<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e</link><description>Using Zephyr in NCS 2.8 on nrf5340/nrf7002 wifi combo, and trying to get https to work. I&amp;#39;m using the option where the TLS setup is done in the socket layer (enabled in prj.conf) 
 
 # use TLS in socket directly 
 CONFIG_NET_SOCKETS_SOCKOPT_TLS=y 
 CONFIG_TLS_CREDENTIALS</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 14 Jan 2026 02:42:14 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e" /><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/558654?ContentTypeID=1</link><pubDate>Wed, 14 Jan 2026 02:42:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3ba3f1b4-158f-4c75-bff4-4ec7da5b319b</guid><dc:creator>dave-dev</dc:creator><description>&lt;p&gt;Hi all,&lt;/p&gt;
&lt;p&gt;I&amp;#39;m stuck with this situation as well.&amp;nbsp; Of course, I want to use PSA but it&amp;#39;s not fully developed for offloaded sockets yet.&lt;/p&gt;
&lt;p&gt;It should be noted that offloaded sockets can&amp;#39;t use ECC keys either, if those keys have RSA signatures, which is what Amazon AWS signs ECC keys with.&amp;nbsp; There&amp;#39;s no way to change this that I&amp;#39;ve found, hence we are unable to connect to AWS using offloaded sockets.&lt;/p&gt;
&lt;p&gt;Any update on improving support for X.509 certificates when using mbedTLS, &lt;a href="https://devzone.nordicsemi.com/members/amanda"&gt;Amanda Hsieh&lt;/a&gt;&amp;nbsp;?&lt;/p&gt;
&lt;p&gt;Since there&amp;#39;s not enough&amp;nbsp;RAM on the nRF9160/61/51 to use PSA and mbedTLS together, the way forward is disabling PSA and all hardware crypto and using mbedTLS only, but this is not ideal.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/529531?ContentTypeID=1</link><pubDate>Fri, 28 Mar 2025 13:27:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4ac65ecc-d9bd-4bd9-aa64-2ff8dc2781e8</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;I am now on NCS 2.9, but still with just mbedtls as it seems the PSA integration in Zephyr/NCS is not yet fully operational.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I stil find it incredible how much flash/RAM is required to do a &amp;#39;simple&amp;#39; https GET over wifi using the nordic solution. It would be (IMHO) very much to Nordics benefit if they put some effort into providing a minimal config setup that actually works in the real world (ie with mix of RSA up to 4K, common ECC curves etc) and doesn&amp;#39;t use up 2/3 of the available resources to do so....&lt;/p&gt;
&lt;p&gt;btw one of the reasons to move to 2.9 was to get fixes in the wifi, and to put the &amp;quot;wifi patches&amp;#39; (aka the nrf70 firmware) into the external flash as a DFU able image - that saved me nearly 80kB flash right there.... I lost a little to mcuboot (68kB) to be able to get 3 image DFUable system with the serial recovery over USB vcom, but it was worth it to gain the 80kB of wifi fw space....&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/529371?ContentTypeID=1</link><pubDate>Thu, 27 Mar 2025 18:24:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:84e3e090-9674-48bc-981d-b76f0de65a00</guid><dc:creator>Dominic</dc:creator><description>&lt;p&gt;&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/119170/nrf9160-offloaded-sockets-can-t-use-mbedtls_use_psa_crypto-with-rsa-certificates"&gt;nRF9160: Offloaded sockets can&amp;#39;t use MBEDTLS_USE_PSA_CRYPTO with RSA Certificates&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This is the problem I think.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/529368?ContentTypeID=1</link><pubDate>Thu, 27 Mar 2025 17:50:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2c4ec059-fb38-46f0-879a-0dd3af24403d</guid><dc:creator>Dominic</dc:creator><description>&lt;p class="" data-start="244" data-end="251"&gt;Hi all,&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;I&amp;#39;m working with the nRF9151 and running into a similar frustrating issue around using PSA Crypto with mbedTLS in the nRF Connect SDK. Specifically, I&amp;#39;m trying to minimize flash and RAM usage for a secure HTTP client like &lt;a href="https://devzone.nordicsemi.com/members/brianw"&gt;BrianW&lt;/a&gt;&amp;nbsp;, and I&amp;rsquo;m finding the documentation around PSA integration with mbedTLS to be very limited and unclear.&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;I started from the &lt;code data-start="607" data-end="621"&gt;https_client&lt;/code&gt; sample in NCS. While it works, the flash and RAM footprint is quite large. I then explored using offloaded TLS (via modem firmware) to save space, but then had&amp;nbsp;errors due to the 2048 KB secure socket buffer limit. So I went back to the built-in mbedTLS stack with a goal of trimming it down by disabling unused features.That&amp;rsquo;s when things broke.&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;I&amp;#39;m trying to use PSA Crypto for all cryptographic operations, expecting that mbedTLS would then act as a thin wrapper over PSA. In particular, I enabled:&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;&lt;strong&gt;CONFIG_MBEDTLS_PSA_CRYPTO_C=y&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;CONFIG_MBEDTLS_USE_PSA_CRYPTO=y&lt;/strong&gt;&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;My understanding is that &lt;strong&gt;&lt;code data-start="1282" data-end="1315"&gt;CONFIG_MBEDTLS_USE_PSA_CRYPTO=y&lt;/code&gt;&lt;/strong&gt; tells mbedTLS to delegate all crypto (hashing, ECDSA, RSA, etc.) to PSA (TF-M or the CC3XX backend). This should ideally reduce flash usage by avoiding duplication.&lt;/p&gt;
