<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/95781/adaption-to-tcp-tls-on-top-of-openthread</link><description>Hi All, 
 I am currently working on establishing a thread network to communicate to our http server: https://mainnet.incubed.net ). In order to setting up that I took echo_client and http_client sample and adapted to our need. Below diagram is my network</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 08 Feb 2023 16:56:11 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/95781/adaption-to-tcp-tls-on-top-of-openthread" /><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/408971?ContentTypeID=1</link><pubDate>Wed, 08 Feb 2023 16:56:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ff77d280-3d8f-4ee6-8bc0-830f346bccaa</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I checked the address family and the address length but I don&amp;#39;t see any potential issues.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now &amp;nbsp;I am using &amp;nbsp;getaddrinfo() to properly point the sockaddr and ensure there is no issue in address family and length. Below given my modification wrt to those change.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;#if defined(CONFIG_NET_SOCKETS_SOCKOPT_TLS)
  struct addrinfo hints = {
      .ai_family   = PF_INET6,
      .ai_socktype = SOCK_STREAM,
      .ai_protocol = IPPROTO_TLS_1_2,
      .ai_flags    = AI_NUMERICSERV | AI_NUMERICHOST | AI_V4MAPPED | AI_ALL};
  ret = getaddrinfo(SERVER_ADDR6, &amp;quot;443&amp;quot;, &amp;amp;hints, &amp;amp;res);
#else
  struct addrinfo hints = {
      .ai_family   = AF_INET,
      .ai_socktype = SOCK_STREAM,
      .ai_protocol = IPPROTO_TCP,
      .ai_flags    = AI_NUMERICSERV | AI_NUMERICHOST | AI_V4MAPPED | AI_ALL};
  ret   = getaddrinfo(SERVER_ADDR6, &amp;quot;80&amp;quot;, &amp;amp;hints, &amp;amp;res);
#endif&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Still the result is same.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:47.346,984] &amp;lt;dbg&amp;gt; http_client: establish_connection: ai_family: 2 ai_socktype: 1 ai_protocol: 6 ai_addrlen: 24
[00:00:47.347,137] &amp;lt;dbg&amp;gt; net_sock_tls: tls_alloc: (main): Allocated TLS context, 0x20003478
[00:00:47.347,473] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20022520, ref_count: 1
[00:00:47.347,503] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20022520
[00:00:47.347,564] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x2001031c, fd=1
[00:00:47.347,747] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x2001031c binding to TCP [::]:50680 iface 1 (0x20000a98)
[00:00:47.347,839] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x2001031c, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:00:47.348,022] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20022520 src: fd97:6739:93e:1:55e8:b55b:6c94:71e2, dst: fd97:6739:93e:2::a756:5ef8
[00:00:47.348,175] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x200107b8/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/443 
[00:00:47.348,205] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/50680 cb 0x16e69 ud 0x2001031c
[00:00:47.348,358] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=1876970369 Ack=0]
[00:00:47.348,602] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=1876970369 Len=0
[00:00:47.348,754] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=1876970369 Len=0 
[00:00:47.348,968] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=1876970369 Len=0
[00:00:47.349,700] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:00:47.412,445] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200218d0 src port 443 dst port 50680 family 2
[00:00:47.412,506] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x200107b8] match found cb 0x16e69 ud 0x2001031c rank 0x3f
[00:00:47.412,811] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=4052061474 Ack=1876970370 Len=0 [SYN_SENT Seq=1876970370 Ack=0]
[00:00:47.412,872] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:00:47.412,902] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:00:47.412,902] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:00:47.412,933] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:00:47.412,963] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20022520 window_full=0
[00:00:47.413,146] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=1876970369 Len=0
[00:00:47.413,452] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=1876970370 Ack=4052061475 Len=0
[00:00:47.413,635] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=1876970370 Ack=4052061475 Len=0 
[00:00:47.413,818] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=1876970370 Ack=4052061475 Len=0
[00:00:47.413,940] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:00:47.414,154] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20022520, ret=0
[00:00:47.414,215] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x2001031c, cb: 0x8b81, user_data: (nil)
[00:00:47.425,842] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-22)
[00:00:47.425,842] &amp;lt;err&amp;gt; http_client: Setup socket Failed
[00:00:47.425,842] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Do you have any thoughts or any further suggestions on this issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/408322?ContentTypeID=1</link><pubDate>Mon, 06 Feb 2023 14:41:44 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a46784d5-da77-4cd0-83cd-afdc87384155</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Error 22 is invalid argument, so most likely, one or more of the arguments you are giving is incorrect. You should check that the address length is valid for the address family and that the address family is correct.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/408203?ContentTypeID=1</link><pubDate>Mon, 06 Feb 2023 08:59:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d6e11abc-654c-4c44-ad7d-1eb706f6c34d</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Any clue on TLS socket connection returns error -22?&lt;/p&gt;
&lt;p&gt;I &amp;nbsp;took a look at the nRF9160 DK HTTPS Client sample and addd the missing config options but that also doesn&amp;#39;t help to solve that error.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Should I have to try anything else.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407735?ContentTypeID=1</link><pubDate>Thu, 02 Feb 2023 10:19:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:deea9e28-a298-44b3-9930-4bb0169a0383</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
[quote user="vipin das"]You can share me any proper TLS sample where I can take a look and get inspired to make my application working&amp;nbsp;[/quote]
&lt;p&gt;The examples you used previously, echo_client and http_client, have support for enabling TLS by setting OVERLAY_CONFIG to overlay-tls.conf. Other than that, we also have support for Mbed TLS in several nRF9160 samples, such as &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.2.0/nrf/samples/nrf9160/https_client/README.html"&gt;HTTPS Client&lt;/a&gt; and &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.2.0/nrf/samples/nrf9160/mqtt_simple/README.html"&gt;Simple MQTT&lt;/a&gt;, and we have &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.2.0/nrf/samples/crypto/psa_tls/README.html"&gt;Crypto: PSA TLS&lt;/a&gt; that shows how to do TLS handshakes.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407303?ContentTypeID=1</link><pubDate>Tue, 31 Jan 2023 11:57:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5df18baf-eb82-43fb-bf2e-44a804e31a0b</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;I have added the tis_credential_add() to add the downloaded server certificate to authenticate the remote server. After adding that connect error is -22 (EINVAL).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:01:57.147,583] &amp;lt;dbg&amp;gt; http_client: in3_register_https_client: in3 register https
[00:01:57.180,664] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:01:57.180,847] &amp;lt;dbg&amp;gt; net_sock_tls: tls_alloc: (main): Allocated TLS context, 0x20003478
[00:01:57.181,152] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x2002d020, ref_count: 1
[00:01:57.181,182] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x2002d020
[00:01:57.181,274] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x2001031c, fd=1
[00:01:57.181,457] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x2001031c, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:01:57.181,640] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x2002d020 src: fd97:6739:93e:1:8ea6:548e:c791:187, dst: fd97:6739:93e:2::a756:5ef8
[00:01:57.181,762] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x200107b8/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/443
[00:01:57.181,823] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/35905 cb 0x16c01 ud 0x2001031c
[00:01:57.181,945] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=1369800138 Ack=0]
[00:01:57.182,220] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=1369800138 Len=0
[00:01:57.182,373] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=1369800138 Len=0
[00:01:57.182,617] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=1369800138 Len=0
[00:01:57.183,319] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:01:57.231,292] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x2002c3d0 src port 443 dst port 35905 family 2
[00:01:57.231,323] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x200107b8] match found cb 0x16c01 ud 0x2001031c rank 0x3f
[00:01:57.231,658] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=3663983358 Ack=1369800139 Len=0 [SYN_SENT Seq=1369800139 Ack=0]
[00:01:57.231,689] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:01:57.231,719] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:01:57.231,750] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:01:57.231,781] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 3413
[00:01:57.231,811] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x2002d020 window_full=0
[00:01:57.231,964] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=1369800138 Len=0
[00:01:57.232,299] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=1369800139 Ack=3663983359 Len=0
[00:01:57.232,482] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=1369800139 Ack=3663983359 Len=0
[00:01:57.232,666] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=1369800139 Ack=3663983359 Len=0
[00:01:57.232,788] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:01:57.233,001] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x2002d020, ret=0
[00:01:57.233,062] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x2001031c, cb: 0x8ce1, user_data: (nil)
