Hi,
On Thu, Apr 08, 2010 at 09:22:54PM +0200, David Sommerseth wrote:
> This is in response to a reported Debian bug, where the connection
> counter overflows.
> <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576827>
[..]
> {
> - msg (D_TLS_DEBUG_LOW, "TLS: soft reset sec=%d bytes=%d/%d pkts=%d/%d",
> + msg (D_TLS_DEBUG_LOW,
> + "TLS: soft reset sec=%d bytes=" counter_format "/%d pkts="
> counter_format "/%d",
> (int)(ks->established + session->opt->renegotiate_seconds - now),
[..]
> - int n_bytes; /* how many bytes sent/recvd since
> last key exchange */
> - int n_packets; /* how many packets sent/recvd since last key
> exchange */
> + counter_type n_bytes; /* how many bytes sent/recvd since
> last key exchange */
> + counter_type n_packets; /* how many packets sent/recvd since last key
> exchange */
ACK, this looks good. The "counter_type" and "counter_format" infrastructure
will give 64-bit counters with portability to whatever systems supports
64 bit - and fallback to 32 bit where it is not possible.
gert
--
USENET is *not* the non-clickable part of WWW!
//www.muc.de/~gert/
Gert Doering - Munich, Germany [email protected]
fax: +49-89-35655025 [email protected]