&lt;p class="" data-start="253" data-end="562"&gt;But here&amp;#39;s the issue: the TLS handshake fails on certificate parsing when using certificates signed with RSA (e.g., &lt;code data-start="1602" data-end="1627"&gt;sha256WithRSAEncryption&lt;/code&gt;). The root cause appears to be that:&lt;/p&gt;
&lt;ul data-start="1666" data-end="1997"&gt;
&lt;li class="" data-start="1666" data-end="1805"&gt;
&lt;p class="" data-start="1668" data-end="1805"&gt;The X.509 parser in mbedTLS still needs to recognize and handle RSA signature OIDs, even if PSA is doing the actual verification.&lt;/p&gt;
&lt;/li&gt;
&lt;li class="" data-start="1806" data-end="1997"&gt;
&lt;p class="" data-start="1808" data-end="1997"&gt;However, enabling &lt;code data-start="1826" data-end="1850"&gt;CONFIG_MBEDTLS_RSA_C=y&lt;/code&gt; (which defines RSA support in mbedTLS) is not allowed when &lt;code data-start="1912" data-end="1945"&gt;CONFIG_MBEDTLS_USE_PSA_CRYPTO=y&lt;/code&gt; is enabled. These configs are mutually exclusive.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="" data-start="1999" data-end="2039"&gt;So I&amp;rsquo;m stuck in this awkward spot where:&lt;/p&gt;
&lt;ul data-start="2040" data-end="2170"&gt;
&lt;li class="" data-start="2040" data-end="2072"&gt;
&lt;p class="" data-start="2042" data-end="2072"&gt;PSA can handle RSA signatures,&lt;/p&gt;
&lt;/li&gt;
&lt;li class="" data-start="2073" data-end="2170"&gt;
&lt;p class="" data-start="2075" data-end="2170"&gt;But mbedTLS won&amp;#39;t parse or recognize them because RSA is not compiled into the legacy code.&lt;/p&gt;
&lt;/li&gt;
&lt;li class="" data-start="2073" data-end="2170"&gt;I end up disabling&amp;nbsp;&lt;span&gt;CONFIG_MBEDTLS_USE_PSA_CRYPTO and back to square one with my flash size.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="" data-start="2198" data-end="2295"&gt;What&amp;rsquo;s confusing is that the boundaries between PSA and legacy mbedTLS are poorly documented:&lt;/p&gt;
&lt;ul data-start="2296" data-end="2426"&gt;
&lt;li class="" data-start="2296" data-end="2334"&gt;
&lt;p class="" data-start="2298" data-end="2334"&gt;Which parts of mbedTLS are &amp;quot;legacy&amp;quot;?&lt;/p&gt;
&lt;/li&gt;
&lt;li class="" data-start="2335" data-end="2364"&gt;
&lt;p class="" data-start="2337" data-end="2364"&gt;What gets offloaded to PSA?&lt;/p&gt;
&lt;/li&gt;
&lt;li class="" data-start="2365" data-end="2426"&gt;
&lt;p class="" data-start="2367" data-end="2426"&gt;What minimal configuration is required for PSA-only builds?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="" data-start="2428" data-end="2686"&gt;It seems like mbedTLS still depends on legacy code for parsing and algorithm mapping, even when crypto execution is handled by PSA. But this isn&amp;rsquo;t documented clearly, and the Kconfig dependencies make it easy to break things by disabling unused features.&amp;nbsp;&lt;/p&gt;
&lt;p class="" data-start="2428" data-end="2686"&gt;It would also to have to some examples of MINIMAL builds. Please can you let me know if the above is a bug?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/519847?ContentTypeID=1</link><pubDate>Thu, 23 Jan 2025 16:27:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b5898e0a-016b-48f0-9b62-dfb497ae9611</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;Just to provide a quick summary of the prj.conf I required to get my https connection to work&lt;/p&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NRF_SECURITY=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_LIBRARY_NRF_SECURITY=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;# TLS configuration - don&amp;#39;t want everything in mbedtls as far too big&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_CUSTOM_MBEDTLS_CFG_FILE=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-mini-tls1_2.h&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_DTLS=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_TLS_VERSION_1_2=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_RSA_C=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_ECP_C=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_MBEDTLS_ECDH_C=n &amp;nbsp; &amp;nbsp;this breaks kconfig&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_MBEDTLS_ECDSA_C=n &amp;nbsp; this fixes kconfig, but breaks compile of hostap&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;# PSA WANT request does nothing as PSA is not actually enabled?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_4096=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_2048=y&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_HAVE_TIME_DATE=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_SSL_IN_CONTENT_LEN=16384&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_SSL_OUT_CONTENT_LEN=16384&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_MPI_MAX_SIZE=512&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NET_SOCKETS_TLS_SET_MAX_FRAGMENT_LENGTH=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_SSL_RENEGOTIATION=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=3&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_PSA_WANT_ECC_SECP_R1_256=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_PSA_WANT_ECC_MONTGOMERY_255=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;# use TLS in socket directly&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NET_SOCKETS_SOCKOPT_TLS=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_TLS_CREDENTIALS=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_TLS_MAX_CREDENTIALS_NUMBER=10&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NET_SOCKETS_TLS_MAX_CREDENTIALS=10&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;As I said above, it was the requirement for SNI that was the last stumbling block... but the rest is probably required for me to use 2048 and 4096 RSA signed DER certificates loaded into the TLS socket.&lt;/p&gt;
