Hi,

On Thu, Apr 08, 2010 at 09:22:54PM +0200, David Sommerseth wrote:
> This is in response to a reported Debian bug, where the connection
> counter overflows.
> <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576827>
[..]
>      {
> -      msg (D_TLS_DEBUG_LOW, "TLS: soft reset sec=%d bytes=%d/%d pkts=%d/%d",
> +      msg (D_TLS_DEBUG_LOW,
> +           "TLS: soft reset sec=%d bytes=" counter_format "/%d pkts=" 
> counter_format "/%d",
>          (int)(ks->established + session->opt->renegotiate_seconds - now),
[..]
> -  int n_bytes;                        /* how many bytes sent/recvd since 
> last key exchange */
> -  int n_packets;              /* how many packets sent/recvd since last key 
> exchange */
> +  counter_type n_bytes;               /* how many bytes sent/recvd since 
> last key exchange */
> +  counter_type n_packets;     /* how many packets sent/recvd since last key 
> exchange */

ACK, this looks good.  The "counter_type" and "counter_format" infrastructure
will give 64-bit counters with portability to whatever systems supports
64 bit - and fallback to 32 bit where it is not possible.

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Reply via email to