[00:01:57.233,245] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-22)
[00:01:57.233,245] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:01:57.233,245] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:01:57.290,252] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:02:07.629,394] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000064 Current role: router
[00:02:57.395,874] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x2002c3d0 src port 443 dst port 35905 family 2
[00:02:57.395,904] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x200107b8] match found cb 0x16c01 ud 0x2001031c rank 0x3f
[00:02:57.396,301] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): FIN,ACK Seq=3663983359 Ack=1369800139 Len=0 [ESTABLISHED Seq=1369800139 Ack=3663983359]
[00:02:57.396,331] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 3413
[00:02:57.396,362] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x2002d020 window_full=0
[00:02:57.396,667] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): FIN,ACK Seq=1369800139 Ack=3663983360 Len=0
[00:02:57.396,881] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): FIN,ACK Seq=1369800139 Ack=3663983360 Len=0 
[00:02:57.397,155] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): FIN,ACK Seq=1369800139 Ack=3663983360 Len=0
[00:02:57.397,277] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;LAST_ACK
[00:02:57.457,122] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x2002c3d0 src port 443 dst port 35905 family 2
[00:02:57.457,153] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x200107b8] match found cb 0x16c01 ud 0x2001031c rank 0x3f
[00:02:57.457,519] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ACK Seq=3663983360 Ack=1369800140 Len=0 [LAST_ACK Seq=1369800139 Ack=3663983360]
[00:02:57.457,550] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64239 to 3413
[00:02:57.457,580] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x2002d020 window_full=0
[00:02:57.457,794] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): FIN,ACK Seq=1369800139 Ack=3663983360 Len=0
[00:02:57.457,855] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): LAST_ACK-&amp;gt;CLOSED
[00:02:57.457,885] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x2002d020, ref_count=1 (tcp_in():2513)
[00:02:57.457,916] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x200107b8 removed
[00:02:57.457,977] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x2001031c, pkt=(nil), st=0, user_data=(nil)
[00:02:57.458,007] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x2001031c as peer-closed&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Just to update the present status of my issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407267?ContentTypeID=1</link><pubDate>Tue, 31 Jan 2023 10:08:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e3cceca0-2722-4614-ac93-fdf9d56155ad</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Yes you are right. My config related to TLS shared below.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;#Socket settings
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y
CONFIG_POSIX_MAX_FDS=8
CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=10

#MBEDTLS and security configuration 
CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-tls-generic.h&amp;quot;
CONFIG_OPENTHREAD_MBEDTLS_CHOICE=y
CONFIG_MBEDTLS_TLS_VERSION_1_2=y
CONFIG_MBEDTLS_TLS_LIBRARY=y
CONFIG_MBEDTLS_SSL_PROTO_TLS1_2=y

# TLS configuration
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_BUILTIN=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_HEAP_SIZE=8192
CONFIG_MBEDTLS_ENTROPY_ENABLED=y
# certificate must fit into one message, fragmenting is not supported
CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN=8192

#Credentials
CONFIG_TLS_CREDENTIALS=y
CONFIG_TLS_MAX_CREDENTIALS_NUMBER=4&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;No I don&amp;#39;t think I have any functionality for TLS at the moment.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Please consider me a novice user in networking topics. This is 1st time I am working on TLS socket connection. I just followed some of the existing samples and few discussions. I don&amp;#39;t really understand about the certification and private key that you mentioned above. I have created the ca_cert.der for the server and it looks similar like below.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;&amp;quot;-----BEGIN CERTIFICATE-----\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;-----END CERTIFICATE-----\n&amp;quot;
&amp;quot;-----BEGIN CERTIFICATE-----\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;-----END CERTIFICATE-----\n&amp;quot;
&amp;quot;-----BEGIN CERTIFICATE-----\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;----------------------------------------------------------------\n&amp;quot;
&amp;quot;-----END CERTIFICATE-----\n&amp;quot;
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;You can share me any proper TLS sample where I can take a look and get inspired to make my application working&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407253?ContentTypeID=1</link><pubDate>Tue, 31 Jan 2023 09:34:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:93efe7ab-df9f-4788-aa4e-7cceeeaa010c</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;So your example is unchanged other than enabling&amp;nbsp;CONFIG_NET_SOCKETS_SOCKOPT_TLS?&lt;/p&gt;
&lt;p&gt;Is mbedTLS (CONFIG_MBEDTLS) enabled? Do you have any functionality for TLS? Are you using the correct credentials (certification and private key)?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407243?ContentTypeID=1</link><pubDate>Tue, 31 Jan 2023 09:03:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a5582bce-6f62-48a9-b136-ca693730dbb9</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yes this is the same log after TCP got worked. For this log I just enabled the&amp;nbsp;CONFIG_NET_SOCKETS_SOCKOPT_TLS=y. Don&amp;#39;t get confuse with that particular log. That is something I added.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;ret = connect(*sock, addr, addr_len);
  if (ret &amp;lt; 0) {
    LOG_ERR(&amp;quot;Cannot connect to %s remote (%d)&amp;quot;, family == AF_INET ? &amp;quot;IPv4&amp;quot; : &amp;quot;IPv6&amp;quot;, -errno);
    ret = -errno;
  }&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;This time it fails at this connect to TLS socket&amp;nbsp;but socket creation is success(&lt;strong&gt;socket&lt;/strong&gt;&lt;span&gt;&lt;strong&gt;(family, SOCK_STREAM, IPPROTO_TLS_1_2)).&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vipin Das&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407225?ContentTypeID=1</link><pubDate>Tue, 31 Jan 2023 08:21:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d992c70b-3ab1-4ba7-b45a-b51549b02064</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Is this the log from after you got TCP to work? Because in your log, I see that TCP is still failing:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;[00:02:02.052,246] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407158?ContentTypeID=1</link><pubDate>Mon, 30 Jan 2023 15:31:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:52366521-78cb-416e-a211-40556152b77a</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I am able to send/receive RPC request/response to our server using TCP socket connection.&lt;/p&gt;
&lt;p&gt;Now we can focus&amp;nbsp;on TLS. Could you please help me to trace out the issue with TLS socket.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For that I am sharing latest log for your reference.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:02:01.942,169] &amp;lt;dbg&amp;gt; http_client: in3_register_https_client: in3 register https
[00:02:01.974,884] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:02:01.975,067] &amp;lt;dbg&amp;gt; net_sock_tls: tls_alloc: (main): Allocated TLS context, 0x20003478
[00:02:01.975,402] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20022920, ref_count: 1
[00:02:01.975,433] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20022920
[00:02:01.975,463] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x2001031c, fd=1
[00:02:01.975,646] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x2001031c, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:02:01.975,860] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20022920 src: fd97:6739:93e:1:aa57:96ae:30b:a5a4, dst: fd97:6739:93e:2::a756:5ef8
[00:02:01.975,982] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x200107b8/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/443 
[00:02:01.976,043] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/40755 cb 0x16b71 ud 0x2001031c
[00:02:01.976,165] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=492892335 Ack=0]
[00:02:01.976,440] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=492892335 Len=0
[00:02:01.976,593] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=492892335 Len=0 
[00:02:01.976,806] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=492892335 Len=0
[00:02:01.977,508] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:02:02.050,292] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20021cd0 src port 443 dst port 40755 family 2
[00:02:02.050,354] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x200107b8] match found cb 0x16b71 ud 0x2001031c rank 0x3f
[00:02:02.050,689] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=4288225015 Ack=492892336 Len=0 [SYN_SENT Seq=492892336 Ack=0]
[00:02:02.050,720] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:02:02.050,750] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:02:02.050,781] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:02:02.050,811] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:02:02.050,842] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20022920 window_full=0
[00:02:02.050,994] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=492892335 Len=0
[00:02:02.051,300] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=492892336 Ack=4288225016 Len=0
[00:02:02.051,513] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=492892336 Ack=4288225016 Len=0 
[00:02:02.051,696] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=492892336 Ack=4288225016 Len=0
[00:02:02.051,788] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:02:02.052,001] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20022920, ret=0
[00:02:02.052,062] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x2001031c, cb: 0x8ca1, user_data: (nil)
[00:02:02.052,215] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-2)