&lt;p&gt;This does not include the various memory / buffer / max configs neccessary to get the code and the RAM to fit in a nrf53; your milage will definitely vary for the optimum values for your app!&lt;/p&gt;
&lt;p&gt;Thanks Amanda!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/519777?ContentTypeID=1</link><pubDate>Thu, 23 Jan 2025 13:41:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f4ff83e5-65c3-4699-9d8e-35565ecc6b59</guid><dc:creator>BrianW</dc:creator><description>[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/519652"]&lt;blockquote class="quote"&gt;&lt;div class="quote-user"&gt;BrianW said:&lt;/div&gt;&lt;div class="quote-content"&gt; is it not possible to provide TLS with the server&amp;#39;s certificate directly? Does it have to have a CA/CA certificate to work?&lt;/div&gt;&lt;/blockquote&gt;&lt;div class="quote-footer"&gt;&lt;/div&gt;
&lt;p&gt;You can add with&amp;nbsp;TLS_CREDENTIAL_SERVER_CERTIFICATE. See&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/zephyr/connectivity/networking/api/sockets.html#tls_credentials_subsystem"&gt;TLS credentials subsystem&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;[/quote]
&lt;p&gt;This doesn&amp;#39;t seem to work for me. Specifically for the test site&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a id="" href="https://eu.httpbin.org"&gt;https://eu.httpbin.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;if I load the DER certificate for the root CA of this site (as TLS_CREDENTIAL_CA_CERTIFICATE), it works. If I don&amp;#39;t load it, but instead load the server&amp;#39;s DER certificate (as&amp;nbsp;TLS_CREDENTIAL_SERVER_CERTIFICATE), then it fails with -0x2700...&lt;/p&gt;
&lt;p&gt;(both certificates retrieved from&amp;nbsp;Chrome web browser)&lt;/p&gt;
&lt;p&gt;The documentation as to exactly what the TLS_CREDENTIAL_SERVER_CERTIFICATE is expected to do is missing; but when I looked in the code it seemed more like provision of a certificate used to validate TLS operations when running a http server locally (ie server side not client side). Is this correct?&lt;/p&gt;
[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/519652"]Yes, the device needs to have the correct time and date to properly validate certificate validity periods. See the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/zephyr/security/sensor-threat.html#assets" rel="noopener noreferrer" target="_blank"&gt;Sensor Device Threat Model documentation&lt;/a&gt;.&amp;nbsp;[/quote]
&lt;p&gt;I found this discussion&amp;nbsp;&lt;a id="" href="https://github.com/zephyrproject-rtos/zephyr/issues/35401,"&gt;https://github.com/zephyrproject-rtos/zephyr/issues/35401,&lt;/a&gt;&amp;nbsp;where it appears that it should be possible to disable the date/time validity check (my device does not have a secure date/time source) by doing&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_MBEDTLS_HAVE_TIME_DATE&lt;/span&gt;&lt;span&gt;=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;However this made no difference to the operation and the kconfig says it was &amp;#39;n&amp;#39; anyway!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;This makes sense, as the eu.httpbin.org CA certificate also has validity dates, but works....&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/519652"]Could&amp;nbsp;you try with adding&amp;nbsp;CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y in the prj.conf?[/quote]
&lt;p&gt;YES! this seems to be the magic for my server - fixes it for both 2048bit RSA CA certificates (which I had reconfigured my server to use, and also for 4096bit ones as served by the LetsEncrypt CA server.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I was not aware of the SNI part of TLS, nor indeed that my server using multiple domains on the same host would need it! And hence https to my server failed, but other work... &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;(obligatory moan :&amp;nbsp; if the code had a slightly more explicit log&amp;nbsp; than error -0x2700, or if this error was documented as being &amp;quot;you need SNI enabled&amp;quot; then I might have got here quicker...)&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/519652?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2025 21:44:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c43aecad-e3d0-43a2-97fa-40066415f564</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
[quote user="BrianW"]Even if I provision this certificate in the TLS socket, the connection fails with the handsshake error -0x2700. This happens both with a generated certificate and also with the traefik auto generated certificate.[/quote]
