@@ -130,10 +130,10 @@ discard block |
||
130 | 130 | $server = $parts['host']; |
131 | 131 | $path = isset($parts['path']) ? $parts['path'] : ''; |
132 | 132 | if (isset($parts['query'])) { |
133 | - $path .= '?' . $parts['query']; |
|
133 | + $path .= '?'.$parts['query']; |
|
134 | 134 | } |
135 | 135 | if (isset($parts['fragment'])) { |
136 | - $path .= '#' . $parts['fragment']; |
|
136 | + $path .= '#'.$parts['fragment']; |
|
137 | 137 | } |
138 | 138 | if (isset($parts['port'])) { |
139 | 139 | $port = $parts['port']; |
@@ -149,7 +149,7 @@ discard block |
||
149 | 149 | } |
150 | 150 | } |
151 | 151 | if ($path == '' || $path[0] != '/') { |
152 | - $this->path = '/' . $path; |
|
152 | + $this->path = '/'.$path; |
|
153 | 153 | } else { |
154 | 154 | $this->path = $path; |
155 | 155 | } |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | }*/ |
188 | 188 | |
189 | 189 | // initialize user_agent string |
190 | - $this->user_agent = PhpXmlRpc::$xmlrpcName . ' ' . PhpXmlRpc::$xmlrpcVersion; |
|
190 | + $this->user_agent = PhpXmlRpc::$xmlrpcName.' '.PhpXmlRpc::$xmlrpcVersion; |
|
191 | 191 | } |
192 | 192 | |
193 | 193 | /** |
@@ -550,7 +550,7 @@ discard block |
||
550 | 550 | */ |
551 | 551 | protected function sendPayloadHTTP10($req, $server, $port, $timeout = 0, $username = '', $password = '', |
552 | 552 | $authType = 1, $proxyHost = '', $proxyPort = 0, $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, |
553 | - $method='http') |
|
553 | + $method = 'http') |
|
554 | 554 | { |
555 | 555 | return $this->sendPayloadSocket($req, $server, $port, $timeout, $username, $password, $authType, null, null, |
556 | 556 | null, null, $proxyHost, $proxyPort, $proxyUsername, $proxyPassword, $proxyAuthType); |
@@ -580,7 +580,7 @@ discard block |
||
580 | 580 | * @param int $sslVersion |
581 | 581 | * @return Response |
582 | 582 | */ |
583 | - protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
583 | + protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
584 | 584 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
585 | 585 | $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $keepAlive = false, $key = '', $keyPass = '', |
586 | 586 | $sslVersion = 0) |
@@ -615,11 +615,11 @@ discard block |
||
615 | 615 | */ |
616 | 616 | protected function sendPayloadSocket($req, $server, $port, $timeout = 0, $username = '', $password = '', |
617 | 617 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
618 | - $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method='http', $key = '', $keyPass = '', |
|
618 | + $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method = 'http', $key = '', $keyPass = '', |
|
619 | 619 | $sslVersion = 0) |
620 | 620 | { |
621 | 621 | if ($port == 0) { |
622 | - $port = ( $method === 'https' ) ? 443 : 80; |
|
622 | + $port = ($method === 'https') ? 443 : 80; |
|
623 | 623 | } |
624 | 624 | |
625 | 625 | // Only create the payload if it was not created previously |
@@ -650,15 +650,15 @@ discard block |
||
650 | 650 | // thanks to Grant Rauscher <[email protected]> for this |
651 | 651 | $credentials = ''; |
652 | 652 | if ($username != '') { |
653 | - $credentials = 'Authorization: Basic ' . base64_encode($username . ':' . $password) . "\r\n"; |
|
653 | + $credentials = 'Authorization: Basic '.base64_encode($username.':'.$password)."\r\n"; |
|
654 | 654 | if ($authType != 1) { |
655 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported with HTTP 1.0'); |
|
655 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported with HTTP 1.0'); |
|
656 | 656 | } |
657 | 657 | } |
658 | 658 | |
659 | 659 | $acceptedEncoding = ''; |
660 | 660 | if (is_array($this->accepted_compression) && count($this->accepted_compression)) { |
661 | - $acceptedEncoding = 'Accept-Encoding: ' . implode(', ', $this->accepted_compression) . "\r\n"; |
|
661 | + $acceptedEncoding = 'Accept-Encoding: '.implode(', ', $this->accepted_compression)."\r\n"; |
|
662 | 662 | } |
663 | 663 | |
664 | 664 | $proxyCredentials = ''; |
@@ -669,18 +669,18 @@ discard block |
||
669 | 669 | $connectServer = $proxyHost; |
670 | 670 | $connectPort = $proxyPort; |
671 | 671 | $transport = 'tcp'; |
672 | - $uri = 'http://' . $server . ':' . $port . $this->path; |
|
