<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/98977/psa_generate_key-failed-with-error--134</link><description>Hi nordic team, 
 I am working on an application which uses crypto cell feature, wifi capability of nrf7002DK, mbedTLS etc. I proceeded my development after individually verifying each features on nrf7002dk (crypto cell, wifi, mbedTLS etc). 
 My current</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 04 May 2023 14:36:11 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/98977/psa_generate_key-failed-with-error--134" /><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/423835?ContentTypeID=1</link><pubDate>Thu, 04 May 2023 14:36:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:10ce9814-e3dc-49b5-9f0b-0bab7f765918</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Thanks Einar for your support.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Right now I am not closing this topic, as I would be waiting for the proper fix for compatibility issue with&amp;nbsp;&lt;span&gt;wpa_supplicant with the PSA crypto libraries.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Hope you will update me with any news on the fix.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Thanks once again.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vipin Das&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/423825?ContentTypeID=1</link><pubDate>Thu, 04 May 2023 13:52:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fc447957-f2c9-4ec8-8372-740c66b28f74</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I don&amp;#39;t have a good solution at this point as that needs more work, but you should be able to use the &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/nrfxlib/nrf_security/doc/configuration.html#legacy-crypto-support"&gt;Legacy crypto support&lt;/a&gt;. One example of that with KMU is the &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/nrf/samples/keys/random_hw_unique_key/README.html"&gt;Random hardware unique key&lt;/a&gt;&amp;nbsp;sample. This is not what I would recommend long term, but if you need something right now, it is a possibility.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/423213?ContentTypeID=1</link><pubDate>Tue, 02 May 2023 08:57:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:aa5b8d80-0dab-4345-badd-22a1352ced7b</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Einar,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So it is not at all possible to&amp;nbsp;have wifi connection without wpa_supplicant right.&lt;/p&gt;
&lt;p&gt;In that case is there any other crypto api options I can use to generate key pairs other than &amp;nbsp;psa_generate_key() and store the private key securely in KMU. But those api shouldn&amp;#39;t fail with wpa_supplicant. If you have any suggestions please share the information.&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422991?ContentTypeID=1</link><pubDate>Fri, 28 Apr 2023 12:57:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:eb1a2b20-ef52-4562-b2e9-898bfbb8d277</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;Vipin,&lt;/p&gt;
&lt;p&gt;The Wi-Fi stack depends on wpa_supplicant for other tasks as well (see &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.3.0/nrf/protocols/wifi/index.html#supplicant"&gt;Supplicant&lt;/a&gt;), so I think it will be difficult to do much useful - even with open networks - without wpa_supplicant. (You can do some things without it though, like &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.3.0/nrf/samples/wifi/scan/README.html"&gt;scanning&lt;/a&gt;).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422935?ContentTypeID=1</link><pubDate>Fri, 28 Apr 2023 10:31:16 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d1c51907-cd6c-4ec7-9900-43295de11cce</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Thanks for the detailed information. I completely got your point and agree with you.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We are focussing on developing secure product. But right now, we wanted to utilise the key derivation and management feature and try to communicate securely with remote server/devices.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I mentioned, we already have our crypto portion working and wifi portion working. Only the wpa_supplicant one is making the psa key derivation to fail.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Let me ask you one thing, is there any way I can connect to wifi with disabling wpa_supplicant?. I mean wifi connect using part terminal etc. That is also fine for time being to progress my further development.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422917?ContentTypeID=1</link><pubDate>Fri, 28 Apr 2023 09:30:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:29d8c6a8-dda3-42f9-b810-4d862b6a4513</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi Vipin,&lt;/p&gt;