[00:02:02.052,215] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:02:02.052,246] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:02:02.108,856] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:02:05.325,256] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000064 Current role: router&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Thanks&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407087?ContentTypeID=1</link><pubDate>Mon, 30 Jan 2023 12:08:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:30527100-0c07-4d0b-b092-758375bc128a</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Yes I have restarted the my Mac after the installation. I am using a dongle.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/407085?ContentTypeID=1</link><pubDate>Mon, 30 Jan 2023 12:04:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:931e03a8-ed3d-4ffe-87fd-410c3dd48dc0</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Did you restart your computer after installing Wireshark and configuring the sniffer? I have seen several cases where the sniffer does not show up until after a restart. Are you using a dongle or DK as sniffer?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406892?ContentTypeID=1</link><pubDate>Fri, 27 Jan 2023 15:01:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f5802166-defe-4cb4-9cba-f35ddde12e9a</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;I was trying to setup nRF sniffer tool as per the page:&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fug_sniffer_802154%2FUG%2Fsniffer_802154%2Finstalling_sniffer_802154.html"&gt;https://infocenter.nordicsemi.com/index.jsp?topic=%2Fug_sniffer_802154%2FUG%2Fsniffer_802154%2Finstalling_sniffer_802154.html&lt;/a&gt;. I followed each steps and copied the&amp;nbsp;&lt;span&gt;nrf802154_sniffer.py into&amp;nbsp;Wireshark(3.6.11) ext cap folder. Even I verified the python script&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;das@Vipins-MBP extcap % python3 nrf802154_sniffer.py --extcap-interfaces                         
extcap {version=0.7.2}{help=https://github.com/NordicSemiconductor/nRF-Sniffer-for-802.15.4}{display=nRF Sniffer for 802.15.4}
interface {value=/dev/cu.usbmodemEC108B497C3D1}{display=nRF Sniffer for 802.15.4}
control {number=6}{type=button}{role=logger}{display=Log}{tooltip=Show capture log}&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But&amp;nbsp;&lt;/span&gt;&lt;span&gt;nRF Sniffer for 802.15.4 interface is not detecting on the&amp;nbsp;&lt;/span&gt;Wireshark. Did I miss any thing here.&lt;/p&gt;
&lt;p&gt;I looked many other discussion but nothing helps in my case. Even I tried with 2 different Wireshark versions(3.6 &amp;amp; 4.0).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Any clue?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406823?ContentTypeID=1</link><pubDate>Fri, 27 Jan 2023 10:58:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0738dfcd-52fb-4eb5-b650-3b37673ceafc</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Thank you.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I fixed the Bad request error also. The problem got solved after removing&amp;nbsp;&lt;span&gt;&lt;span&gt;req.content_type_value=&lt;/span&gt;&lt;/span&gt;&amp;quot;application/json;charset=UTF-8&amp;quot;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But now I am getting Response status&amp;nbsp;&lt;span&gt;Internal Server Error(500). I am sharing the log for the new error.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:45.584,472] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): ACK Seq=2585330419 Ack=1588306744 Len=0
[00:00:45.584,655] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): ACK Seq=2585330419 Ack=1588306744 Len=0 
[00:00:45.584,869] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): ACK Seq=2585330419 Ack=1588306744 Len=0
[00:00:45.584,991] &amp;lt;dbg&amp;gt; net_http: on_message_begin: (main): -- HTTP POST response (headers) --
[00:00:45.585,052] &amp;lt;dbg&amp;gt; net_http: on_status: (main): HTTP response status 500 Internal Server Error
[00:00:45.585,266] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [6] Server
[00:00:45.585,510] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [21] nginx/1.14.0 (Ubuntu)
[00:00:45.585,693] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [4] Date
[00:00:45.585,937] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [29] Fri, 27 Jan 2023 10:46:48 GMT
[00:00:45.586,120] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [12] Content-Type
[00:00:45.586,303] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [31] application/json; charset=utf-8
[00:00:45.586,486] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [14] Content-Length
[00:00:45.586,639] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [3] 115
[00:00:45.586,822] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [10] Connection
[00:00:45.586,975] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [10] keep-alive
[00:00:45.587,127] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [27] Access-Control-Allow-Origin
[00:00:45.587,280] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [1] *
[00:00:45.587,402] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [28] Access-Control-Allow-Headers
[00:00:45.587,524] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [58] Origin, X-Requested-With, Content-Type, Accept, User-Agent
[00:00:45.587,615] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [14] X-Request-Time
[00:00:45.587,677] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [7] 0.65 ms
[00:00:45.657,623] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20022f80 src port 80 dst port 37746 family 2
[00:00:45.657,653] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x2000f7e0] match found cb 0x17115 ud 0x2000f234 rank 0x3f
[00:00:45.658,050] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ACK,PSH Seq=1588306744 Ack=2585330419 Len=119 [ESTABLISHED Seq=2585330419 Ack=1588306744]
[00:00:45.658,081] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64079 to 1280
[00:00:45.658,111] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20023bd0 window_full=0
[00:00:45.658,447] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=2585330419 Ack=1588306863 Len=0
[00:00:45.658,630] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=2585330419 Ack=1588306863 Len=0 
[00:00:45.658,843] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=2585330419 Ack=1588306863 Len=0
[00:00:45.658,966] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x2000f234, pkt=0x20022f80, st=0, user_data=(nil)
[00:00:45.659,362] &amp;lt;dbg&amp;gt; net_http: print_header_field: (main): [0] 
[00:00:45.659,393] &amp;lt;dbg&amp;gt; net_http: on_headers_complete: (main): Status 500, skipping body
[00:00:45.659,423] &amp;lt;dbg&amp;gt; net_http: on_message_complete: (main): -- HTTP POST response (complete) --
[00:00:45.659,454] &amp;lt;dbg&amp;gt; net_http: http_wait_data: (main): Calling callback for 460 len data
[00:00:45.659,454] &amp;lt;dbg&amp;gt; http_client: server_response_cb: All the data received (460 bytes)
[00:00:45.659,484] &amp;lt;dbg&amp;gt; http_client: server_response_cb: Response to IPv6 POST
[00:00:45.659,515] &amp;lt;dbg&amp;gt; http_client: server_response_cb: Response status Internal Server Error
[00:00:45.659,545] &amp;lt;dbg&amp;gt; net_http: http_client_req: (main): Received 460 bytes
[00:00:45.659,606] &amp;lt;dbg&amp;gt; net_sock: z_impl_zsock_close: (main): close: ctx=0x2000f234, fd=0
[00:00:45.659,637] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x2000f234, cb: (nil), user_data: (nil)
[00:00:45.659,820] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_put: (main):  [ESTABLISHED Seq=2585330419 Ack=1588306863]
[00:00:45.659,851] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_put: (main): context 0x2000f234 CONNECTED
[00:00:45.659,881] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_put: (main): TCP connection in active close, not disposing yet (waiting 22753ms)
[00:00:45.660,186] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): FIN,ACK Seq=2585330419 Ack=1588306863 Len=0
[00:00:45.660,400] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): FIN,ACK Seq=2585330419 Ack=1588306863 Len=0 
[00:00:45.660,675] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): FIN,ACK Seq=2585330419 Ack=1588306863 Len=0
[00:00:45.660,797] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_put: (main): ESTABLISHED-&amp;gt;FIN_WAIT_1
[00:00:45.716,949] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:00:45.773,284] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20022f80 src port 80 dst port 37746 family 2
[00:00:45.773,315] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x2000f7e0] match found cb 0x17115 ud 0x2000f234 rank 0x3f
[00:00:45.773,681] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): FIN,ACK Seq=1588306863 Ack=2585330420 Len=0 [FIN_WAIT_1 Seq=2585330420 Ack=1588306863]
[00:00:45.773,712] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64078 to 1280
[00:00:45.773,742] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20023bd0 window_full=0
[00:00:45.773,956] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): FIN,ACK Seq=2585330419 Ack=1588306863 Len=0
[00:00:45.774,261] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=2585330420 Ack=1588306864 Len=0
[00:00:45.774,444] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=2585330420 Ack=1588306864 Len=0 
[00:00:45.774,658] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=2585330420 Ack=1588306864 Len=0
[00:00:45.774,749] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): FIN_WAIT_1-&amp;gt;TIME_WAIT
[00:00:47.274,993] &amp;lt;dbg&amp;gt; net_tcp: tcp_timewait_timeout: (tcp_work): conn: 0x20023bd0  [TIME_WAIT Seq=2585330420 Ack=1588306864]
[00:00:47.275,024] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_unref: (tcp_work): context: 0x2000f234, conn: 0x20023bd0
[00:00:47.275,054] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (tcp_work): conn: 0x20023bd0, ref_count=1 (net_tcp_unref():484)
[00:00:47.275,085] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (tcp_work): Connection handler 0x2000f7e0 removed
[00:00:47.275,238] &amp;lt;dbg&amp;gt; net_ctx: net_context_unref: (tcp_work): Context 0x2000f234 released&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;We have checked the logs on the server as well but because of the Bad request we could not catch much information. Hopefully I will get new dongle today to setup sniffer. Will have more update on the issue by Monday.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406815?ContentTypeID=1</link><pubDate>Fri, 27 Jan 2023 10:14:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f808054f-646b-4baa-8722-9f05abf91393</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
