@@ -83,7 +83,7 @@ void NetworkClientSecure::stop() {
8383 stop_ssl_socket (sslclient.get ());
8484
8585 _connected = false ;
86- _peek = -1 ;
86+ sslclient-> peek_buf = -1 ;
8787 _lastReadTimeout = 0 ;
8888 _lastWriteTimeout = 0 ;
8989}
@@ -134,7 +134,7 @@ int NetworkClientSecure::connect(IPAddress ip, uint16_t port, const char *host,
134134 log_i (" Actual TLS start postponed." );
135135 }
136136
137- _lastError = ret;
137+ sslclient-> last_error = ret;
138138
139139 if (ret < 0 ) {
140140 log_e (" start_ssl_client: connect failed: %d" , ret);
@@ -175,7 +175,7 @@ int NetworkClientSecure::connect(const char *host, uint16_t port, const char *ps
175175 }
176176
177177 int ret = start_ssl_client (sslclient.get (), address, port, host, _timeout, NULL , false , NULL , NULL , pskIdent, psKey, _use_insecure, _alpn_protos);
178- _lastError = ret;
178+ sslclient-> last_error = ret;
179179 if (ret < 0 ) {
180180 log_e (" start_ssl_client: connect failed %d" , ret);
181181 stop ();
@@ -186,11 +186,11 @@ int NetworkClientSecure::connect(const char *host, uint16_t port, const char *ps
186186}
187187
188188int NetworkClientSecure::peek () {
189- if (_peek >= 0 ) {
190- return _peek ;
189+ if (sslclient-> peek_buf >= 0 ) {
190+ return sslclient-> peek_buf ;
191191 }
192- _peek = timedRead ();
193- return _peek ;
192+ sslclient-> peek_buf = timedRead ();
193+ return sslclient-> peek_buf ;
194194}
195195
196196size_t NetworkClientSecure::write (uint8_t data) {
@@ -253,9 +253,9 @@ int NetworkClientSecure::read(uint8_t *buf, size_t size) {
253253 if (!size) {
254254 return 0 ;
255255 }
256- if (_peek >= 0 ) {
257- buf[0 ] = _peek ;
258- _peek = -1 ;
256+ if (sslclient-> peek_buf >= 0 ) {
257+ buf[0 ] = sslclient-> peek_buf ;
258+ sslclient-> peek_buf = -1 ;
259259 size--;
260260 avail--;
261261 if (!size || !avail) {
@@ -279,7 +279,7 @@ int NetworkClientSecure::available() {
279279 return peek_net_receive (sslclient.get (), 0 );
280280 }
281281
282- int peeked = (_peek >= 0 ), res = -1 ;
282+ int peeked = (sslclient-> peek_buf >= 0 ), res = -1 ;
283283 if (!_connected) {
284284 return peeked;
285285 }
@@ -399,11 +399,9 @@ bool NetworkClientSecure::loadPrivateKey(Stream &stream, size_t size) {
399399}
400400
401401int NetworkClientSecure::lastError (char *buf, const size_t size) {
402- if (!_lastError) {
403- return 0 ;
404- }
405- mbedtls_strerror (_lastError, buf, size);
406- return _lastError;
402+ int lastError = sslclient->last_error ;
403+ mbedtls_strerror (lastError, buf, size);
404+ return lastError;
407405}
408406
409407void NetworkClientSecure::setHandshakeTimeout (unsigned long handshake_timeout) {
0 commit comments