWLIB_LIBC=y
CONFIG_NEWLIB_LIBC_NANO=n

# Required to prevent undefined reference to `z_impl_sys_rand32_get&amp;#39;
CONFIG_ENTROPY_GENERATOR=y
CONFIG_TEST_RANDOM_GENERATOR=y

# printing of scan results puts pressure on queues in new locking
# design in net_mgmt. So, use a higher timeout for a crowded
# environment.
CONFIG_NET_MGMT_EVENT_QUEUE_TIMEOUT=5000

CONFIG_DEBUG_THREAD_INFO=y
CONFIG_DEBUG_OPTIMIZATIONS=y

CONFIG_NET_TCP_WORKQ_STACK_SIZE=4096&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433278?ContentTypeID=1</link><pubDate>Tue, 27 Jun 2023 13:51:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:381b94d8-a06e-496e-ad44-d189f245d0e3</guid><dc:creator>ATC-Jeremy</dc:creator><description>&lt;p&gt;Fantastic, thank you Torbj&amp;oslash;rn!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/433056?ContentTypeID=1</link><pubDate>Mon, 26 Jun 2023 20:28:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5b7a26d2-2139-4903-bfa3-5f128db5e547</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi Jeremy&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks for sharing the code.&amp;nbsp;There has been some sideways progress on my side (replacing one error for another), but nothing definite yet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I made some changes to the project configuration based on&amp;nbsp;input from a colleague:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;# mbed TLS and security
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_SSL_IN_CONTENT_LEN=16384
CONFIG_MBEDTLS_SSL_OUT_CONTENT_LEN=16384
CONFIG_MBEDTLS_HEAP_SIZE=128000
CONFIG_MBEDTLS_TLS_LIBRARY=y
CONFIG_MBEDTLS_X509_LIBRARY=y
CONFIG_MBEDTLS_PKCS1_V15=y
CONFIG_NRF_SECURITY_ADVANCED=y
CONFIG_NORDIC_SECURITY_BACKEND=y
CONFIG_PSA_WANT_ALG_SHA_1=y
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_CRYPT=y
CONFIG_PSA_WANT_ALG_RSA_PKCS1V15_SIGN=y
CONFIG_MBEDTLS_SSL_DEBUG_ALL=y
CONFIG_MBEDTLS_LOG_LEVEL_DBG=y
#CONFIG_MBEDTLS_DEBUG=y
#CONFIG_MBEDTLS_DEBUG_C=y
CONFIG_MBEDTLS_SSL_RENEGOTIATION=y
CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y
CONFIG_MBEDTLS_KEY_EXCHANGE_ALL_ENABLED=y
CONFIG_MBEDTLS_ECP_ALL_ENABLED=y
CONFIG_MBEDTLS_CIPHER_ALL_ENABLED=y
CONFIG_MBEDTLS_SSL_SESSION_TICKETS=y
CONFIG_MBEDTLS_SSL_CACHE_C=y
CONFIG_MBEDTLS_SSL_TICKET_C=y
CONFIG_PSA_WANT_ECC_TWISTED_EDWARDS_255=y
CONFIG_PSA_CRYPTO_DRIVER_ECC_TWISTED_EDWARDS_255_OBERON=y
CONFIG_MBEDTLS_RSA_C=y

CONFIG_NET_TCP_WORKQ_STACK_SIZE=4096&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Now I get the 0x3b00 error instead (MBEDTLS_ERR_PK_INVALID_PUBKEY), as discussed in &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/100784/tls-handshake-error--3b00-on-nrf7002"&gt;this case&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If I replace google.com with example.com I get 0x2700 (MBEDTLS_ERR_X509_CERT_VERIFY_FAILED).&lt;/p&gt;
&lt;p&gt;In other words more work is needed. I will provide an update as soon as I have more to share.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/432982?ContentTypeID=1</link><pubDate>Mon, 26 Jun 2023 12:56:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b193647c-066e-4d29-9111-51c62184498a</guid><dc:creator>ATC-Jeremy</dc:creator><description>&lt;p&gt;Hi Eric,&lt;/p&gt;
&lt;p&gt;Unfortunately we have not made any additional progress.&lt;/p&gt;
&lt;p&gt;-Jeremy&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/432781?ContentTypeID=1</link><pubDate>Fri, 23 Jun 2023 21:43:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:713a88de-c073-4b3d-8aa0-d4fbc27728df</guid><dc:creator>erichotterbeefcurry</dc:creator><description>&lt;p&gt;Hi Jeremy, I am experiencing the same problem too. I have a nrf7002DK and was able to get HTTP request working, but trying to add TLS and send HTTPS request gives me a 22 (EINVAL) error at connect(). Our code looks generally the same, so I assume we&amp;#39;re in the same boat... Have you made any progress since posting? And please let me know if I can help you in any ways!&lt;/p&gt;
&lt;p&gt;-Eric&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/432764?ContentTypeID=1</link><pubDate>Fri, 23 Jun 2023 17:28:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ea1200e8-643e-4431-8a57-cfcdff74fe8a</guid><dc:creator>ATC-Jeremy</dc:creator><description>&lt;p&gt;Hey Torbj&amp;oslash;rn,&lt;/p&gt;
&lt;p&gt;Sorry for the delay, I&amp;#39;m attaching a zipped project to this reply. I deleted the build directory to keep the size sane. We didn&amp;#39;t have any additonal customizations to the build directory, so generating a new one on your end shouldn&amp;#39;t make a difference hopefully. There&amp;#39;s no company specific info or private keys/certs, so I shouldn&amp;#39;t get into any trouble sharing this haha.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/wifi_5F00_zeph_5F00_2_5F00_4.zip"&gt;devzone.nordicsemi.com/.../wifi_5F00_zeph_5F00_2_5F00_4.zip&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/432029?ContentTypeID=1</link><pubDate>Tue, 20 Jun 2023 13:10:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d0ea7590-a3bb-4a97-9b05-5a9b25ec1499</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi again&lt;/p&gt;
&lt;p&gt;Is there any chance you could share your project with me so I can test it here?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It seems we don&amp;#39;t have any proper HTTPS examples internally. I hope we can provide one soon enough, but I doubt we will be able to get a proper one together until after the summer.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF7002DK and TLS Sockets -7100 error</title><link>https://devzone.nordicsemi.com/thread/431423?ContentTypeID=1</link><pubDate>Fri, 16 Jun 2023 08:01:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b3dd588e-04a0-4bed-89de-22b08403cfa1</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi Jeremy&lt;/p&gt;
&lt;p&gt;I will try to reproduce your issue locally and see what might be the cause of the problem, but&amp;nbsp;I will need a bit more time. I will do my best to get back to you on Monday with an update.&lt;/p&gt;
&lt;p&gt;If there are any updates on your end in the mean time please let me know.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>