[quote user="vipin das"]I am getting response(Bad Request) &amp;nbsp;from server as follows. &amp;quot;http_client: server_response_cb: Response status Bad Request&amp;quot;. Do you think I should do anything in the configuration. Below is my code snippet for http header formation. Could you please tell what is wrong here with my request.&amp;nbsp;[/quote]
&lt;p&gt;Please share the complete log of this.&lt;/p&gt;
&lt;p&gt;Have you checked the logs on the server?&lt;/p&gt;
[quote user="vipin das"]Could you please tell me any config option to enable the http_client log to see the http request(header + payload) &amp;nbsp;that I send to http server. Soon I will setup the sniffer for 802.15.4, hope that helps bit more right?&amp;nbsp;[/quote]
&lt;p&gt;Set the log level to debug, i.e CONFIG_NET_HTTP_LOG_LEVEL_DBG=y.&lt;/p&gt;
&lt;p&gt;The sniffer log might help with figuring out what is happening, yes.&lt;/p&gt;
[quote user="vipin das"]After this I wanted to use TLS socket for a secure communication.[/quote]
&lt;p&gt;Let us focus on getting TCP to work first, before focusing on TLS.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406790?ContentTypeID=1</link><pubDate>Fri, 27 Jan 2023 08:33:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dcc9cfd4-f5b8-412f-bab3-d9ffa84ad454</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Any update on my last posted questions?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Could you please tell the possible reasons for Bad HTTP request?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406628?ContentTypeID=1</link><pubDate>Thu, 26 Jan 2023 11:25:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:98c786ef-614b-401f-b4fe-cd8c9747f79e</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Finally I figured it out the reason&amp;nbsp;for the above mentioned issue. OpenThread&amp;#39;s TCP stack interferes with Zephyr&amp;#39;s stack. Jonathan from OpenThread gave a hint on the problem and disabling the config solves the issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But I might need your support on figuring out some other issues. &amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;I am getting response(Bad Request) &amp;nbsp;from server as follows. &amp;quot;http_client: server_response_cb: Response status Bad Request&amp;quot;. Do you think I should do anything in the configuration. Below is my code snippet for http header formation. Could you please tell what is wrong here with my request.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;char* fields[]         = {&amp;quot;Host:mainnet.incubed.net&amp;quot;, &amp;quot;User-Agent: openthread https for in3&amp;quot;, NULL};
    req.header_fields      = fields;
    req.optional_headers   = fields;
    req.content_type_value = &amp;quot;application/json&amp;quot;;
    req.method             = HTTP_POST;
    req.url                = &amp;quot;/&amp;quot;;
    req.host               = SERVER_ADDR6;
    req.protocol           = &amp;quot;HTTP/1.1&amp;quot;;
    req.payload            = msg;
    req.payload_len        = len;
    req.response           = server_response_cb;
    req.recv_buf           = recv_buf_ipv6;
    req.recv_buf_len       = sizeof(recv_buf_ipv6);
    ret                    = http_client_req(sock6, &amp;amp;req, timeout, &amp;quot;IPv6 POST&amp;quot;);&lt;/pre&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Could you please tell me any config option to enable the http_client log to see the http request(header + payload) &amp;nbsp;that I send to http server. Soon I will setup the sniffer for 802.15.4, hope that helps bit more right?&amp;nbsp;&lt;/li&gt;
&lt;li&gt;After this I wanted to use TLS socket for a secure communication. But when I enable&amp;nbsp;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_NET_SOCKETS_SOCKOPT_TLS, I get an error as seen&amp;nbsp;&lt;/span&gt;below log:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:35.928,649] &amp;lt;dbg&amp;gt; in3_ot: sendOpenThreadPing: Ping Server:
[00:00:35.928,680] &amp;lt;dbg&amp;gt; in3_ot: printIpv6Address: Mesh Local EID Address: fd97.6739.093e.0002.0000.0000.a756.5ef8
[00:00:35.929,016] &amp;lt;dbg&amp;gt; in3_ot: sendOpenThreadPing: ping send response:0
[00:00:35.929,229] &amp;lt;dbg&amp;gt; http_client: in3_register_https_client: in3 register https
[00:00:35.962,066] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:00:35.962,219] &amp;lt;dbg&amp;gt; net_sock_tls: tls_alloc: (main): Allocated TLS context, 0x200050b0
[00:00:35.962,524] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x200328e8, ref_count: 1
[00:00:35.962,554] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x200328e8
[00:00:35.962,585] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x20011fcc, fd=1
[00:00:35.962,738] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x20011fcc binding to TCP [::]:39902 iface 1 (0x20000ab8)
[00:00:35.962,890] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x20011fcc, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:00:35.962,982] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x200328e8 src: ::, dst: fd97:6739:93e:2::a756:5ef8
[00:00:35.963,104] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x20012578/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/443 
[00:00:35.963,165] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/39902 cb 0x18425 ud 0x20011fcc
[00:00:35.963,287] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=1480259692 Ack=0]
[00:00:35.963,562] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=1480259692 Len=0
[00:00:35.963,714] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=1480259692 Len=0 
[00:00:35.963,958] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=1480259692 Len=0
[00:00:35.964,294] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:00:35.989,471] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000200 Current role: router
[00:00:35.989,532] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000001 Current role: router
[00:00:36.188,507] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:36.188,720] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:36.413,055] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:36.413,269] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:36.637,573] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:36.637,786] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:36.862,091] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:36.862,304] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:37.086,608] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:37.086,822] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:37.311,157] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:37.311,370] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:37.535,675] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:37.535,888] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:37.760,223] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:37.760,437] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:37.984,771] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:37.985,015] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1480259692 Len=0
[00:00:38.209,320] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1480259692 Len=0 in_retransmission
[00:00:38.209,381] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (tcp_work): conn: 0x200328e8, ref_count=1 (tcp_send_process():568)
[00:00:38.209,411] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (tcp_work): conn: 0x200328e8 is waiting on connect semaphore
[00:00:38.964,416] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (main): conn: 0x200328e8, ref_count=1 (net_tcp_connect():2856)
[00:00:38.964,477] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (main): Connection handler 0x20012578 removed
[00:00:38.964,599] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x200328e8, ret=-116
[00:00:38.964,630] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-116)
[00:00:38.964,660] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:00:38.964,660] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:00:39.021,118] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!&lt;/pre&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Could you please tell why connection to TLS socket is getting failed here. &amp;nbsp;My TLS config from prj.conf.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;#Socket settings
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y
CONFIG_POSIX_MAX_FDS=8
CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=10

#MBEDTLS and security configuration 
CONFIG_MBEDTLS_CFG_FILE=&amp;quot;config-tls-generic.h&amp;quot;
CONFIG_OPENTHREAD_MBEDTLS_CHOICE=y
CONFIG_MBEDTLS_TLS_VERSION_1_2=y
CONFIG_MBEDTLS_TLS_LIBRARY=y
CONFIG_MBEDTLS_SSL_PROTO_TLS1_2=y

# TLS configuration
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_BUILTIN=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_HEAP_SIZE=64000
CONFIG_MBEDTLS_ENTROPY_ENABLED=y
# certificate must fit into one message, fragmenting is not supported
CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN=10240
CONFIG_MBEDTLS_PEM_CERTIFICATE_FORMAT=n

#Credentials
CONFIG_TLS_CREDENTIALS=y
CONFIG_TLS_MAX_CREDENTIALS_NUMBER=4&lt;/pre&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Regards&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Vipin Das&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406322?ContentTypeID=1</link><pubDate>Tue, 24 Jan 2023 16:01:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:16624ad3-365a-4a75-b3fc-5766fbe59736</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Thank you.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I am not sure how quickly I can setup the sniffer for 802.15.4 as I don&amp;#39;t have spare dongle with me. I have only one spare nRF5340 DK. I think I cannot setup sniffer on that. But let me see how fast I can set it up.Do you have any other thoughts on this issue or something I can try.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Currently I am using the default network key for my thread network.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I didn&amp;#39;t check the logs on the server side. But can check the logs tomorrow.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406266?ContentTypeID=1</link><pubDate>Tue, 24 Jan 2023 13:43:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bc8db1cf-e725-4fa2-a513-59499542d39c</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;115 is ENETDOWN (network is down) and 116 is ETIMEDOUT (connection timed out).&lt;/p&gt;
