@@ -538,7 +538,6 @@ void httpClientUpdate()
538
538
else
539
539
{
540
540
// Pull out MQTT settings and keys from remaining JSON
541
-
542
541
if (settings.debugPpCertificate || settings.debugHttpClientData )
543
542
systemPrintln (" Certificates recorded successfully." );
544
543
@@ -550,7 +549,7 @@ void httpClientUpdate()
550
549
// Note: from the ZTP documentation:
551
550
// ["subscriptions"][0] will contain the key distribution topic
552
551
// But, assuming the key distribution topic is always ["subscriptions"][0] is potentially
553
- // brittle It is safer to check the "description" contains "key distribution topic" If we are on
552
+ // brittle. It is safer to check the "description" contains "key distribution topic". If we are on
554
553
// an IP-only plan, the path will be /pp/ubx/0236/ip If we are on a L-Band-only or L-Band+IP
555
554
// plan, the path will be /pp/ubx/0236/Lb These 0236 key distribution topics provide the keys in
556
555
// UBX format, ready to be pushed to a ZED. There are also /pp/key/ip and /pp/key/Lb topics
@@ -609,7 +608,7 @@ void httpClientUpdate()
609
608
httpClientSetState (HTTP_CLIENT_COMPLETE);
610
609
} // Valid certificates
611
610
} // End handle keys type response
612
- else if (pointPerfectServiceUsesNtrip () == true )
611
+ else if (pointPerfectNtripEnabled () == true )
613
612
{
614
613
// We received a JSON blob containing NTRIP credentials
615
614
systemPrintf (" PointPerfect response: %s\r\n " , response.c_str ());
0 commit comments