/* Limit maximum value size to reduce attack surface. */
if (valuelen > HTTP_MAX_HEADER_IN_SIZE) {
kr_log_verbose(
- "[http] stream %d: header too large (%ld B), refused\n",
+ "[http] stream %d: header too large (%zu B), refused\n",
stream_id, valuelen);
refuse_stream(h2, stream_id);
return 0;
" -t, --cert=[path] Path to certificate file (default: %s).\n"
" -k, --key=[path] Path to key file (default: %s).\n"
" -c, --close=[N] Close connection to client after\n"
- " every N ms (default: %li).\n"
+ " every N ms (default: %" PRIu64 ").\n"
" -f, --fail=[N] Delay every Nth incoming connection by 10 sec,\n"
" 0 disables delaying (default: 0).\n"
" -r, --rehandshake Do TLS rehandshake after every 8 bytes\n"