&lt;p&gt;Could&amp;nbsp;you try with adding&amp;nbsp;CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y in the prj.conf? Please see refer to&amp;nbsp;&lt;a href="https://academy.nordicsemi.com/courses/wi-fi-fundamentals/lessons/lesson-5-wifi-fundamentals/topic/lesson-5-exercise-2-2/"&gt;https://academy.nordicsemi.com/courses/wi-fi-fundamentals/lessons/lesson-5-wifi-fundamentals/topic/lesson-5-exercise-2-2/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
[quote user="BrianW"] is it not possible to provide TLS with the server&amp;#39;s certificate directly? Does it have to have a CA/CA certificate to work?[/quote]
&lt;p&gt;You can add with&amp;nbsp;TLS_CREDENTIAL_SERVER_CERTIFICATE. See&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/zephyr/connectivity/networking/api/sockets.html#tls_credentials_subsystem"&gt;TLS credentials subsystem&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
[quote user="BrianW"]- the certificates have validaity dates. Does this mean that my device has to have the correct time/date to be able to validate this info?[/quote]
&lt;p&gt;Yes, the device needs to have the correct time and date to properly validate certificate validity periods. See the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/zephyr/security/sensor-threat.html#assets" rel="noopener noreferrer" target="_blank"&gt;Sensor Device Threat Model documentation&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;-Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/519611?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2025 15:33:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:004190c9-9d6d-4f65-9ec7-e5b2e2cf5051</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;My server now serves a self-signed certificate, with a 2048bit RSA key.&lt;/p&gt;
&lt;p&gt;Even if I provision this certificate in the TLS socket, the connection fails with the handsshake error -0x2700. This happens both with a generated certificate and also with the traefik auto generated certificate.&lt;/p&gt;
&lt;p&gt;2 questions:&lt;/p&gt;
&lt;p&gt;- is it not possible to provide TLS with the server&amp;#39;s certificate directly? Does it have to have a CA/CA certificate to work?&lt;/p&gt;
&lt;p&gt;- the certificates have validaity dates. Does this mean that my device has to have the correct time/date to be able to validate this info?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/519385?ContentTypeID=1</link><pubDate>Tue, 21 Jan 2025 17:08:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ec295b4d-6653-4917-adb1-ce1c6ca93ea2</guid><dc:creator>BrianW</dc:creator><description>[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/518919"]CONFIG_MBEDTLS_HEAP_SIZE=80000[/quote]
&lt;p&gt;No change, I already have&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_HEAP_MEM_POOL_SIZE&lt;/span&gt;&lt;span&gt;=89000&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;and mbedtls uses the sys heap as far as I understand&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;I reduced this to 84000 as the increased number of SOCKETS_TLS contexts overflows the RAM otherwise.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;[by the way, I have logs to monitor the heap usage every 60s during dev, and check that I don't run out of sysheap free space (which it doesn't)]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/518919"]CONFIG_MBEDTLS_SSL_RENEGOTIATION=y&lt;br /&gt;CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=6[/quote]&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;This made no difference to the https tests.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;a id="" href="https://eu.httpbin.org/get"&gt;https://eu.httpbin.org/get&lt;/a&gt;&amp;nbsp;: ok&lt;/div&gt;
&lt;div&gt;&amp;nbsp;- if I provision the top level amazon certif&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;a id="" href="https://server.infrafon.club/test"&gt;https://server.infrafon.club/test&lt;/a&gt;&amp;nbsp;: fails&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; &amp;lt;err&amp;gt; net_sock_tls: TLS handshake error: -0x2700&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;lt;wrn&amp;gt; app: httpmgr: Failed to connect socket (-1), [113]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;- this is my server, normally has a self-signed certificate RSA 2048 bits, which I provision in the TLS socket&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;a id="" href="https://example.com"&gt;https://example.com&lt;/a&gt;&amp;nbsp;: fails&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;lt;err&amp;gt; net_sock_tls: TLS handshake error: -0x2700&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;lt;wrn&amp;gt; app: httpmgr: Failed to connect socket (-1), [113]&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&amp;nbsp;- no CA certificate provisioned as they have 4096bit RSA keys and fail when these are enabled, so instead it fails when they are sent during TLS process (I assume)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518919?ContentTypeID=1</link><pubDate>Fri, 17 Jan 2025 21:43:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:899010e0-49de-4d29-9751-0320b541ca25</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Could you also add the following configs? and Let me know they can help or not.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;CONFIG_MBEDTLS_HEAP_SIZE=80000&lt;br /&gt;CONFIG_MBEDTLS_SSL_RENEGOTIATION=y&lt;br /&gt;CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=6&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518828?ContentTypeID=1</link><pubDate>Fri, 17 Jan 2025 11:35:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e3048d07-78ba-47e6-bc1b-71ecd77da64b</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;Well, depends which of the suggestions you mean?&lt;/p&gt;