&lt;p&gt;You don&amp;#39;t need TF-M for using CryptoCell if you whole application runs in secure mode. That mean&amp;nbsp;you are not utilizing security by separation, though. So if you are making a product where security is important I would try to avoid skipping that. Regarding SPM that is legacy as you write, and no longer&amp;nbsp;present in nRF Connect SDK 2.3.0. It also supported a very limited feature set.&lt;/p&gt;
&lt;p&gt;However, the real issue with combinding wpa_supplicant with the PSA crypto libraries is incompatible APIs, and this remains the same regardless if you use TF-M or not.&lt;/p&gt;
&lt;p&gt;As the one of the main problems is combining the use of PSA Crypto and wpa_supplicatant and you will need both (unless you want to put together&amp;nbsp;you own custom thing based partially on legacy APIs), I would try to keep the cryoto work or wifi_work in a separate project for now and combine later. If not, I suspect you will essentially be doing a similar work as we are currently&amp;nbsp;doing&amp;nbsp;in parallel, which doesn&amp;#39;t seem efficient.&lt;/p&gt;
&lt;p&gt;I will try to update you&amp;nbsp;whenever we have something usable in a PR.&lt;/p&gt;
&lt;p&gt;(&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/98520/secure-connection-to-aws-iot-over-wifi/421772"&gt;Here is another thread&lt;/a&gt;&amp;nbsp;with a similar issue where we gave essentially the same advice.)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422753?ContentTypeID=1</link><pubDate>Thu, 27 Apr 2023 13:01:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e5134775-b13e-4638-b017-ddf0f9eeaa23</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Einar,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Is there any other option, I can try to proceed with my current development. I have nrf5340dk and nrf7002dk with me. My final goal is to key derivation and management for message signing/verification operation and transmit the signed message to remote network.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Is it possible to proceed without TF-M? Without TF-M is there any other option to derive key and store the generated key in crypto cell?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What about using Legacy Nordic solution SPM? Can I use it in my current integration?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422743?ContentTypeID=1</link><pubDate>Thu, 27 Apr 2023 12:48:14 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8b7db0c5-0864-4502-a593-b493be9af32f</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;Vipin,&lt;/p&gt;
&lt;p&gt;You need to use wpa_supplicant to use encrypted Wi-Fi networks, and currently that is not compatible with using TF-M. These are both critical features though and we are&amp;nbsp;actively working&amp;nbsp;on this now, so while I do not have any solution at the moment, this will come soon.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422680?ContentTypeID=1</link><pubDate>Thu, 27 Apr 2023 09:15:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:da6d9455-ab54-41d3-af9d-e800816a3d12</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Kenneth,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks for the reply and providing me with a glimpse of useful information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;first and foremost let me clarify your confusion on the environment, for my&amp;nbsp;current usecase we really need key management and derivation feature. But I am not sure which one we should use for that,&amp;nbsp;Trustzone with the legacy Nordic solution(SPM) or TF-M. But I feel TF-M could be a good option. So.&amp;nbsp;stick with TF-M.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;After your reply, I played around with the configurations to break down which config&amp;nbsp;causes the issue. Finally I could figure it out and it is &amp;quot;&lt;/span&gt;&lt;span&gt;CONFIG_WPA_SUPP&amp;quot;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;My prj.conf after clean-up:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;#
#   Application project specific configuration
#
CONFIG_SOC_SERIES_NRF53X=y
CONFIG_SOC_NRF5340_CPUAPP_QKAA=y