&lt;p&gt;Can you set up an 802.15.4 sniffer and collect a sniffer log of when you try to set up TCP socket? Make sure to use the same Thread nwk key as the default one in the samples, or share your nwk key here.&lt;/p&gt;
&lt;p&gt;Are you able to collect logs from the server? If so, are you able to see if anything is happening there?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406171?ContentTypeID=1</link><pubDate>Tue, 24 Jan 2023 08:40:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:48dcebd7-2d2d-46c7-aed0-2de9cb752cd2</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Sorry to ask on this issue again as I am really blocked because of this. I know you are also busy with lot of other issues.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I am ready to try any suggestions you make to resolve this. Do you think &amp;quot;&amp;nbsp;net_config: Network initialisation failed (-115)&amp;quot; has anything to do with this error &amp;quot;&amp;nbsp;Cannot connect to IPv6 remote (-116)&amp;quot;.&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406072?ContentTypeID=1</link><pubDate>Mon, 23 Jan 2023 15:06:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f02d5714-e875-4265-8ec8-5ffd2f242b47</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Thanks. It is very much similar as in the http_client.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;connect_socket:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;static int connect_socket(sa_family_t family, const char* server, int port,
                          int* sock, struct sockaddr* addr, socklen_t addr_len) {
  int ret;

  ret = setup_socket(family, server, port, sock, addr, addr_len);
  if (ret &amp;lt; 0 || *sock &amp;lt; 0) {
    LOG_ERR(&amp;quot;Setup socket Failed&amp;quot;);
    return -1;
  }

  ret = connect(*sock, addr, addr_len);
  if (ret &amp;lt; 0) {
    LOG_ERR(&amp;quot;Cannot connect to %s remote (%d)&amp;quot;, family == AF_INET ? &amp;quot;IPv4&amp;quot; : &amp;quot;IPv6&amp;quot;, -errno);
    ret = -errno;
  }
  return ret;
}&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;setup_socket:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;static int setup_socket(sa_family_t family, const char* server, int port, int* sock, struct sockaddr* addr, socklen_t addr_len) {
  const char* family_str = family == AF_INET ? &amp;quot;IPv4&amp;quot; : &amp;quot;IPv6&amp;quot;;
  int         ret        = 0;

  memset(addr, 0, addr_len);

  if (family == AF_INET) {
    net_sin(addr)-&amp;gt;sin_family = AF_INET;
    net_sin(addr)-&amp;gt;sin_port   = htons(port);
    inet_pton(family, server, &amp;amp;net_sin(addr)-&amp;gt;sin_addr);
  }
  else {
    net_sin6(addr)-&amp;gt;sin6_family = AF_INET6;
    net_sin6(addr)-&amp;gt;sin6_port   = htons(port);
    inet_pton(AF_INET6, server, &amp;amp;net_sin6(addr)-&amp;gt;sin6_addr);
    LOG_DBG(&amp;quot;Setup socket info: Server address: %s&amp;quot;, server);
  }

#if defined(CONFIG_NET_SOCKETS_SOCKOPT_TLS)
  sec_tag_t sec_tag_list[] = {CA_CERTIFICATE_TAG};

  *sock = socket(family, SOCK_STREAM, IPPROTO_TLS_1_2);
  if (*sock &amp;gt;= 0) {
    ret = setsockopt(*sock, SOL_TLS, TLS_SEC_TAG_LIST, sec_tag_list, sizeof(sec_tag_list));
    if (ret &amp;lt; 0) {
      LOG_ERR(&amp;quot;Failed to set %s secure option (%d)&amp;quot;, family_str, -errno);
      ret = -errno;
    }

    ret = setsockopt(*sock, SOL_TLS, TLS_HOSTNAME, TLS_PEER_HOSTNAME, sizeof(TLS_PEER_HOSTNAME));
    if (ret &amp;lt; 0) {
      LOG_ERR(&amp;quot;Failed to set %s TLS_HOSTNAME &amp;quot;
              &amp;quot;option (%d)&amp;quot;,
              family_str, -errno);
      ret = -errno;
    }
  }
#else
  *sock    = socket(family, SOCK_STREAM, IPPROTO_TCP);
#endif

  if (*sock &amp;lt; 0) {
    LOG_ERR(&amp;quot;Failed to create %s HTTP socket (%d)&amp;quot;, family_str, -errno);
  }
  return ret;
}&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Initially I wanted to see I am able to connect to TCP socket later I I will try to make TLS work. So please take a look at below given logs:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1st:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:00.308,074] &amp;lt;inf&amp;gt; ieee802154_nrf5: nRF5 802154 radio initialized
[00:00:00.308,441] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_init: (main): Workq started. Thread ID: 0x20005428
[00:00:00.322,723] &amp;lt;inf&amp;gt; fs_nvs: 2 Sectors of 4096 bytes
[00:00:00.322,723] &amp;lt;inf&amp;gt; fs_nvs: alloc wra: 0, f48
[00:00:00.322,753] &amp;lt;inf&amp;gt; fs_nvs: data wra: 0, 1f4
[00:00:00.331,420] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x1007c300 Current role: disabled
[00:00:00.335,784] &amp;lt;inf&amp;gt; net_config: Initializing network
[00:00:00.335,784] &amp;lt;inf&amp;gt; net_config: Waiting interface 1 (0x20000ab0) to be up...
[00:00:30.336,486] &amp;lt;err&amp;gt; net_config: Timeout while waiting network interface
[00:00:30.336,517] &amp;lt;err&amp;gt; net_config: Network initialization failed (-115)
[00:00:30.336,944] &amp;lt;inf&amp;gt; in3_ot: Waiting for host to be ready to communicate
[00:00:30.341,064] &amp;lt;inf&amp;gt; usb_cdc_acm: Device suspended
[00:00:30.538,879] &amp;lt;inf&amp;gt; usb_cdc_acm: Device resumed
[00:00:30.655,090] &amp;lt;inf&amp;gt; usb_cdc_acm: Device suspended
[00:00:30.884,216] &amp;lt;inf&amp;gt; usb_cdc_acm: Device resumed
[00:00:30.943,786] &amp;lt;inf&amp;gt; usb_cdc_acm: Device configured
[00:00:41.255,187] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x10000000 Current role: disabled
[00:00:41.255,920] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x10000000 Current role: disabled
[00:00:41.257,019] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00001000 Current role: disabled
[00:00:41.257,324] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000001 Current role: disabled
[00:00:41.257,507] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000008 Current role: disabled
[00:00:41.257,629] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x01000000 Current role: disabled
[00:00:41.257,751] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000004 Current role: detached
[00:00:41.257,904] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000001 Current role: detached
[00:00:41.258,148] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00001000 Current role: detached
[00:00:41.258,392] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00001000 Current role: detached
[00:00:41.258,636] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000010 Current role: detached
[00:00:41.259,002] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000020 Current role: detached
[00:00:41.490,570] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00001084 Current role: router
[00:00:41.491,485] &amp;lt;dbg&amp;gt; in3_ot: sendOpenThreadPing: Ping Server:
[00:00:41.491,516] &amp;lt;dbg&amp;gt; in3_ot: printIpv6Address: Mesh Local EID Address: fd97.6739.093e.0002.0000.0000.a756.5ef8
[00:00:41.491,851] &amp;lt;dbg&amp;gt; in3_ot: sendOpenThreadPing: ping send response:0
[00:00:41.492,065] &amp;lt;dbg&amp;gt; http_client: in3_register_https_client: in3 register https
[00:00:41.524,871] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:00:41.525,085] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20031098, ref_count: 1
[00:00:41.525,115] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20031098
[00:00:41.525,146] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x200109f8, fd=0
[00:00:41.525,268] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x200109f8 binding to TCP [::]:37464 iface 1 (0x20000ab0)
[00:00:41.525,360] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x200109f8, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:00:41.525,512] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098 src: ::, dst: fd97:6739:93e:2::a756:5ef8
[00:00:41.525,634] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x20010e94/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/80 
[00:00:41.525,665] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/37464 cb 0x16f05 ud 0x200109f8
[00:00:41.525,787] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=1506709185 Ack=0]
[00:00:41.526,062] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=1506709185 Len=0
[00:00:41.526,245] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=1506709185 Len=0 
[00:00:41.526,458] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=1506709185 Len=0
[00:00:41.526,824] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:00:41.551,513] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000200 Current role: router
[00:00:41.551,574] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000001 Current role: router
[00:00:41.742,004] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:41.742,218] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:41.957,550] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:41.957,763] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:42.173,095] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:42.173,309] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:42.388,610] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:42.388,824] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:42.604,156] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:42.604,370] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:42.819,702] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:42.819,946] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0
[00:00:43.035,247] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=1506709185 Len=0 in_retransmission
[00:00:43.035,461] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=1506709185 Len=0&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;2nd:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:36.100,524] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=4280518776 Len=0
[00:00:36.326,812] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=4280518776 Len=0 in_retransmission
[00:00:36.327,026] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (tcp_work): SYN Seq=4280518776 Len=0
[00:00:36.553,344] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (tcp_work): SYN Seq=4280518776 Len=0 in_retransmission
[00:00:36.553,375] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (tcp_work): conn: 0x20031098, ref_count=1 (tcp_send_process():568)
[00:00:36.553,405] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (tcp_work): conn: 0x20031098 is waiting on connect semaphore
[00:00:37.288,635] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (main): conn: 0x20031098, ref_count=1 (net_tcp_connect():2856)
[00:00:37.288,665] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (main): Connection handler 0x20010e94 removed