&lt;p&gt;CONFIG_MBEDTLS_MPI_MAX_SIZE=512&lt;/p&gt;
&lt;p&gt;&lt;span&gt;- my build already has this as the default (maybe due to NCS 2.8?)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_SSL_IN_CONTENT_LEN=16384&lt;br /&gt;CONFIG_MBEDTLS_SSL_OUT_CONTENT_LEN=16384&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NET_SOCKETS_TLS_SET_MAX_FRAGMENT_LENGTH=n&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt;- again, already set to these values by default apparently&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Also, it doesn&amp;#39;t seem that the issue in that post is in fact resolved anyway?&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518712?ContentTypeID=1</link><pubDate>Thu, 16 Jan 2025 17:31:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5bd435c3-42ad-4bb2-af1b-132ea8235b20</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Could you try my colleague&amp;#39;s suggestion in &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/112792/nrf-connect-sdk-v2-6-1---https_client-works-for-example-com-but-not-other-hosts-such-as-google-com/497283"&gt;this post&lt;/a&gt;?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518697?ContentTypeID=1</link><pubDate>Thu, 16 Jan 2025 15:59:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7f803fd8-f507-4bfa-92b7-f5883090a869</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;So, today I have managed to get a state where:&lt;/p&gt;
&lt;p&gt;- can build the app&lt;/p&gt;
&lt;p&gt;- can parse RSA certificates if they only have a key up to 2048 bits&lt;/p&gt;
&lt;p&gt;- can do a https request successfully to a web server when its CA chain only includes certs that have RSA keys &amp;lt;2048 bits&lt;/p&gt;
&lt;p&gt;Example url that works (16 jan 2025)&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&lt;a href="https://eu.httpbin.org/get"&gt;https://eu.httpbin.org/get&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;but I cannot manage to build TLS code that can:&lt;/p&gt;
&lt;p&gt;- parse a certificate with a 4096bit RSA key (gives a&amp;nbsp;&amp;quot;Failed to parse CA certificate, err: -0x3b00)&lt;/p&gt;
&lt;p&gt;- parse a certificate with a EC key (not sure what algo)&lt;/p&gt;
&lt;p&gt;- connect to a server where the certificate chain will include a 4096 bit key (code gets an error during the TLS connect phase &amp;quot;net_sock_tls: TLS handshake error: -0x2700&amp;quot;)&lt;/p&gt;
&lt;p&gt;- connect to a server using a certificate with EC algo (again, not sure of the algo)&lt;/p&gt;
&lt;p&gt;Example of a site using EC certificates (16 jan 2025):&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&lt;a href="https://example.com"&gt;https://example.com&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Note : site USED to use a RSA certifcate with 2048 bits, and therefore used to work for me... the new certificate is marked as &amp;#39;valid from 15/1/2025!&lt;/p&gt;
&lt;p&gt;Example of a site url using 4096 bit RSA certificates in its chain:&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&lt;a href="https://timeapi.io/api/time/current/zone?timeZone=Europe%2FParis"&gt;https://timeapi.io/api/time/current/zone?timeZone=Europe%2FParis&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(another thing I don&amp;#39;t understand : if I give the TLS the certificate of the site itself, it doesn&amp;#39;t seem to work, I have to give it the certif of one of the CA in the signature chain above it? Is this normal?)&lt;/p&gt;
&lt;p&gt;I cannot find a prj.conf that enables either 4096bit RSA, or EC keys for whatever example.com uses.&lt;/p&gt;
&lt;p&gt;Relevant chunk of prj.conf : note the commented out keys are stuff I tried but it broke the build in one way or another. Networking is wifi (nrf7002) with wpa-supp from NCS 2.8.&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;CONFIG_NRF_SECURITY=y
CONFIG_MBEDTLS_LIBRARY_NRF_SECURITY=y
# TLS configuration - don&amp;#39;t want everything in mbedtls as far too big
#CONFIG_CUSTOM_MBEDTLS_CFG_FILE=y
#CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-mini-tls1_2.h&amp;quot;
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_DTLS=n
CONFIG_MBEDTLS_TLS_VERSION_1_2=y
CONFIG_MBEDTLS_RSA_C=y
CONFIG_MBEDTLS_ECP_C=n
#CONFIG_MBEDTLS_ECDH_C=n    this breaks kconfig
#CONFIG_MBEDTLS_ECDSA_C=n   this fixes kconfig, but breaks compile of hostap

#CONFIG_MBEDTLS_PSA_CRYPTO_C=y
#CONFIG_MBEDTLS_USE_PSA_CRYPTO=y
#CONFIG_PSA_CRYPTO_ENABLE_ALL=n
CONFIG_PSA_WANT_RSA_KEY_SIZE_4096=y
CONFIG_PSA_WANT_RSA_KEY_SIZE_2048=y

#CONFIG_MBEDTLS_MAC_ALL_ENABLED=n
#CONFIG_MBEDTLS_ECP_ALL_ENABLED=y  Failed, dont have some crypto implementations?
#CONFIG_MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED=n
#CONFIG_MBEDTLS_PK_C=y
#CONFIG_MBEDTLS_PK_PARSE_C=y
#CONFIG_MBEDTLS_PK_WRITE_C=y
#CONFIG_MBEDTLS_PKCS5_C=y

# save some flash by not having the PEM translate code (default is n)
#CONFIG_MBEDTLS_PEM_CERTIFICATE_FORMAT=n

