diff --git a/resource/csdk/connectivity/src/adapter_util/ca_adapter_net_ssl.c b/resource/csdk/connectivity/src/adapter_util/ca_adapter_net_ssl.c index 4a93e4be5d566a247b0025e53885b638df5d9494..b82e21fa81526ab08aa255042d73357dd8af3701 100644 --- a/resource/csdk/connectivity/src/adapter_util/ca_adapter_net_ssl.c +++ b/resource/csdk/connectivity/src/adapter_util/ca_adapter_net_ssl.c @@ -824,6 +824,7 @@ CAResult_t GetCASecureEndpointData(const CAEndpoint_t* peer, CASecureEndpoint_t* { OIC_LOG_V(DEBUG, NET_SSL_TAG, "In %s", __func__); + oc_mutex_assert_owner(g_sslContextMutex, false); oc_mutex_lock(g_sslContextMutex); if (NULL == g_caSslContext) { diff --git a/resource/csdk/stack/src/ocstack.c b/resource/csdk/stack/src/ocstack.c index 67ff3bead17ea313c04fabe4d0e4384305f8af05..0495a81181920e38d081fc64bb8499c11e0a1810 100644 --- a/resource/csdk/stack/src/ocstack.c +++ b/resource/csdk/stack/src/ocstack.c @@ -3394,7 +3394,8 @@ OCStackResult OCDoRequest(OCDoHandle *handle, #if defined(__WITH_DTLS__) || defined(__WITH_TLS__) /* Check whether we should assert role certificates before making this request. */ if ((endpoint.flags & CA_SECURE) && - (strcmp(requestInfo.info.resourceUri, OIC_RSRC_ROLES_URI) != 0)) + (strcmp(requestInfo.info.resourceUri, OIC_RSRC_ROLES_URI) != 0) && + (strcmp(requestInfo.info.resourceUri, OIC_RSRC_DOXM_URI) != 0)) { CASecureEndpoint_t sep; CAResult_t caRes = CAGetSecureEndpointData(&endpoint, &sep);