[00:00:37.288,787] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=-116
[00:00:37.288,818] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-116)
[00:00:37.288,848] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:00:37.288,848] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:00:37.373,229] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:00:37.373,413] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20031098, ref_count: 1
[00:00:37.373,443] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20031098
[00:00:37.373,504] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x20010a98, fd=1
[00:00:37.373,626] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x20010a98 binding to TCP [::]:37159 iface 1 (0x20000ab0)
[00:00:37.373,748] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x20010a98, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:00:37.373,870] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098 src: fd97:6739:93e:1:9356:10a6:172a:4184, dst: fd97:6739:93e:2::a756:5ef8
[00:00:37.373,992] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x20010e94/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/80 
[00:00:37.374,053] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/37159 cb 0x16f05 ud 0x20010a98
[00:00:37.374,176] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=326464843 Ack=0]
[00:00:37.374,450] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=326464843 Len=0
[00:00:37.374,603] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=326464843 Len=0 
[00:00:37.374,816] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=326464843 Len=0
[00:00:37.375,579] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:00:37.471,466] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030448 src port 80 dst port 37159 family 2
[00:00:37.471,496] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16f05 ud 0x20010a98 rank 0x3f
[00:00:37.471,832] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=192238644 Ack=326464844 Len=0 [SYN_SENT Seq=326464844 Ack=0]
[00:00:37.471,862] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:00:37.471,893] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:00:37.471,923] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:00:37.471,954] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:00:37.471,984] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:00:37.472,137] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=326464843 Len=0
[00:00:37.472,442] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=326464844 Ack=192238645 Len=0
[00:00:37.472,625] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=326464844 Ack=192238645 Len=0 
[00:00:37.472,808] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=326464844 Ack=192238645 Len=0
[00:00:37.472,900] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:00:37.473,144] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=0
[00:00:37.473,205] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x20010a98, cb: 0x9c5d, user_data: (nil)
[00:00:37.473,358] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x20010a98, cb: 0x9c5d, user_data: (nil)
[00:00:37.473,510] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:00:37.473,541] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 75 bytes (total 75)
[00:00:37.473,571] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=75&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;3rd:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:01:09.119,964] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=2522094062 Len=0
[00:01:09.120,117] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=2522094062 Len=0 
[00:01:09.120,330] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=2522094062 Len=0
[00:01:09.121,093] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:01:09.172,637] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030448 src port 80 dst port 65078 family 2
[00:01:09.172,668] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16f05 ud 0x20010a98 rank 0x3f
[00:01:09.173,004] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=3955719044 Ack=2522094063 Len=0 [SYN_SENT Seq=2522094063 Ack=0]
[00:01:09.173,034] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:01:09.173,065] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:01:09.173,095] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:01:09.173,126] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:01:09.173,156] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:01:09.173,339] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=2522094062 Len=0
--- 21 messages dropped ---
[00:01:09.173,614] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=2522094063 Ack=3955719045 Len=0
[00:01:09.173,828] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=2522094063 Ack=3955719045 Len=0 
[00:01:09.174,011] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=2522094063 Ack=3955719045 Len=0
--- 27 messages dropped ---
[00:01:09.174,133] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:01:09.174,346] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=0
[00:01:09.248,168] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:01:09.248,229] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20031098, ref_count=1 (tcp_in():2513)
[00:01:09.248,260] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20010e94 removed
[00:01:09.248,291] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x20010a98, pkt=(nil), st=-104, user_data=(nil)
[00:01:09.409,240] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
--- 31 messages dropped ---
[00:01:09.409,271] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:01:09.409,301] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:01:09.409,484] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=2790064174 Len=0
[00:01:09.409,759] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=2790064175 Ack=1960114298 Len=0
--- 12 messages dropped ---
[00:01:09.491,424] &amp;lt;dbg&amp;gt; net_sock: z_impl_zsock_close: (main): close: ctx=0x20010a98, fd=1
[00:01:09.491,455] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x20010a98, cb: (nil), user_data: (nil)
[00:01:09.491,516] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_unref: (main): context: 0x20010a98, conn: (nil)
[00:01:09.491,546] &amp;lt;dbg&amp;gt; net_ctx: net_context_unref: (main): Context 0x20010a98 released
[00:01:09.576,385] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=1024053545 Len=0
[00:01:09.576,507] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:01:09.579,071] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030518 src port 80 dst port 65485 family 2
[00:01:09.579,101] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): No match found.
[00:01:09.647,186] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030518 src port 80 dst port 51242 family 2
[00:01:09.647,216] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16f05 ud 0x20010a98 rank 0x3f
[00:01:09.647,552] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=901099195 Ack=1024053546 Len=0 [SYN_SENT Seq=1024053546 Ack=0]
[00:01:09.647,583] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:01:09.647,613] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:01:09.647,644] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:01:09.647,674] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:01:09.647,705] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:01:09.647,857] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=1024053545 Len=0
[00:01:09.648,162] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=1024053546 Ack=901099196 Len=0
[00:01:09.648,376] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=1024053546 Ack=901099196 Len=0 
[00:01:09.648,559] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=1024053546 Ack=901099196 Len=0
[00:01:09.648,651] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:01:09.648,864] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=0
[00:01:09.648,925] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x20010a98, cb: 0x9c5d, user_data: (nil)
[00:01:09.649,078] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x20010a98, cb: 0x9c5d, user_data: (nil)
[00:01:09.649,230] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:01:09.649,261] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 75 bytes (total 75)
[00:01:09.649,261] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=75
[00:01:09.649,658] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): ACK,PSH Seq=1024053546 Ack=901099196 Len=75
[00:01:09.649,841] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): ACK,PSH Seq=1024053546 Ack=901099196 Len=75 
[00:01:09.650,054] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): ACK,PSH Seq=1024053546 Ack=901099196 Len=75
[00:01:09.650,146] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 total=75, unacked_len=75, send_win=1280, mss=1280
[00:01:09.650,177] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 send_data_timer=0, send_data_retries=0
[00:01:09.650,207] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=0
[00:01:09.650,268] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;4th&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:03:33.441,802] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20031098, ref_count: 1
[00:03:33.441,833] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20031098
[00:03:33.441,894] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x200109f8, fd=0
[00:03:33.442,016] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x200109f8 binding to TCP [::]:59799 iface 1 (0x20000ab0)
[00:03:33.442,138] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x200109f8, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:03:33.442,260] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098 src: fd97:6739:93e:1:9356:10a6:172a:4184, dst: fd97:6739:93e:2::a756:5ef8
[00:03:33.442,413] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x20010e94/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/80 
[00:03:33.442,443] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/59799 cb 0x16f05 ud 0x200109f8
[00:03:33.442,596] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=3852373274 Ack=0]
[00:03:33.442,871] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=3852373274 Len=0
[00:03:33.443,023] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=3852373274 Len=0 
[00:03:33.443,267] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=3852373274 Len=0
[00:03:33.443,389] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:03:33.445,404] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030448 src port 80 dst port 51731 family 2
[00:03:33.445,434] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): No match found.