# use CryptoCell backend not Oberon to avoid 0x3b00 error parsing certificates?
#CONFIG_CC3XX_BACKEND=y
#CONFIG_OBERON_BACKEND=n
# Use PSA
#CONFIG_MBEDTLS_LEGACY_CRYPTO_C=n&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Any comments or hints welcome, maybe this will help someone else. My way forward now is to create a &amp;quot;IOT device&amp;quot; specific web url on my server with a self-signed certif (RSA 2048) and hope that will work.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518557?ContentTypeID=1</link><pubDate>Thu, 16 Jan 2025 08:31:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:81313129-54f8-42f5-892d-ef89191fb7a5</guid><dc:creator>BrianW</dc:creator><description>[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/518506"]You can refer to the&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/test_and_optimize/optimizing/memory.html"&gt;Memory footprint optimization&lt;/a&gt;.&amp;nbsp;[/quote]
&lt;p&gt;Yes, I have already applied the principals from this page: however it does NOT offer any information about reducing the size of the crypto or wpa-supp code.&lt;/p&gt;
&lt;p&gt;I have already found that 2 methods can be useful : reducing the &amp;#39;compiled in logs level&amp;#39; in zephyr modules (using CONIFG_XXX_LOG_LEVEL_WRN=y to avoid info logs for module XXX) and disabling wpa-supplicant features (WPA3/AP/WEP/P2P etc).&amp;nbsp;&lt;/p&gt;
[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/518506"]That config file is only usable with MBEDTLS_BUILTIN. It can&amp;#39;t use a preconfigured header file with our system. You can however configure the features equivalent to what is the content of this file.&amp;nbsp;[/quote]
&lt;p&gt;Any examples of a config that does that? I would like to disable EC crypto for example, but even when I request this&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_MBEDTLS_ECP_C&lt;/span&gt;&lt;span&gt;=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The autoconf.h still has&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;#define&lt;/span&gt;&lt;span&gt; CONFIG_MBEDTLS_ECP_C &lt;/span&gt;&lt;span&gt;1&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;which is not the case for the &amp;#39;mini&amp;#39; TLS config!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518506?ContentTypeID=1</link><pubDate>Wed, 15 Jan 2025 18:00:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:43556400-2095-4597-b65d-c02a2954f05c</guid><dc:creator>Amanda Hsieh</dc:creator><description>[quote user=""]CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-mini-tls1_2.h&amp;quot;[/quote]
&lt;p&gt;&lt;span&gt;That config file is only usable with MBEDTLS_BUILTIN. It can&amp;#39;t use a preconfigured header file with our system. You can however configure the features equivalent to what is the content of this file.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
[quote user="BrianW"] is it possible to reduce its footprint?[/quote]
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;You can refer to the&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/test_and_optimize/optimizing/memory.html"&gt;Memory footprint optimization&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518288?ContentTypeID=1</link><pubDate>Tue, 14 Jan 2025 15:39:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c0f6e43a-be96-420f-b02d-f4dea1f8d5cd</guid><dc:creator>BrianW</dc:creator><description>[quote userid="77782" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e/518219"]Why do you insist to use&amp;nbsp;&lt;span&gt;the config-min-tls1_2.h config file?&lt;/span&gt;[/quote]
&lt;p&gt;Because I am very short of flash space, and the networking code is a huge reason for that. So I want to ensure I only have the minimum set of crypto to run tls1.2 with RSA certifs.&lt;/p&gt;
&lt;p&gt;For example, the https_client sample has exactly 372 lines in its app source file (main.c), but builds an image that is 658kB (&amp;gt;75% of available flash on an nrf5340). And the default RAM setup uses &amp;gt;75% of available RAM!&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;Memory region Used Size Region Size %age Used&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; FLASH:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;658596 B&amp;nbsp; &amp;nbsp; &amp;nbsp; 848 KB&amp;nbsp; &amp;nbsp; 75.84%&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; RAM:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;310240 B&amp;nbsp; &amp;nbsp; &amp;nbsp; 400 KB&amp;nbsp; &amp;nbsp; 75.74%&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;And thats only zephyr+networking! If I also want NFC, BLE GATT server, BLE scanning, USB etc (and maybe some space for my app code eh?) it just doesn&amp;#39;t work with the sample config.&lt;/p&gt;
&lt;p&gt;So I need to trim the network to the minimum for TLS1.2 (and this is obviously a common requirement as mbedtls went to the trouble of creating a specific config file for that!).&lt;/p&gt;
&lt;p&gt;Any ideas on a config for that?&lt;/p&gt;
&lt;p&gt;Also, wpa_supp has a lot of functionality- is it possible to reduce its footprint? (for example, I really only need to handle WPA2-PER type APs, not all the other possibilities...)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518219?ContentTypeID=1</link><pubDate>Mon, 13 Jan 2025 17:21:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:17b3669d-bf7c-454e-9cf5-3b16c8b1321f</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
[quote user="BrianW"]what is the correct KConfig setup to get a minimum TLS1.2 setup (ie functionally as per the config-min-tls1_2.h config file) when using nrf-security (as this seems to be obligatory) and PSA mode?[/quote]
