-/* $OpenBSD: extern.h,v 1.127 2022/04/19 09:52:29 claudio Exp $ */
+/* $OpenBSD: extern.h,v 1.128 2022/04/19 13:52:24 claudio Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
extern const char *tals[];
extern const char *taldescs[];
extern unsigned int talrepocnt[];
-extern size_t talsz;
+extern int talsz;
/* Routines for RPKI entities. */
-/* $OpenBSD: main.c,v 1.195 2022/04/19 11:07:33 claudio Exp $ */
+/* $OpenBSD: main.c,v 1.196 2022/04/19 13:52:24 claudio Exp $ */
/*
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
const char *tals[TALSZ_MAX];
const char *taldescs[TALSZ_MAX];
unsigned int talrepocnt[TALSZ_MAX];
-size_t talsz;
+int talsz;
size_t entity_queue;
int timeout = 60*60;
* This may be zero.
* Don't exceded "max" filenames.
*/
-static size_t
+static int
tal_load_default(void)
{
static const char *confdir = "/etc/rpki";
- size_t s = 0;
+ int s = 0;
char *path;
DIR *dirp;
struct dirent *dp;
int
main(int argc, char *argv[])
{
- int rc, c, st, proc, rsync, http, rrdp, hangup = 0;
- size_t i;
+ int rc, c, i, st, proc, rsync, http, rrdp, hangup = 0;
pid_t pid, procpid, rsyncpid, httppid, rrdppid;
struct pollfd pfd[NPFD];
struct msgbuf *queues[NPFD];
for (i = 0; i < NPFD; i++) {
if (pfd[i].revents & (POLLERR|POLLNVAL)) {
- warnx("poll[%zu]: bad fd", i);
+ warnx("poll[%d]: bad fd", i);
hangup = 1;
}
if (pfd[i].revents & POLLHUP)
if (pfd[i].revents & POLLOUT) {
switch (msgbuf_write(queues[i])) {
case 0:
- warnx("write[%zu]: "
+ warnx("write[%d]: "
"connection closed", i);
hangup = 1;
break;
case -1:
- warn("write[%zu]", i);
+ warn("write[%d]", i);
hangup = 1;
break;
}
-/* $OpenBSD: output.c,v 1.24 2021/11/04 11:32:55 claudio Exp $ */
+/* $OpenBSD: output.c,v 1.25 2022/04/19 13:52:24 claudio Exp $ */
/*
* Copyright (c) 2019 Theo de Raadt <deraadt@openbsd.org>
*
char hn[NI_MAXHOST], tbuf[80];
struct tm *tp;
time_t t;
- size_t i;
+ int i;
time(&t);
setenv("TZ", "UTC", 1);