diff --git a/source/protocol/http/curlinterface.c b/source/protocol/http/curlinterface.c index b16aca49..f5ae2d5f 100644 --- a/source/protocol/http/curlinterface.c +++ b/source/protocol/http/curlinterface.c @@ -281,10 +281,10 @@ static void curlCertSelectorInit() T2Info("%s, T2:Cert selector initialization successfully\n", __func__); } } - else - { - curlCertSelectorFree (); - curlCertSelector = rdkcertselector_new( NULL, NULL, "MTLS" ); + else + { + curlCertSelectorFree (); + curlCertSelector = rdkcertselector_new( NULL, NULL, "MTLS" ); if(curlCertSelector == NULL) { T2Error("%s, T2:Cert selector initialization failed\n", __func__); @@ -292,7 +292,8 @@ static void curlCertSelectorInit() else { T2Info("%s, T2:Cert selector initialization successfully\n", __func__); - } + } + } } #endif @@ -457,7 +458,6 @@ T2ERROR sendReportOverHTTP(char *httpUrl, char *payload, pid_t* outForkedPid) if(curlGetCertStatus != certselectorOk) { T2Error("%s, T2:Failed to retrieve the certificate.\n", __func__); - curlCertSelectorFree(); curl_easy_cleanup(curl); goto child_cleanReturn; } @@ -471,10 +471,13 @@ T2ERROR sendReportOverHTTP(char *httpUrl, char *payload, pid_t* outForkedPid) } #endif if (pCertPC == NULL) - T2Error("%s : passcode is NULL\n",__func__); + T2Info("%s : passcode is NULL\n",__func__); + else + T2Info("%s: pCertPC size = %d\n",__func__,strlen(pCertPC)); + if (pCertURI == NULL) - T2Error("%s : cert URI is NULL\n",__func__); - T2Info("%s: pCertPC size = %d\n",__func__,sizeof(pCertPC)); + T2Info("%s : cert URI is NULL\n",__func__); + if((mtls_enable == true) && (setMtlsHeaders(curl, pCertFile, pCertPC, &childCurlResponse) != T2ERROR_SUCCESS)) { curl_easy_cleanup(curl); // CID 189985: Resource leak