@@ -139,7 +139,7 @@ |
||
139 | 139 | */ |
140 | 140 | public function getUniqueSocketId(): int |
141 | 141 | { |
142 | - return (int)$this->socketConnection; |
|
142 | + return (int) $this->socketConnection; |
|
143 | 143 | } |
144 | 144 | |
145 | 145 | /** |
@@ -63,7 +63,7 @@ discard block |
||
63 | 63 | */ |
64 | 64 | private function getPayloadLength(string $data) |
65 | 65 | { |
66 | - $payloadLength = (int)ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
66 | + $payloadLength = (int) ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
67 | 67 | if ($payloadLength > self::MASK_125) { |
68 | 68 | if ($payloadLength === self::MASK_126) { |
69 | 69 | $data = $this->read(2); // 126: Payload is a 16-bit unsigned int |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | private function getPayloadData(string $data, int $payloadLength): string |
86 | 86 | { |
87 | 87 | // Masking? |
88 | - $mask = (bool)(ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
88 | + $mask = (bool) (ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
89 | 89 | $payload = ''; |
90 | 90 | $maskingKey = ''; |
91 | 91 | |
@@ -127,7 +127,7 @@ discard block |
||
127 | 127 | |
128 | 128 | // Is this the final fragment? // Bit 0 in byte 0 |
129 | 129 | /// @todo Handle huge payloads with multiple fragments. |
130 | - $final = (bool)(ord($data[0]) & 1 << 7); |
|
130 | + $final = (bool) (ord($data[0]) & 1 << 7); |
|
131 | 131 | |
132 | 132 | // Parse opcode |
133 | 133 | $opcode_int = ord($data[0]) & 31; // Bits 4-7 |
@@ -196,7 +196,7 @@ discard block |
||
196 | 196 | // Binary string for header. |
197 | 197 | $frameHeadBin = ''; |
198 | 198 | // Write FIN, final fragment bit. |
199 | - $frameHeadBin .= (bool)$final ? '1' : '0'; |
|
199 | + $frameHeadBin .= (bool) $final ? '1' : '0'; |
|
200 | 200 | // RSV 1, 2, & 3 false and unused. |
201 | 201 | $frameHeadBin .= '000'; |
202 | 202 | // Opcode rest of the byte. |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | private const HEADER_BYTES_READ = 1024; |
38 | 38 | |
39 | 39 | // stream non-blocking |
40 | - public const NON_BLOCK = 0; |
|
40 | + public const NON_BLOCK = 0; |
|
41 | 41 | |
42 | 42 | /** |
43 | 43 | * WebSocketServer constructor. |
@@ -334,7 +334,7 @@ discard block |
||
334 | 334 | } |
335 | 335 | |
336 | 336 | $key = $match[1]; |
337 | - $this->handshakes[(int)$client] = $key; |
|
337 | + $this->handshakes[(int) $client] = $key; |
|
338 | 338 | |
339 | 339 | // sending header according to WebSocket Protocol |
340 | 340 | $secWebSocketAccept = base64_encode(sha1(trim($key) . self::HEADER_WEBSOCKET_ACCEPT_HASH, true)); |
@@ -204,7 +204,7 @@ |
||
204 | 204 | */ |
205 | 205 | public function setProxyAuth(string $userName, string $password): void |
206 | 206 | { |
207 | - $this->proxyAuth = (empty($userName) === false && empty($password) === false) ? base64_encode($userName.':'.$password) : null; |
|
207 | + $this->proxyAuth = (empty($userName) === false && empty($password) === false) ? base64_encode($userName . ':' . $password) : null; |
|
208 | 208 | } |
209 | 209 | |
210 | 210 | /** |
@@ -205,7 +205,7 @@ |
||
205 | 205 | . implode( |
206 | 206 | "\r\n", |
207 | 207 | array_map( |
208 | - function ($key, $value) { |
|
208 | + function($key, $value) { |
|
209 | 209 | return "$key: $value"; |
210 | 210 | }, |
211 | 211 | array_keys($headers), |