This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Enable mbedTLS debug output for Nordic security backend

Hi,

I am trying to use the Nordic security backend support from nrf Connect SDK to connect to HTTP and MQTT with TLS.

Below are my steps:

1) do certificate provisioning (client private key, client public cert and server CA cert).

2) Resolve hostname and get the IPv4 address.

3) Create TLS socket and set the following options:

    - peer verify = 1 (optional)

    - TLS security tag

    - TLS hostname

4) Connect to the server using "connect()".

However the connect() return -45 which from the errno.h is EOPNOTSUPP (Operation not supported on socket).

Is it possible to turn on the mbedTLS debug print via mbedtls_debug_set_threshold() function so that I can investigate which part of the TLS handshaking goes wrong?

Parents Reply
  • Hi Martin,

    My client private key required passphase to decrypt.

    1) Can the v1.2.0 BSD TLS socket API support on this?

    2) If cannot support than how can I proceed on doing this using nrf connect SDK?

    3) If I enable mbedTLS support, I might need a big heap memory as the signature and ciphersuite is using SHA384 (4096 bits) but I notice that the maximum size to CONFIG_HEAP_MEM_POOL_SIZE is only 16K?

    Any advise would be appreciated.

Children
Related