# General
CONFIG_POSIX_CLOCK=y
CONFIG_POSIX_MAX_FDS=8
CONFIG_HW_STACK_PROTECTION=y
CONFIG_PM=y

# Target memory specific options
CONFIG_HW_UNIQUE_KEY=y
CONFIG_HW_UNIQUE_KEY_RANDOM=y
CONFIG_PM_SINGLE_IMAGE=y
CONFIG_MPU_ALLOW_FLASH_WRITE=y
CONFIG_RESET_ON_FATAL_ERROR=y
CONFIG_REBOOT=y
CONFIG_FPU=y
CONFIG_FP_HARDABI=y
CONFIG_KERNEL_MEM_POOL=y
CONFIG_INIT_STACKS=y
CONFIG_FLASH=y
CONFIG_FLASH_PAGE_LAYOUT=y
CONFIG_FLASH_MAP=y
CONFIG_NVS=y
CONFIG_SETTINGS=y
CONFIG_SETTINGS_NVS=y

# System settings
CONFIG_NEWLIB_LIBC=y
CONFIG_NEWLIB_LIBC_NANO=n

# Device security specific configs
CONFIG_NRF_SECURITY=y
CONFIG_BUILD_WITH_TFM=y

# For hardware crypto accelerator
CONFIG_PSA_CRYPTO_DRIVER_OBERON=n
CONFIG_PSA_CRYPTO_DRIVER_CC3XX=y

# Enable nordic security backend and PSA APIs
CONFIG_MBEDTLS_PSA_CRYPTO_C=y

# Memories
CONFIG_MAIN_STACK_SIZE=4096
CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=4096
CONFIG_LOG_BUFFER_SIZE=4096
# Below section is the primary contributor to SRAM and is currently
# tuned for performance, but this will be revisited in the future.
CONFIG_HEAP_MEM_POOL_SIZE=153600
CONFIG_MBEDTLS_HEAP_SIZE=120000

# Logging
CONFIG_LOG=y
CONFIG_CONSOLE=y
CONFIG_LOG_BACKEND_UART=y
CONFIG_NET_TCP_LOG_LEVEL_DBG=n
CONFIG_NET_SOCKETS_LOG_LEVEL_DBG=n
CONFIG_NET_CONN_LOG_LEVEL_DBG=n
CONFIG_NET_CONTEXT_LOG_LEVEL_DBG=n
CONFIG_NET_HTTP_LOG_LEVEL_DBG=n
CONFIG_WIFI_LOG_LEVEL_ERR=n
CONFIG_WPA_SUPP_LOG_LEVEL_ERR=n

# NET sockets
CONFIG_NETWORKING=y
CONFIG_NET_SOCKETS=y
CONFIG_NET_SOCKETS_POSIX_NAMES=y
CONFIG_NET_SOCKETS_POLL_MAX=8
CONFIG_NET_L2_ETHERNET=y
CONFIG_NET_IPV4=y
CONFIG_NET_TCP=y
CONFIG_NET_SOCKETS_OFFLOAD=n
CONFIG_NET_NATIVE=y
CONFIG_NET_DHCPV4=y
CONFIG_NET_CONTEXT_SNDTIMEO=y
CONFIG_NET_TCP_ISN_RFC6528=n
CONFIG_NET_MGMT_EVENT_INFO=y
CONFIG_NET_IF_UNICAST_IPV4_ADDR_COUNT=1
CONFIG_NET_MAX_CONTEXTS=5
CONFIG_NET_CONTEXT_SYNC_RECV=y

# Network address config
CONFIG_NET_CONFIG_SETTINGS=y
CONFIG_NET_CONFIG_NEED_IPV4=y
CONFIG_NET_CONFIG_MY_IPV4_ADDR=&amp;quot;192.168.1.99&amp;quot;
CONFIG_NET_CONFIG_MY_IPV4_NETMASK=&amp;quot;255.255.255.0&amp;quot;
CONFIG_NET_CONFIG_MY_IPV4_GW=&amp;quot;192.168.1.1&amp;quot;

# Server IPV4/IPV6 address config
#Mainnet.Incubed
CONFIG_NET_CONFIG_PEER_IPV4_ADDR=&amp;quot;167.86.94.248&amp;quot;

# HTTP
CONFIG_HTTP_CLIENT=y

# WiFi driver 
CONFIG_WIFI=y
CONFIG_WIFI_NRF700X=y

# Enable Secure socket option
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_MAC_SHA256_ENABLED=y
CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN=8192
CONFIG_MBEDTLS_TLS_LIBRARY=y