[00:03:33.556,335] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030448 src port 80 dst port 59799 family 2
[00:03:33.556,365] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16f05 ud 0x200109f8 rank 0x3f
[00:03:33.556,732] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=1071215906 Ack=3852373275 Len=0 [SYN_SENT Seq=3852373275 Ack=0]
[00:03:33.556,762] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:03:33.556,793] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:03:33.556,823] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:03:33.556,854] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:03:33.556,884] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:03:33.557,067] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=3852373274 Len=0
[00:03:33.557,342] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=3852373275 Ack=1071215907 Len=0
[00:03:33.557,556] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=3852373275 Ack=1071215907 Len=0 
[00:03:33.557,769] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=3852373275 Ack=1071215907 Len=0
[00:03:33.557,861] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:03:33.558,105] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=0
[00:03:33.558,166] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c5d, user_data: (nil)
[00:03:33.558,319] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c5d, user_data: (nil)
[00:03:33.558,441] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:03:33.558,471] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 75 bytes (total 75)
[00:03:33.558,502] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=75
[00:03:33.558,898] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): ACK,PSH Seq=3852373275 Ack=1071215907 Len=75
[00:03:33.559,112] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): ACK,PSH Seq=3852373275 Ack=1071215907 Len=75 
[00:03:33.559,326] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): ACK,PSH Seq=3852373275 Ack=1071215907 Len=75
[00:03:33.559,417] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 total=75, unacked_len=75, send_win=1280, mss=1280
[00:03:33.559,448] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 send_data_timer=0, send_data_retries=0
[00:03:33.559,478] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=0
[00:03:33.559,539] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:03:33.559,631] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c5d, user_data: (nil)
[00:03:33.559,753] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:03:33.559,783] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 7 bytes (total 82)
[00:03:33.559,814] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=7
[00:03:33.559,844] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=7
[00:03:33.559,906] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:03:33.636,505] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030448 src port 80 dst port 59799 family 2
[00:03:33.636,535] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16f05 ud 0x200109f8 rank 0x3f
[00:03:33.636,871] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): RST Seq=1071215907 Len=0 [ESTABLISHED Seq=3852373275 Ack=1071215907]
[00:03:33.636,901] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:03:33.636,962] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20031098, ref_count=1 (tcp_in():2513)
[00:03:33.637,023] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20010e94 removed
[00:03:33.637,054] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x200109f8, pkt=(nil), st=-104, user_data=(nil)
[00:03:33.637,084] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x200109f8 as peer-closed
[00:03:33.637,420] &amp;lt;dbg&amp;gt; net_sock: zsock_recv_stream: (main): NULL return from fifo
[00:03:33.637,481] &amp;lt;dbg&amp;gt; net_sock: z_impl_zsock_close: (main): close: ctx=0x200109f8, fd=0
[00:03:33.637,512] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: (nil), user_data: (nil)
[00:03:33.637,573] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_unref: (main): context: 0x200109f8, conn: (nil)
[00:03:33.637,603] &amp;lt;dbg&amp;gt; net_ctx: net_context_unref: (main): Context 0x200109f8 released
[00:03:33.694,519] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:03:33.696,563] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200304b0 src port 80 dst port 59799 family 2
[00:03:33.696,624] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): No match found.
[00:03:44.043,151] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000064 Current role: router&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;I have shared almost complete log from one power cycle. From the above given logs, I noticed two err things which I didn&amp;#39;t understand well why?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:30.336,486] &amp;lt;err&amp;gt; net_config: Timeout while waiting network interface
[00:00:30.336,517] &amp;lt;err&amp;gt; net_config: Network initialization failed (-115)&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;2:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;:00:37.288,787] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=-116
[00:00:37.288,818] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-116)
[00:00:37.288,848] &amp;lt;err&amp;gt; http_client: Failed to connect to socket&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;What it means with error code -116:&amp;nbsp;&lt;span&gt;Stale NFS file handle?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406068?ContentTypeID=1</link><pubDate>Mon, 23 Jan 2023 14:53:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c72a34a1-9c81-4511-93b6-63792033eaf1</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;There are some problems with setting up the socket. First it fails to connect to IPv6 remote due to the socket not existing, but afterwards you are unable to open sockets because there are too many open sockets. Can you share the code where you connect and open the socket? Is it similar to connect_socket() and setup_socket() in http_client?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/406009?ContentTypeID=1</link><pubDate>Mon, 23 Jan 2023 11:26:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:814aa532-80bc-4da5-be4e-369344ad7285</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Any update on the issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/405853?ContentTypeID=1</link><pubDate>Fri, 20 Jan 2023 14:08:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:19a3dce2-dfff-471d-b0c8-acbeb1315aa3</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Marte,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Register public certificate issue is solved as I understood&amp;nbsp;&lt;span&gt;tls_credential_add() is not needed&amp;nbsp;in my case as the public certificate is already&amp;nbsp;available.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;New log with TCP Socket:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:00:38.685,424] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_ref: (main): conn: 0x20031098, ref_count: 1
[00:00:38.685,455] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_alloc: (main): conn: 0x20031098
[00:00:38.685,516] &amp;lt;dbg&amp;gt; net_sock: zsock_socket_internal: (main): socket: ctx=0x200109f8, fd=0
[00:00:38.685,668] &amp;lt;dbg&amp;gt; net_ctx: net_context_bind: (main): Context 0x200109f8 binding to TCP [::]:64372 iface 1 (0x20000ab0)
[00:00:38.685,760] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): context: 0x200109f8, local: ::, remote: fd97:6739:93e:2::a756:5ef8
[00:00:38.685,882] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098 src: fd11:22::971:d9ff:d4a:17c1, dst: fd97:6739:93e:2::a756:5ef8
[00:00:38.686,035] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main): [0x20010e94/6/2/0x3f] remote fd97:6739:93e:2::a756:5ef8/80 
[00:00:38.686,065] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/64372 cb 0x16ec5 ud 0x200109f8
[00:00:38.686,218] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=2289931732 Ack=0]
[00:00:38.686,492] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=2289931732 Len=0
[00:00:38.686,645] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=2289931732 Len=0 
[00:00:38.686,889] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=2289931732 Len=0
[00:00:38.687,011] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:00:38.756,774] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200304b0 src port 80 dst port 64372 family 2
[00:00:38.756,835] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16ec5 ud 0x200109f8 rank 0x3f
[00:00:38.757,171] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=1304989996 Ack=2289931733 Len=0 [SYN_SENT Seq=2289931733 Ack=0]
[00:00:38.757,202] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:00:38.757,232] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:00:38.757,293] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:00:38.757,324] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:00:38.757,354] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20031098 window_full=0
[00:00:38.757,537] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=2289931732 Len=0
[00:00:38.757,843] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=2289931733 Ack=1304989997 Len=0
[00:00:38.758,026] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=2289931733 Ack=1304989997 Len=0 
[00:00:38.758,239] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=2289931733 Ack=1304989997 Len=0
[00:00:38.758,331] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:00:38.758,575] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20031098, ret=0
[00:00:38.758,636] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c1d, user_data: (nil)
[00:00:38.758,789] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c1d, user_data: (nil)
[00:00:38.758,911] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:00:38.758,941] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 75 bytes (total 75)
[00:00:38.758,972] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=75
[00:00:38.759,368] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): ACK,PSH Seq=2289931733 Ack=1304989997 Len=75
[00:00:38.759,582] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): ACK,PSH Seq=2289931733 Ack=1304989997 Len=75 
[00:00:38.759,796] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): ACK,PSH Seq=2289931733 Ack=1304989997 Len=75
[00:00:38.759,887] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 total=75, unacked_len=75, send_win=1280, mss=1280
[00:00:38.759,918] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_data: (main): conn: 0x20031098 send_data_timer=0, send_data_retries=0
[00:00:38.759,948] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=0
[00:00:38.760,009] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:00:38.760,070] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: 0x9c1d, user_data: (nil)
[00:00:38.760,192] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:00:38.760,223] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_queue_data: (main): conn: 0x20031098 Queued 7 bytes (total 82)
[00:00:38.760,284] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=7
[00:00:38.760,314] &amp;lt;dbg&amp;gt; net_tcp: tcp_unsent_len: (main): unsent_len=7
[00:00:38.760,345] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (main): conn: 0x20031098 window_full=0
[00:00:38.835,021] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200304b0 src port 80 dst port 64372 family 2
[00:00:38.835,052] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20010e94] match found cb 0x16ec5 ud 0x200109f8 rank 0x3f
[00:00:38.835,388] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): RST Seq=1304989997 Len=0 [ESTABLISHED Seq=2289931733 Ack=1304989997]
[00:00:38.835,418] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:00:38.835,510] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20031098, ref_count=1 (tcp_in():2513)
[00:00:38.835,540] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20010e94 removed
[00:00:38.835,571] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x200109f8, pkt=(nil), st=-104, user_data=(nil)
[00:00:38.835,601] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x200109f8 as peer-closed
[00:00:38.835,968] &amp;lt;dbg&amp;gt; net_sock: zsock_recv_stream: (main): NULL return from fifo
[00:00:38.836,029] &amp;lt;dbg&amp;gt; net_sock: z_impl_zsock_close: (main): close: ctx=0x200109f8, fd=0
[00:00:38.836,059] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x200109f8, cb: (nil), user_data: (nil)
[00:00:38.836,090] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_unref: (main): context: 0x200109f8, conn: (nil)
[00:00:38.836,120] &amp;lt;dbg&amp;gt; net_ctx: net_context_unref: (main): Context 0x200109f8 released
[00:00:38.892,333] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:00:38.894,378] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x20030518 src port 80 dst port 64372 family 2
[00:00:38.894,409] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): No match found.