&lt;p&gt;Why do you insist to use&amp;nbsp;&lt;span&gt;the config-min-tls1_2.h config file?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The default configs setting of the&amp;nbsp;http_client sample can support TLS 1.2, and the&amp;nbsp;MBEDTLS_RSA_C is also shown in the&amp;nbsp;build/generated/library_nrf_security_psa/nrf-config.h&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-Amanda H.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518102?ContentTypeID=1</link><pubDate>Mon, 13 Jan 2025 09:41:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:55d9c519-0c1e-4dcd-8b3d-82039806cd24</guid><dc:creator>BrianW</dc:creator><description>&lt;p&gt;Thanks, but&amp;nbsp;&lt;/p&gt;
&lt;p&gt;a) the wif connection is working fine thanks&lt;/p&gt;
&lt;p&gt;b) the &amp;#39;https&amp;#39; client sample is where I started from&lt;/p&gt;
&lt;p&gt;And lets be clear, the &lt;strong&gt;https client sample is not even close to a real usable https client.&lt;/strong&gt; It&amp;#39;s a http client implementation that is so basic and dumb that it&amp;#39;s not useful for any real https server (no handling of headers, async operation, etc), it serves only to say &amp;#39;look, you can ping a https server on a nordic chip&amp;#39;. As the basis for any real application its just a dead-end. And as the selection of the prj.conf options are not explained (why these options, and what the impacts are) it doesn&amp;#39;t even serve as a good training example!&lt;/p&gt;
&lt;p&gt;Therefore as soon as it becomes necessary to work in the real world it doesn&amp;#39;t answer questions like &amp;#39;how to get tls to work in a restricted memory size&amp;#39; or &amp;#39;which KConfig options do what&amp;#39; and in particular &amp;#39;between all the different architectural options (mbedtls &amp;#39;standard&amp;#39;, &amp;#39;zephyr&amp;#39;, &amp;#39;nrf-security&amp;#39;, with/without &amp;#39;PSA&amp;#39;) which are useable and which are not.&lt;/p&gt;
&lt;p&gt;So, to return to my question: what is the correct KConfig setup to get a minimum TLS1.2 setup (ie functionally as per the config-min-tls1_2.h config file) when using nrf-security (as this seems to be obligatory) and PSA mode?&lt;/p&gt;
&lt;p&gt;thanks&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/518030?ContentTypeID=1</link><pubDate>Fri, 10 Jan 2025 22:49:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f53e50bd-2350-4b17-9356-33e92183e273</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Please check out the&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/samples/net/https_client/README.html" rel="noopener noreferrer" target="_blank"&gt;HTTPS Client Sample&lt;/a&gt;&lt;span&gt;&amp;nbsp;and the&amp;nbsp;&lt;/span&gt;&lt;a href="https://academy.nordicsemi.com/courses/wi-fi-fundamentals/lessons/lesson-5-wifi-fundamentals/topic/lesson-5-exercise-2-2/" rel="noopener noreferrer" target="_blank"&gt;Wi-Fi Fundamentals Course&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/517915?ContentTypeID=1</link><pubDate>Fri, 10 Jan 2025 11:29:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d55abe13-3f83-4a0b-8b64-1395c6e734a9</guid><dc:creator>BrianW</dc:creator><description>[quote userid="134465" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e"]So finally my question :&amp;nbsp;&lt;strong&gt;how do I get the nrf wrappers round the zephyr KConfig to accept that I want to use a specific mbedtls config, which includes MBEDTLS_RSA_C?&lt;/strong&gt;[/quote]
&lt;p&gt;If I add CONFIG_MBEDTLS_RSA_C=y, then my flash overflows...&lt;/p&gt;
&lt;p&gt;prj.conf:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NRF_SECURITY=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_LIBRARY_NRF_SECURITY=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;# TLS configuration - don&amp;#39;t want everything in mbedtls as far too big&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_CUSTOM_MBEDTLS_CFG_FILE=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;#CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-mini-tls1_2.h&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_DTLS=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_TLS_VERSION_1_2=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_RSA_C=y&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;So, I thought I&amp;#39;d remove EC crypto (as I can use just RSA certificates)?&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_ECDH_C=n &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;but KConfig is conflicted about this.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;warning: MBEDTLS_PK_WRITE_C (defined at C:/ncs/v2.8.0/nrf\subsys\nrf_security\Kconfig.legacy:875, C:/ncs/v2.8.0/zephyr/modules/mbedtls\Kconfig.tls-generic:470, modules\mbedtls\Kconfig.tls-generic:470) has direct dependencies (MBEDTLS_PK_C &amp;amp;&amp;amp; NRF_SECURITY) || (MBEDTLS_BUILTIN &amp;amp;&amp;amp; MBEDTLS_CFG_FILE = &amp;quot;config-tls-generic.h&amp;quot; &amp;amp;&amp;amp; MBEDTLS) || (MBEDTLS_BUILTIN &amp;amp;&amp;amp; MBEDTLS_CFG_FILE = &amp;quot;config-tls-generic.h&amp;quot; &amp;amp;&amp;amp; MBEDTLS &amp;amp;&amp;amp; 0) with value n, but is currently being y-selected by the following symbols:&lt;br /&gt; - WIFI_NM_WPA_SUPPLICANT_CRYPTO_ALT_LEGACY_NCS (defined at C:/ncs/v2.8.0/zephyr/modules/hostap/Kconfig:215, modules/hostap/Kconfig:215, modules\hostap\Kconfig:215), with value y, direct dependencies &amp;lt;choice WIFI_NM_WPA_SUPPLICANT_CRYPTO_BACKEND&amp;gt; || &amp;lt;choice WIFI_NM_WPA_SUPPLICANT_CRYPTO_BACKEND&amp;gt; || &amp;lt;choice WIFI_NM_WPA_SUPPLICANT_CRYPTO_BACKEND&amp;gt; (value: y), and select condition &amp;lt;choice WIFI_NM_WPA_SUPPLICANT_CRYPTO_BACKEND&amp;gt; (value: y)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Adding&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS_ECDSA_C=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;fixed KConfig, but now the compile fails:&lt;/span&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c: In function &amp;#39;crypto_ec_key_parse_priv&amp;#39;:
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2354:5: error: unknown type name &amp;#39;mbedtls_pk_context&amp;#39;; did you mean &amp;#39;mbedtls_dhm_context&amp;#39;?