# WPA supplicant
CONFIG_WPA_SUPP=y&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;My application output with above config. Here&amp;nbsp;psa_generate_key failed but message send success.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting Zephyr OS build v3.2.99-ncs1-1547-ge2bec540218d ***
[00:00:01.251,159] &amp;lt;inf&amp;gt; cryptocell: Writing random keys to KMU
[00:00:01.313,690] &amp;lt;inf&amp;gt; cryptocell: Success!
[00:00:01.313,964] &amp;lt;dbg&amp;gt; in3_https: in3_register_https_client: in3 register https
[00:00:01.375,976] &amp;lt;inf&amp;gt; cryptocell: psa_generate_key failed! Error: -134
[00:00:01.376,129] &amp;lt;inf&amp;gt; wpa_supp: start_wpa_supplicant: 192 Starting wpa_supplicant thread with debug level: 3

[00:00:01.376,342] &amp;lt;inf&amp;gt; wpa_supp: Successfully initialized wpa_supplicant
[00:00:01.376,434] &amp;lt;inf&amp;gt; wpa_supp: iface_cb: iface wlan0 ifindex 1 f4:ce:36:00:1a:ee
[00:00:01.376,495] &amp;lt;inf&amp;gt; wpa_supp: Using interface wlan0

[00:00:01.376,525] &amp;lt;inf&amp;gt; wpa_supp: Initializing interface 0: wlan0

[00:00:02.379,760] &amp;lt;inf&amp;gt; wpa_supp: l2_packet_init: iface wlan0 ifindex 1
[00:00:03.311,889] &amp;lt;inf&amp;gt; wifi_handler: Connection requested
[00:00:03.611,999] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:03.912,139] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:04.212,280] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:04.512,390] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:04.812,500] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:05.112,640] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:05.412,750] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:05.712,890] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:06.013,000] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:06.313,140] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:06.613,250] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:06.913,360] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:07.213,470] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:07.513,610] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:07.813,751] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:08.113,891] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:08.414,001] &amp;lt;inf&amp;gt; wifi_handler: State: SCANNING
[00:00:08.651,611] &amp;lt;inf&amp;gt; wpa_supp: wlan0: SME: Trying to authenticate with ec:a8:1f:c9:bc:98 (SSID=&amp;#39;Das&amp;#39; freq=2437 MHz)
[00:00:08.670,074] &amp;lt;inf&amp;gt; wifi_nrf: wifi_nrf_wpa_supp_authenticate:Authentication request sent successfully

[00:00:08.714,172] &amp;lt;inf&amp;gt; wifi_handler: State: AUTHENTICATING
[00:00:08.925,445] &amp;lt;inf&amp;gt; wpa_supp: wlan0: Trying to associate with ec:a8:1f:c9:bc:98 (SSID=&amp;#39;Das&amp;#39; freq=2437 MHz)
[00:00:08.934,295] &amp;lt;inf&amp;gt; wifi_nrf: wifi_nrf_wpa_supp_associate: Association request sent successfully

[00:00:08.963,409] &amp;lt;inf&amp;gt; wpa_supp: wpa_drv_zep_get_ssid: SSID size: 3

[00:00:08.963,562] &amp;lt;inf&amp;gt; wpa_supp: wlan0: Associated with ec:a8:1f:c9:bc:98
[00:00:08.963,714] &amp;lt;inf&amp;gt; wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
[00:00:08.970,062] &amp;lt;inf&amp;gt; wpa_supp: wpa_drv_zep_get_ssid: SSID size: 3

