Hello,
I'm trying to connect to a TCP server with TLS enabled, on nRF7002-DK.
By debugging step by step, I observed that `mbedtls_ssl_handshake()` function returned error -2700 (MBEDTLS_ERR_X509_CERT_VERIFY_FAILED). Error description is "Certificate verification failed, e.g. CRL, CA or signature check failed."
I searched similar issues on devzone and google, and it seems that this error could be due (beyond others things) to a CA certificate generated from 1024-bit RSA key (minimal key size should be 2048 bits, shouldn't it ?).
Running the following command tends to confirm that:
`openssl s_client -connect <hostname>:<port>`
(<hostname> is my customer's server)
The output mentions:
`verify error:num=66:EE certificate key too weak`
and a little bit further:
`a:PKEY: rsaEncryption, 1024 (bit); sigalg: RSA-SHA256`
Besides, the output mentions:
```
depth=0 [...] CN = some_domain.net
depth=1 [...] CN = Some Authority
```
Do you think that error MBEDTLS_ERR_X509_CERT_VERIFY_FAILED could be due to a wrong CA ? (by 'wrong' CA, I mean: 'wrong CA generated by the server')
Julien