Hi, On Thu, Apr 08, 2010 at 09:22:54PM +0200, David Sommerseth wrote: > This is in response to a reported Debian bug, where the connection > counter overflows. > <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576827> [..] > { > - msg (D_TLS_DEBUG_LOW, "TLS: soft reset sec=%d bytes=%d/%d pkts=%d/%d", > + msg (D_TLS_DEBUG_LOW, > + "TLS: soft reset sec=%d bytes=" counter_format "/%d pkts=" > counter_format "/%d", > (int)(ks->established + session->opt->renegotiate_seconds - now), [..] > - int n_bytes; /* how many bytes sent/recvd since > last key exchange */ > - int n_packets; /* how many packets sent/recvd since last key > exchange */ > + counter_type n_bytes; /* how many bytes sent/recvd since > last key exchange */ > + counter_type n_packets; /* how many packets sent/recvd since last key > exchange */
ACK, this looks good. The "counter_type" and "counter_format" infrastructure will give 64-bit counters with portability to whatever systems supports 64 bit - and fallback to 32 bit where it is not possible. gert -- USENET is *not* the non-clickable part of WWW! //www.muc.de/~gert/ Gert Doering - Munich, Germany g...@greenie.muc.de fax: +49-89-35655025 g...@net.informatik.tu-muenchen.de