 2354 |     mbedtls_pk_context *ctx = os_malloc(sizeof(*ctx));
      |     ^~~~~~~~~~~~~~~~~~
      |     mbedtls_dhm_context
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2357:5: warning: implicit declaration of function &amp;#39;mbedtls_pk_init&amp;#39;; did you mean &amp;#39;mbedtls_mpi_init&amp;#39;? [-Wimplicit-function-declaration]
 2357 |     mbedtls_pk_init(ctx);
      |     ^~~~~~~~~~~~~~~
      |     mbedtls_mpi_init
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2361:9: warning: implicit declaration of function &amp;#39;mbedtls_pk_parse_key&amp;#39;; did you mean &amp;#39;mbedtls_ecp_write_key&amp;#39;? [-Wimplicit-function-declaration]
 2361 |     if (mbedtls_pk_parse_key(ctx, der, der_len, NULL, 0, mbedtls_ctr_drbg_random, crypto_mbedtls_ctr_drbg()) == 0)
      |         ^~~~~~~~~~~~~~~~~~~~
      |         mbedtls_ecp_write_key
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2365:5: warning: implicit declaration of function &amp;#39;mbedtls_pk_free&amp;#39;; did you mean &amp;#39;mbedtls_mpi_free&amp;#39;? [-Wimplicit-function-declaration]
 2365 |     mbedtls_pk_free(ctx);
      |     ^~~~~~~~~~~~~~~
      |     mbedtls_mpi_free
In file included from C:/ncs/v2.8.0/modules/crypto/mbedtls/include/mbedtls/oid.h:17,
                 from C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2371:
C:/ncs/v2.8.0/modules/crypto/mbedtls/include/mbedtls/pk.h: At top level:
C:/ncs/v2.8.0/modules/crypto/mbedtls/include/mbedtls/pk.h:310:6: warning: conflicting types for &amp;#39;mbedtls_pk_init&amp;#39;; have &amp;#39;void(mbedtls_pk_context *)&amp;#39;
  310 | void mbedtls_pk_init(mbedtls_pk_context *ctx);
      |      ^~~~~~~~~~~~~~~
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2357:5: note: previous implicit declaration of &amp;#39;mbedtls_pk_init&amp;#39; with type &amp;#39;void(mbedtls_pk_context *)&amp;#39;
 2357 |     mbedtls_pk_init(ctx);
      |     ^~~~~~~~~~~~~~~
C:/ncs/v2.8.0/modules/crypto/mbedtls/include/mbedtls/pk.h:323:6: warning: conflicting types for &amp;#39;mbedtls_pk_free&amp;#39;; have &amp;#39;void(mbedtls_pk_context *)&amp;#39;
  323 | void mbedtls_pk_free(mbedtls_pk_context *ctx);
      |      ^~~~~~~~~~~~~~~
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2365:5: note: previous implicit declaration of &amp;#39;mbedtls_pk_free&amp;#39; with type &amp;#39;void(mbedtls_pk_context *)&amp;#39;
 2365 |     mbedtls_pk_free(ctx);
      |     ^~~~~~~~~~~~~~~
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c: In function &amp;#39;crypto_mbedtls_pk_parse_subpubkey_compressed&amp;#39;:
C:/ncs/v2.8.0/modules/lib/hostap/src/crypto/crypto_mbedtls_alt.c:2473:14: warning: implicit declaration of function &amp;#39;crypto_mbedtls_short_weierstrass_derive_y&amp;#39; [-Wimplicit-function-declaration]
 2473 |           || crypto_mbedtls_short_weierstrass_derive_y(ecp_kp_grp, Y, (*p &amp;amp; 1));
      |              ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[246/718] Building C object zephyr/lib/libc/common/CMakeFiles/lib__libc__common.dir/source/time/asctime.c.obj
ninja: build stopped: subcommand failed.
FATAL ERROR: command exited with status 1: &amp;#39;C:\ncs\toolchains\2d382dcd92\opt\bin\cmake.EXE&amp;#39; --build &amp;#39;C:\work\dev\if-device-nrf53\cc1-med\build&amp;#39;&lt;/pre&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;How can I get a minimum TLS1.2 capable mbedtls build?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/517912?ContentTypeID=1</link><pubDate>Fri, 10 Jan 2025 10:56:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5e5844f5-1e5e-4494-85d0-073b4bcf1eea</guid><dc:creator>BrianW</dc:creator><description>[quote userid="134465" url="~/f/nordic-q-a/117913/nrf5340-ncs-2-8-cannot-get-tls-socket-to-load-ca-certif-due-to-net_sock_tls-mbedtls-error--0x262e"]&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;Also, it seems the sockets TLS code is hardcoded to use mbedtls functions : is there an alternative (which might take up less flash space, eg tinycrypt?&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;Naively I though I could just do&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_NRF_SECURITY=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_MBEDTLS=n&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;CONFIG_TINYCRYPT=y&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;but no joy (although maybe this is because its forcing mbedtls/nrf_security?)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;[/quote]
&lt;p&gt;I note the latest Zephyr release notes indicate that tinycrypt is effectively depreciated in favour of mbedtls, and also that it maybe never supported networking TLS operation...&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf5340 NCS 2.8 cannot get TLS socket to load CA certif due to net_sock_tls / mbedtls error -0x262e</title><link>https://devzone.nordicsemi.com/thread/517795?ContentTypeID=1</link><pubDate>Thu, 09 Jan 2025 19:55:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bdb728d9-546a-47a6-b873-80a3e64288bf</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Check out &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/114674/how-to-enable-rsa-keys-for-ncs-2-6-1/502355"&gt;this post&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>