[00:00:52.692,260] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000064 Current role: router&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Could you tell me how it looks. Where is the problem.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;New log with TLS Socket:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;[00:01:08.330,535] &amp;lt;dbg&amp;gt; net_conn: conn_register_debug: (main):   local ::/65362 cb 0x17ffd ud 0x2001396c
[00:01:08.330,657] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main):  [LISTEN Seq=3585118676 Ack=0]
[00:01:08.330,932] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (main): SYN Seq=3585118676 Len=0
[00:01:08.331,085] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (main): SYN Seq=3585118676 Len=0 
[00:01:08.331,298] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (main): SYN Seq=3585118676 Len=0
[00:01:08.331,420] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (main): LISTEN-&amp;gt;SYN_SENT
[00:01:08.333,770] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200333c0 src port 443 dst port 63379 family 2
[00:01:08.333,831] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20013be4] match found cb 0x17ffd ud 0x2001382c rank 0x3f
[00:01:08.334,106] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): RST Seq=1183333143 Len=0 [ESTABLISHED Seq=62085212 Ack=1183333143]
[00:01:08.334,167] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:01:08.334,228] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20033d70, ref_count=1 (tcp_in():2513)
[00:01:08.334,259] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20013be4 removed
[00:01:08.334,289] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x2001382c, pkt=(nil), st=-104, user_data=(nil)
[00:01:08.334,320] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x2001382c as peer-closed
[00:01:08.430,603] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200333c0 src port 443 dst port 58403 family 2
[00:01:08.430,664] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20013c28] match found cb 0x17ffd ud 0x200138cc rank 0x3f
[00:01:08.430,969] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): RST Seq=2457617469 Len=0 [ESTABLISHED Seq=254582845 Ack=2457617469]
[00:01:08.430,999] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:01:08.431,060] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20033fa8, ref_count=1 (tcp_in():2513)
[00:01:08.431,091] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20013c28 removed
[00:01:08.431,152] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x200138cc, pkt=(nil), st=-104, user_data=(nil)
[00:01:08.431,182] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x200138cc as peer-closed
[00:01:08.436,981] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200333c0 src port 443 dst port 65362 family 2
[00:01:08.437,011] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20013ba0] match found cb 0x17ffd ud 0x2001396c rank 0x3f
[00:01:08.437,347] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=1830652639 Ack=3585118677 Len=0 [SYN_SENT Seq=3585118677 Ack=0]
[00:01:08.437,408] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): len=4
[00:01:08.437,438] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4
[00:01:08.437,438] &amp;lt;dbg&amp;gt; net_tcp: tcp_options_check: (rx_q[0]): MSS=1460
[00:01:08.437,469] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): Lowering send window from 64240 to 1280
[00:01:08.437,500] &amp;lt;dbg&amp;gt; net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20033b38 window_full=0
[00:01:08.437,683] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=3585118676 Len=0
[00:01:08.437,988] &amp;lt;dbg&amp;gt; net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=3585118677 Ack=1830652640 Len=0
[00:01:08.438,171] &amp;lt;dbg&amp;gt; net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=3585118677 Ack=1830652640 Len=0 
[00:01:08.438,385] &amp;lt;dbg&amp;gt; net_tcp: tcp_send: (rx_q[0]): ACK Seq=3585118677 Ack=1830652640 Len=0
[00:01:08.438,476] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): SYN_SENT-&amp;gt;ESTABLISHED
[00:01:08.438,720] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_connect: (main): conn: 0x20033b38, ret=0
[00:01:08.438,751] &amp;lt;dbg&amp;gt; net_tcp: net_tcp_recv: (main): context: 0x2001396c, cb: 0x9d55, user_data: (nil)
[00:01:08.438,812] &amp;lt;err&amp;gt; http_client: Cannot connect to IPv6 remote (-2)
[00:01:08.438,842] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:01:08.438,842] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:01:08.522,583] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:01:08.522,613] &amp;lt;err&amp;gt; http_client: Failed to create IPv6 HTTP socket (-23)
[00:01:08.522,644] &amp;lt;err&amp;gt; http_client: Setup socket Failed
[00:01:08.522,644] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:01:08.522,674] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:01:08.605,682] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:01:08.605,712] &amp;lt;err&amp;gt; http_client: Failed to create IPv6 HTTP socket (-23)
[00:01:08.605,743] &amp;lt;err&amp;gt; http_client: Setup socket Failed
[00:01:08.605,743] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:01:08.605,773] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:01:08.688,690] &amp;lt;dbg&amp;gt; http_client: setup_socket: Setup socket info: Server address: fd97:6739:93e:2:0:0:A756:5EF8
[00:01:08.688,751] &amp;lt;err&amp;gt; http_client: Failed to create IPv6 HTTP socket (-23)
[00:01:08.688,751] &amp;lt;err&amp;gt; http_client: Setup socket Failed
[00:01:08.688,751] &amp;lt;err&amp;gt; http_client: Failed to connect to socket
[00:01:08.688,781] &amp;lt;dbg&amp;gt; http_client: run_https_post: starting tcp failed
[00:01:08.744,964] &amp;lt;dbg&amp;gt; main: main: Error sending rpc request: The request could not be send!
[00:01:08.828,796] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): Check TCP listener for pkt 0x200333c0 src port 443 dst port 65362 family 2
[00:01:08.828,826] &amp;lt;dbg&amp;gt; net_conn: net_conn_input: (rx_q[0]): [0x20013ba0] match found cb 0x17ffd ud 0x2001396c rank 0x3f
[00:01:08.829,132] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): RST Seq=1830652640 Len=0 [ESTABLISHED Seq=3585118677 Ack=1830652640]
[00:01:08.829,162] &amp;lt;dbg&amp;gt; net_tcp: tcp_in: (rx_q[0]): ESTABLISHED-&amp;gt;CLOSED
[00:01:08.829,223] &amp;lt;dbg&amp;gt; net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20033b38, ref_count=1 (tcp_in():2513)
[00:01:08.829,254] &amp;lt;dbg&amp;gt; net_conn: net_conn_unregister: (rx_q[0]): Connection handler 0x20013ba0 removed
[00:01:08.829,315] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): ctx=0x2001396c, pkt=(nil), st=-104, user_data=(nil)
[00:01:08.829,345] &amp;lt;dbg&amp;gt; net_sock: zsock_received_cb: (rx_q[0]): Marked socket 0x2001396c as peer-closed
[00:01:17.318,511] &amp;lt;inf&amp;gt; net_l2_openthread: State changed! Flags: 0x00000064 Current role: router&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Here I see socket setup is getting failed. Could you tell me what is happening here.&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Adaption to TCP+TLS on top of OpenThread.</title><link>https://devzone.nordicsemi.com/thread/405845?ContentTypeID=1</link><pubDate>Fri, 20 Jan 2023 13:22:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c5563a2c-2b18-477f-99ef-2a4c1208815a</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I see that you are getting this in your log:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;code&gt;&lt;span&gt;Failed to register public certificate&lt;/span&gt;&lt;span&gt;: &lt;/span&gt;&lt;span&gt;-17&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Error 17 is&amp;nbsp;EEXIST, which means that the file exists. This might be caused by calling&amp;nbsp;tls_credential_add() several places with the same sec_tag and type.&amp;nbsp;I see that you are calling it in send_https_post(). Does it work the first time, and then fails the following times, or does it fail from the beginning?&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>