@@ -83,7 +83,7 @@ void NetworkClientSecure::stop() {
83
83
stop_ssl_socket (sslclient.get ());
84
84
85
85
_connected = false ;
86
- _peek = -1 ;
86
+ sslclient-> peek_buf = -1 ;
87
87
_lastReadTimeout = 0 ;
88
88
_lastWriteTimeout = 0 ;
89
89
}
@@ -134,7 +134,7 @@ int NetworkClientSecure::connect(IPAddress ip, uint16_t port, const char *host,
134
134
log_i (" Actual TLS start postponed." );
135
135
}
136
136
137
- _lastError = ret;
137
+ sslclient-> last_error = ret;
138
138
139
139
if (ret < 0 ) {
140
140
log_e (" start_ssl_client: connect failed: %d" , ret);
@@ -175,7 +175,7 @@ int NetworkClientSecure::connect(const char *host, uint16_t port, const char *ps
175
175
}
176
176
177
177
int ret = start_ssl_client (sslclient.get (), address, port, host, _timeout, NULL , false , NULL , NULL , pskIdent, psKey, _use_insecure, _alpn_protos);
178
- _lastError = ret;
178
+ sslclient-> last_error = ret;
179
179
if (ret < 0 ) {
180
180
log_e (" start_ssl_client: connect failed %d" , ret);
181
181
stop ();
@@ -186,11 +186,11 @@ int NetworkClientSecure::connect(const char *host, uint16_t port, const char *ps
186
186
}
187
187
188
188
int NetworkClientSecure::peek () {
189
- if (_peek >= 0 ) {
190
- return _peek ;
189
+ if (sslclient-> peek_buf >= 0 ) {
190
+ return sslclient-> peek_buf ;
191
191
}
192
- _peek = timedRead ();
193
- return _peek ;
192
+ sslclient-> peek_buf = timedRead ();
193
+ return sslclient-> peek_buf ;
194
194
}
195
195
196
196
size_t NetworkClientSecure::write (uint8_t data) {
@@ -253,9 +253,9 @@ int NetworkClientSecure::read(uint8_t *buf, size_t size) {
253
253
if (!size) {
254
254
return 0 ;
255
255
}
256
- if (_peek >= 0 ) {
257
- buf[0 ] = _peek ;
258
- _peek = -1 ;
256
+ if (sslclient-> peek_buf >= 0 ) {
257
+ buf[0 ] = sslclient-> peek_buf ;
258
+ sslclient-> peek_buf = -1 ;
259
259
size--;
260
260
avail--;
261
261
if (!size || !avail) {
@@ -279,7 +279,7 @@ int NetworkClientSecure::available() {
279
279
return peek_net_receive (sslclient.get (), 0 );
280
280
}
281
281
282
- int peeked = (_peek >= 0 ), res = -1 ;
282
+ int peeked = (sslclient-> peek_buf >= 0 ), res = -1 ;
283
283
if (!_connected) {
284
284
return peeked;
285
285
}
@@ -399,11 +399,9 @@ bool NetworkClientSecure::loadPrivateKey(Stream &stream, size_t size) {
399
399
}
400
400
401
401
int NetworkClientSecure::lastError (char *buf, const size_t size) {
402
- if (!_lastError) {
403
- return 0 ;
404
- }
405
- mbedtls_strerror (_lastError, buf, size);
406
- return _lastError;
402
+ int lastError = sslclient->last_error ;
403
+ mbedtls_strerror (lastError, buf, size);
404
+ return lastError;
407
405
}
408
406
409
407
void NetworkClientSecure::setHandshakeTimeout (unsigned long handshake_timeout) {
0 commit comments