[00:00:08.992,126] &amp;lt;inf&amp;gt; wpa_supp: wlan0: WPA: Key negotiation completed with ec:a8:1f:c9:bc:98 [PTK=CCMP GTK=CCMP]
[00:00:08.992,370] &amp;lt;inf&amp;gt; wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to ec:a8:1f:c9:bc:98 completed [id=0 id_str=]
[00:00:08.992,431] &amp;lt;inf&amp;gt; wifi_handler: Connected
[00:00:09.020,263] &amp;lt;inf&amp;gt; wifi_handler: State: COMPLETED
9120 DEBUG request.c:210:req_new(): ::: exec eth_getBalance [&amp;quot;0x03cb0021808442ad5efb61197966aef72a1def96&amp;quot;,&amp;quot;latest&amp;quot;] 
9121 TRACE execute.c:763:in3_handle_rpc(): ... request to https://mainnet.incubed.net
... [{&amp;quot;id&amp;quot;:&amp;quot;2&amp;quot;,&amp;quot;jsonrpc&amp;quot;:&amp;quot;2.0&amp;quot;,&amp;quot;method&amp;quot;:&amp;quot;eth_getBalance&amp;quot;,&amp;quot;params&amp;quot;:[&amp;quot;0x03cb0021808442ad5efb61197966aef72a1def96&amp;quot;,&amp;quot;latest&amp;quot;]}]
[00:00:10.281,555] &amp;lt;dbg&amp;gt; in3_https: server_response_cb: All the data received (618 bytes)
[00:00:10.281,585] &amp;lt;dbg&amp;gt; in3_https: server_response_cb: http status:OK http status code:200
[00:00:10.286,499] &amp;lt;dbg&amp;gt; in3_https: run_https_post: https POST success
10286 TRACE execute.c:777:in3_handle_rpc(): ... response(https://mainnet.incubed.net): 
... [{&amp;quot;jsonrpc&amp;quot;:&amp;quot;2.0&amp;quot;,&amp;quot;id&amp;quot;:&amp;quot;2&amp;quot;,&amp;quot;result&amp;quot;:&amp;quot;0x2fe1d73e5a1d8c2d33&amp;quot;,&amp;quot;in3&amp;quot;:{&amp;quot;lastValidatorChange&amp;quot;:0,&amp;quot;lastNodeList&amp;quot;:16168758,&amp;quot;execTime&amp;quot;:153,&amp;quot;rpcTime&amp;quot;:153,&amp;quot;rpcCount&amp;quot;:1,&amp;quot;currentBlock&amp;quot;:17136458,&amp;quot;version&amp;quot;:&amp;quot;2.1.0&amp;quot;}}]
10287 DEBUG execute.c:494:find_valid_result(): accepted response for eth_getBalance from https://mainnet.incubed.net
[00:00:10.287,872] &amp;lt;dbg&amp;gt; main: main: Result: &amp;quot;0x2fe1d73e5a1d8c2d33&amp;quot;&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Application output after I make&amp;nbsp;CONFIG_WPA_SUPP=n, here&amp;nbsp;psa_generate_key is success but wifi connectivity failed.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting Zephyr OS build v3.2.99-ncs1-1547-ge2bec540218d ***
[00:00:01.248,535] &amp;lt;inf&amp;gt; cryptocell: Writing random keys to KMU
[00:00:01.311,065] &amp;lt;inf&amp;gt; cryptocell: Success!
[00:00:01.311,340] &amp;lt;dbg&amp;gt; in3_https: in3_register_https_client: in3 register https
[00:00:01.389,038] &amp;lt;inf&amp;gt; cryptocell: Identity key stored from local memory to kmu slot 6
[00:00:01.389,221] &amp;lt;inf&amp;gt; cryptocell: Private Key loaded to local memory from kmu slot 6 
[00:00:01.389,221] &amp;lt;inf&amp;gt; cryptocell: Importing the identity key into PSA crypto.
[00:00:01.404,113] &amp;lt;inf&amp;gt; cryptocell: Exporting the public key corresponding to the identity key.
[00:00:01.419,006] &amp;lt;inf&amp;gt; cryptocell: Exported Public Key
                                     04 64 6c 38 a0 5c 5f f5  76 eb ab d0 2f d7 e7 c9 |.dl8.\_. v.../...
                                     7c 0a 41 a6 c6 46 bd f0  22 99 86 49 62 66 59 9b ||.A..F.. &amp;quot;..IbfY.
                                     2e 97 6b 2a 19 c9 b3 5c  ab 64 91 31 d1 ee 32 0b |..k*...\ .d.1..2.
                                     84 5f 36 ad 1a 41 ea e5  62 49 cc 89 e9 30 4f ba |._6..A.. bI...0O.
                                     23                                               |#                
[00:00:02.419,097] &amp;lt;err&amp;gt; wifi_handler: Connection request failed
