Hello @slime Please refer the below response form the Microsoft Product team on your initial query. I hope this helps.
Azure RTOS TLS is a highly-optimized implementation of the protocol for deeply-embedded RTOS systems. As a result, there are some options that may not be available, and the default cipher suite list was chosen because it represents the mandatory cipher suites for TLS as per RFCs 5246 (TLS 1.2) and 8446 (TLS 1.3). Some browser manufacturers have decided that those cipher suites are obsolete and have unfortunately decided to remove them, breaking compatibility. Our primary focus for TLS is IoT cloud communications and keeping up to date with arbitrary web browser configurations is not a priority. Note that Chromium (the OSS foundation for Chrome which may differ in configuration) does support AES-GCM cipher suites and this is a mode that Azure RTOS TLS supports (the latest version of Azure RTOS on GitHub, https://github.com/azure-rtos , has GCM cipher suites - look for the macro "NX_SECURE_ENABLE_AEAD_CIPHER" within the NetX Duo directory).
If you have a specific use-case you are interested in pursuing or a specific cipher suite you need implemented then we may be able to help - the Azure RTOS TLS documentation describes how cryptographic methods can be added (https://learn.microsoft.com/en-us/azure/rtos/netx-duo/netx-secure-tls/chapter3#cryptographic-methods). You will be on your own to find the cryptography routines you need, but we can help if you have questions about configuration once you have the appropriate crypto primitives.
If the response is helpful, please click "Accept Answer" and upvote it. So that it is helpful to other community members as well.