@@ -327,7 +327,7 @@ |
||
327 | 327 | } |
328 | 328 | |
329 | 329 | $key = $match[1]; |
330 | - $this->handshakes[(int)$client] = $key; |
|
330 | + $this->handshakes[(int) $client] = $key; |
|
331 | 331 | |
332 | 332 | // sending header according to WebSocket Protocol |
333 | 333 | $secWebSocketAccept = base64_encode(sha1(trim($key) . self::HEADER_WEBSOCKET_ACCEPT_HASH, true)); |
@@ -139,7 +139,7 @@ |
||
139 | 139 | */ |
140 | 140 | public function getUniqueSocketId(): int |
141 | 141 | { |
142 | - return (int)$this->socketConnection; |
|
142 | + return (int) $this->socketConnection; |
|
143 | 143 | } |
144 | 144 | |
145 | 145 | /** |
@@ -22,10 +22,10 @@ |
||
22 | 22 | public const HEADER_HTTP1_1 = 'HTTP/1.1 101 Web Socket Protocol Handshake'; |
23 | 23 | public const HEADER_WEBSOCKET_ACCEPT_HASH = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'; |
24 | 24 | public const HEADERS_UPGRADE_KEY = 'Upgrade', |
25 | - HEADERS_CONNECTION_KEY = 'Connection', |
|
26 | - HEADERS_SEC_WEBSOCKET_ACCEPT_KEY = 'Sec-WebSocket-Accept'; |
|
25 | + HEADERS_CONNECTION_KEY = 'Connection', |
|
26 | + HEADERS_SEC_WEBSOCKET_ACCEPT_KEY = 'Sec-WebSocket-Accept'; |
|
27 | 27 | public const HEADERS_UPGRADE_VALUE = 'websocket', |
28 | - HEADERS_CONNECTION_VALUE = 'Upgrade'; |
|
28 | + HEADERS_CONNECTION_VALUE = 'Upgrade'; |
|
29 | 29 | public const HEADERS_EOL = "\r\n"; |
30 | 30 | public const SEC_WEBSOCKET_KEY_PTRN = '/Sec-WebSocket-Key:\s(.*)\n/'; |
31 | 31 |
@@ -205,7 +205,7 @@ |
||
205 | 205 | . implode( |
206 | 206 | "\r\n", |
207 | 207 | array_map( |
208 | - function ($key, $value) { |
|
208 | + function($key, $value) { |
|
209 | 209 | return "$key: $value"; |
210 | 210 | }, |
211 | 211 | array_keys($headers), |
@@ -62,7 +62,7 @@ discard block |
||
62 | 62 | */ |
63 | 63 | private function getPayloadLength(string $data) |
64 | 64 | { |
65 | - $payloadLength = (int)ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
65 | + $payloadLength = (int) ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
66 | 66 | if ($payloadLength > self::MASK_125) { |
67 | 67 | if ($payloadLength === self::MASK_126) { |
68 | 68 | $data = $this->read(2); // 126: Payload is a 16-bit unsigned int |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | private function getPayloadData(string $data, int $payloadLength): string |
85 | 85 | { |
86 | 86 | // Masking? |
87 | - $mask = (bool)(ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
87 | + $mask = (bool) (ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
88 | 88 | $payload = ''; |
89 | 89 | $maskingKey = ''; |
90 | 90 | |
@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | |
127 | 127 | // Is this the final fragment? // Bit 0 in byte 0 |
128 | 128 | /// @todo Handle huge payloads with multiple fragments. |
129 | - $final = (bool)(ord($data[0]) & 1 << 7); |
|
129 | + $final = (bool) (ord($data[0]) & 1 << 7); |
|
130 | 130 | |
131 | 131 | // Parse opcode |
132 | 132 | $opcodeInt = ord($data[0]) & 31; // Bits 4-7 |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | // Binary string for header. |
196 | 196 | $frameHeadBin = ''; |
197 | 197 | // Write FIN, final fragment bit. |
198 | - $frameHeadBin .= (bool)$final ? '1' : '0'; |
|
198 | + $frameHeadBin .= (bool) $final ? '1' : '0'; |
|
199 | 199 | // RSV 1, 2, & 3 false and unused. |
200 | 200 | $frameHeadBin .= '000'; |
201 | 201 | // Opcode rest of the byte. |
@@ -228,7 +228,7 @@ |
||
228 | 228 | */ |
229 | 229 | public function setProxyAuth(string $userName, string $password): ClientConfig |
230 | 230 | { |
231 | - $this->proxyAuth = (empty($userName) === false && empty($password) === false) ? base64_encode($userName.':'.$password) : null; |
|
231 | + $this->proxyAuth = (empty($userName) === false && empty($password) === false) ? base64_encode($userName . ':' . $password) : null; |
|
232 | 232 | return $this; |
233 | 233 | } |
234 | 234 |