[00:00:02.719,207] &amp;lt;inf&amp;gt; wifi_handler: Status request failed
[00:00:03.019,317] &amp;lt;inf&amp;gt; wifi_handler: Status request failed
[00:00:03.319,396] &amp;lt;inf&amp;gt; wifi_handler: Status request failed
[00:00:03.619,506] &amp;lt;inf&amp;gt; wifi_handler: Status request failed
[00:00:03.919,616] &amp;lt;inf&amp;gt; wifi_handler: Status request failed
[00:00:04.219,726] &amp;lt;inf&amp;gt; wifi_handler: Status request failed&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Could you please take a look or ask any of your colleague about this problem. Is there any way I can connect to wifi network without wpa supplicant?&lt;/p&gt;
&lt;p&gt;My Environment:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;ZEPHYR_SDK_VERSION : 0.15.2&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;span&gt;NCS: &lt;/span&gt;&lt;/span&gt;v2.2.99-dev3&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Regards&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Vipin Das&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422563?ContentTypeID=1</link><pubDate>Wed, 26 Apr 2023 14:26:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bda7489b-a09a-4e4c-b189-2c0b27c8f123</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;I got help from a collegue:&lt;/p&gt;
&lt;p&gt;The configuration that it is proposed there uses the MBEDTLS_BUILTIN which is using the MbedTLS library from Zephyr. We&amp;nbsp;would propose to disable both the CONFIG_MBEDLTS and the CONFIG_MBEDTLS_BUILTIN.&amp;nbsp;TLS configurations can be changed through the Kconfig in nrf_security:&amp;nbsp;&lt;a href="https://github.com/nrfconnect/sdk-nrfxlib/blob/main/nrf_security/Kconfig"&gt;https://github.com/nrfconnect/sdk-nrfxlib/blob/main/nrf_security/Kconfig&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also from the case there we are not sure what environment you are trying to run. We see that you have these three options:&lt;/p&gt;
&lt;p&gt;CONFIG_TRUSTED_EXECUTION_SECURE=y&lt;br /&gt;CONFIG_BUILD_WITH_TFM=n&lt;br /&gt;CONFIG_TFM_PROFILE_TYPE_NOT_SET=y&lt;br /&gt; &lt;br /&gt;Which are confusing. It will be nice if you can clarify if you are trying to use Trustzone with the legacy Nordic solution called SPM and not the current solution which is TF-M.&lt;/p&gt;
&lt;p&gt;Hope it helps,&lt;br /&gt;Kenneth&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/422242?ContentTypeID=1</link><pubDate>Tue, 25 Apr 2023 10:21:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1ca1a71e-4d42-45ed-b70d-7266f30dc61b</guid><dc:creator>vipin das</dc:creator><description>&lt;p&gt;Hi Kenneth,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I looked into the threads mentioned but I don&amp;#39;t think that the suggestions mentioned there helps to solve my issues as&amp;nbsp;I don&amp;#39;t have open thread feature in my application. &lt;span&gt;I am working on integrating nrf security sub system module(crypto cell ) application and transport application(wifi, tcp/tls) to develop a new usecase application which securely communicate with remote network.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;NCS Version:&amp;nbsp;nrf-connect-sdk-v2.2.99-dev3&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Zephyr SDK Version: 0.15.2&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please let me know&amp;nbsp;if you get any clue on this issue. My prj.conf is added here.&amp;nbsp;&lt;pre class="ui-code" data-mode="text"&gt;#
#   Application project specific configuration
#
CONFIG_SOC_SERIES_NRF53X=y
CONFIG_SOC_NRF5340_CPUAPP_QKAA=y

