@@ -110,7 +110,7 @@ bool WebSocketValidateMessageSize(uint8_t *data, uint64_t obtainedNumBytes) {
110110 uint64_t expectedNumBytes = WebSocketFullMessageSize (data, obtainedNumBytes);
111111
112112 if (expectedNumBytes != obtainedNumBytes) {
113- printf (" Corrupt WebSocket message size! (got %llu bytes, expected %llu bytes)\n " , obtainedNumBytes, expectedNumBytes);
113+ printf (" Corrupt WebSocket message size! (got %lu bytes, expected %lu bytes)\n " , obtainedNumBytes, expectedNumBytes);
114114 printf (" Received data:" );
115115 for (size_t i = 0 ; i < obtainedNumBytes; ++i)
116116 printf (" %02X" , data[i]);
@@ -187,14 +187,14 @@ void DumpWebSocketMessage(uint8_t *data, uint64_t numBytes) {
187187 uint64_t payloadLength = WebSocketMessagePayloadLength (data, numBytes);
188188 uint8_t *payload = WebSocketMessageData (data, numBytes);
189189
190- printf (" Received: FIN: %d, opcode: %s, mask: 0x%08X, payload length: %llu bytes, unmasked payload:" , header->fin , WebSocketOpcodeToString (header->opcode ),
190+ printf (" Received: FIN: %d, opcode: %s, mask: 0x%08X, payload length: %lu bytes, unmasked payload:" , header->fin , WebSocketOpcodeToString (header->opcode ),
191191 WebSocketMessageMaskingKey (data, numBytes), payloadLength);
192192 for (uint64_t i = 0 ; i < payloadLength; ++i) {
193193 if (i%16 == 0 ) printf (" \n " );
194194 if (i%8 ==0 ) printf (" " );
195195 printf (" %02X" , payload[i]);
196196 if (i >= 63 && payloadLength > 64 ) {
197- printf (" \n ... (%llu more bytes)" , payloadLength-i);
197+ printf (" \n ... (%lu more bytes)" , payloadLength-i);
198198 break ;
199199 }
200200 }
0 commit comments