# Target memory specific options
CONFIG_HW_UNIQUE_KEY=y
CONFIG_HW_UNIQUE_KEY_RANDOM=y
CONFIG_PM_SINGLE_IMAGE=y
CONFIG_MPU_ALLOW_FLASH_WRITE=y
CONFIG_RESET_ON_FATAL_ERROR=y
CONFIG_REBOOT=y
CONFIG_FPU=y
CONFIG_FP_HARDABI=y
CONFIG_KERNEL_MEM_POOL=y
CONFIG_INIT_STACKS=y

# System settings
CONFIG_NEWLIB_LIBC=y
CONFIG_NEWLIB_LIBC_NANO=n

# Device security specific configs
CONFIG_NRF_SECURITY=y
CONFIG_NRF_SECURITY_ADVANCED=y
CONFIG_TRUSTED_EXECUTION_SECURE=y
CONFIG_BUILD_WITH_TFM=n
CONFIG_TFM_PROFILE_TYPE_NOT_SET=y

# For hardware crypto accelerator
CONFIG_PSA_CRYPTO_DRIVER_OBERON=n
CONFIG_PSA_CRYPTO_DRIVER_CC3XX=y

# Enable nordic security backend and PSA APIs
CONFIG_MBEDTLS_PSA_CRYPTO_C=y


# General
CONFIG_POSIX_CLOCK=y
CONFIG_POSIX_MAX_FDS=8
CONFIG_HW_STACK_PROTECTION=y
CONFIG_HW_ID_LIBRARY_SOURCE_NET_MAC=y
CONFIG_DK_LIBRARY=y
CONFIG_PM=y
CONFIG_FPU=y

# System settings
CONFIG_NEWLIB_LIBC=y
CONFIG_NEWLIB_LIBC_NANO=n

# Kernel options
CONFIG_ENTROPY_GENERATOR=y

# Memories
CONFIG_MAIN_STACK_SIZE=4096
CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=4096
CONFIG_NET_TX_STACK_SIZE=4096
CONFIG_NET_RX_STACK_SIZE=4096
CONFIG_NET_TCP_WORKQ_STACK_SIZE=4096
CONFIG_NET_MGMT_EVENT_STACK_SIZE=4096
CONFIG_LOG_BUFFER_SIZE=4096
# Below section is the primary contributor to SRAM and is currently
# tuned for performance, but this will be revisited in the future.
CONFIG_HEAP_MEM_POOL_SIZE=153600
CONFIG_NET_BUF_RX_COUNT=16
CONFIG_NET_BUF_TX_COUNT=16
CONFIG_NET_BUF_DATA_SIZE=128
CONFIG_NET_TC_TX_COUNT=0
CONFIG_NET_PKT_RX_COUNT=8
CONFIG_NET_PKT_TX_COUNT=8

#Socket settings
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y

# Native network stack
CONFIG_NRF_SECURITY=y
CONFIG_MBEDTLS=y
CONFIG_MBEDTLS_BUILTIN=y
CONFIG_MBEDTLS_ENABLE_HEAP=y
CONFIG_MBEDTLS_HEAP_SIZE=120000
CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN=16384
CONFIG_MBEDTLS_KEY_EXCHANGE_RSA_ENABLED=y
CONFIG_MBEDTLS_MAC_SHA256_ENABLED=y

# PSA
CONFIG_PSA_CRYPTO_DRIVER_CC3XX=y

# NET sockets
CONFIG_NETWORKING=y
CONFIG_NET_SOCKETS=y
CONFIG_NET_SOCKETS_POSIX_NAMES=y
CONFIG_NET_SOCKETS_POLL_MAX=8
CONFIG_NET_L2_ETHERNET=y
CONFIG_NET_IPV4=y
CONFIG_NET_TCP=y
CONFIG_NET_SOCKETS_OFFLOAD=n
CONFIG_NET_NATIVE=y
CONFIG_NET_DHCPV4=y
CONFIG_NET_CONTEXT_SNDTIMEO=y

CONFIG_NET_TCP_ISN_RFC6528=y
CONFIG_NET_MGMT_EVENT_INFO=y
CONFIG_NET_IF_UNICAST_IPV4_ADDR_COUNT=1
CONFIG_NET_MAX_CONTEXTS=5
CONFIG_NET_CONTEXT_SYNC_RECV=y
CONFIG_INIT_STACKS=y

# DNS
CONFIG_DNS_RESOLVER=y

# Debugging
CONFIG_STACK_SENTINEL=y
CONFIG_DEBUG_COREDUMP=y
CONFIG_DEBUG_COREDUMP_BACKEND_LOGGING=y
CONFIG_DEBUG_COREDUMP_MEMORY_DUMP_MIN=y
CONFIG_SHELL_CMDS_RESIZE=n

# Logging
CONFIG_LOG=y
CONFIG_NET_LOG=y
CONFIG_NET_TCP_LOG_LEVEL_DBG=n
CONFIG_NET_SOCKETS_LOG_LEVEL_DBG=n
CONFIG_NET_CONN_LOG_LEVEL_DBG=n
CONFIG_NET_CONTEXT_LOG_LEVEL_DBG=n
CONFIG_NET_HTTP_LOG_LEVEL_DBG=n
CONFIG_WIFI_LOG_LEVEL_ERR=n
CONFIG_WPA_SUPP_LOG_LEVEL_ERR=n

# Network address config
CONFIG_NET_CONFIG_SETTINGS=y
CONFIG_NET_CONFIG_NEED_IPV4=y
CONFIG_NET_CONFIG_MY_IPV4_ADDR=&amp;quot;192.168.1.99&amp;quot;
CONFIG_NET_CONFIG_MY_IPV4_NETMASK=&amp;quot;255.255.255.0&amp;quot;
CONFIG_NET_CONFIG_MY_IPV4_GW=&amp;quot;192.168.1.1&amp;quot;

# Server IPV4/IPV6 address config
#Mainnet.Incubed
CONFIG_NET_CONFIG_PEER_IPV4_ADDR=&amp;quot;167.86.94.248&amp;quot;

# HTTP
CONFIG_HTTP_CLIENT=y

# WiFi driver 
CONFIG_WIFI=y
CONFIG_WIFI_NRF700X=y
CONFIG_FLASH=y
CONFIG_FLASH_PAGE_LAYOUT=y
CONFIG_FLASH_MAP=y
CONFIG_NVS=y
CONFIG_SETTINGS=y
CONFIG_SETTINGS_NVS=y

# WPA supplicant
CONFIG_WPA_SUPP=y

&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Regards&lt;/p&gt;
&lt;p&gt;Vipin Das&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: psa_generate_key failed! with Error: -134</title><link>https://devzone.nordicsemi.com/thread/421980?ContentTypeID=1</link><pubDate>Mon, 24 Apr 2023 09:20:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:cc548e0c-02dc-4d47-ad30-24093fc80890</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;-134 means PSA_ERROR_NOT_SUPPORTED.&lt;/p&gt;
&lt;p&gt;Unfortunately, your issue is likely related to known issue:&lt;br /&gt;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/98717/zephyr-bus-fault-when-using-psa-crypto-with-cc310-and-openthread-l2-layer"&gt;Zephyr bus fault when using PSA crypto with CC310 and Openthread L2 layer&lt;/a&gt;&amp;nbsp;&lt;br /&gt;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/96872/psa-crypto-features-not-enabled-when-config_mbedtls_legacy_crypto_c-is-enabled"&gt;PSA crypto features not enabled when CONFIG_MBEDTLS_LEGACY_CRYPTO_C is enabled&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You may try the patch mentioned in the thread, but I can check internally if there is any news on this.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;Kenneth&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>