672 | + $uri = 'http://'.$server.':'.$port.$this->path; |
|
673 | 673 | if ($proxyUsername != '') { |
674 | 674 | if ($proxyAuthType != 1) { |
675 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
675 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
676 | 676 | } |
677 | - $proxyCredentials = 'Proxy-Authorization: Basic ' . base64_encode($proxyUsername . ':' . $proxyPassword) . "\r\n"; |
|
677 | + $proxyCredentials = 'Proxy-Authorization: Basic '.base64_encode($proxyUsername.':'.$proxyPassword)."\r\n"; |
|
678 | 678 | } |
679 | 679 | } else { |
680 | 680 | $connectServer = $server; |
681 | 681 | $connectPort = $port; |
682 | 682 | /// @todo if supporting https, we should support all its current options as well: peer name verification etc... |
683 | - $transport = ( $method === 'https' ) ? 'tls' : 'tcp'; |
|
683 | + $transport = ($method === 'https') ? 'tls' : 'tcp'; |
|
684 | 684 | $uri = $this->path; |
685 | 685 | } |
686 | 686 | |
@@ -691,45 +691,45 @@ discard block |
||
691 | 691 | $version = ''; |
692 | 692 | foreach ($this->cookies as $name => $cookie) { |
693 | 693 | if ($cookie['version']) { |
694 | - $version = ' $Version="' . $cookie['version'] . '";'; |
|
695 | - $cookieHeader .= ' ' . $name . '="' . $cookie['value'] . '";'; |
|
694 | + $version = ' $Version="'.$cookie['version'].'";'; |
|
695 | + $cookieHeader .= ' '.$name.'="'.$cookie['value'].'";'; |
|
696 | 696 | if ($cookie['path']) { |
697 | - $cookieHeader .= ' $Path="' . $cookie['path'] . '";'; |
|
697 | + $cookieHeader .= ' $Path="'.$cookie['path'].'";'; |
|
698 | 698 | } |
699 | 699 | if ($cookie['domain']) { |
700 | - $cookieHeader .= ' $Domain="' . $cookie['domain'] . '";'; |
|
700 | + $cookieHeader .= ' $Domain="'.$cookie['domain'].'";'; |
|
701 | 701 | } |
702 | 702 | if ($cookie['port']) { |
703 | - $cookieHeader .= ' $Port="' . $cookie['port'] . '";'; |
|
703 | + $cookieHeader .= ' $Port="'.$cookie['port'].'";'; |
|
704 | 704 | } |
705 | 705 | } else { |
706 | - $cookieHeader .= ' ' . $name . '=' . $cookie['value'] . ";"; |
|
706 | + $cookieHeader .= ' '.$name.'='.$cookie['value'].";"; |
|
707 | 707 | } |
708 | 708 | } |
709 | - $cookieHeader = 'Cookie:' . $version . substr($cookieHeader, 0, -1) . "\r\n"; |
|
709 | + $cookieHeader = 'Cookie:'.$version.substr($cookieHeader, 0, -1)."\r\n"; |
|
710 | 710 | } |
711 | 711 | |
712 | 712 | // omit port if default |
713 | 713 | if (($port == 80 && in_array($method, array('http', 'http10'))) || ($port == 443 && $method == 'https')) { |
714 | - $port = ''; |
|
714 | + $port = ''; |
|
715 | 715 | } else { |
716 | - $port = ':' . $port; |
|
716 | + $port = ':'.$port; |
|
717 | 717 | } |
718 | 718 | |
719 | - $op = 'POST ' . $uri . " HTTP/1.0\r\n" . |
|
720 | - 'User-Agent: ' . $this->user_agent . "\r\n" . |
|
721 | - 'Host: ' . $server . $port . "\r\n" . |
|
722 | - $credentials . |
|
723 | - $proxyCredentials . |
|
724 | - $acceptedEncoding . |
|
725 | - $encodingHdr . |
|
726 | - 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings) . "\r\n" . |
|
727 | - $cookieHeader . |
|
728 | - 'Content-Type: ' . $req->content_type . "\r\nContent-Length: " . |
|
729 | - strlen($payload) . "\r\n\r\n" . |
|
719 | + $op = 'POST '.$uri." HTTP/1.0\r\n". |
|
720 | + 'User-Agent: '.$this->user_agent."\r\n". |
|
721 | + 'Host: '.$server.$port."\r\n". |
|
722 | + $credentials. |
|
723 | + $proxyCredentials. |
|
724 | + $acceptedEncoding. |
|
725 | + $encodingHdr. |
|
726 | + 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)."\r\n". |
|
727 | + $cookieHeader. |
|
728 | + 'Content-Type: '.$req->content_type."\r\nContent-Length: ". |
|
729 | + strlen($payload)."\r\n\r\n". |
|
730 | 730 | $payload; |
731 | 731 | |
732 | - if ($this->debug > 1) { |
|
732 | + if ($this->debug>1) { |
|
733 | 733 | Logger::instance()->debugMessage("---SENDING---\n$op\n---END---"); |
734 | 734 | } |
735 | 735 | |
@@ -755,7 +755,7 @@ discard block |
||
755 | 755 | } |
756 | 756 | $context = stream_context_create($contextOptions); |
757 | 757 | |
758 | - if ($timeout <= 0) { |
|
758 | + if ($timeout<=0) { |
|
759 | 759 | $connectTimeout = ini_get('default_socket_timeout'); |
760 | 760 | } else { |
761 | 761 | $connectTimeout = $timeout; |
@@ -764,12 +764,12 @@ discard block |
||
764 | 764 | $fp = @stream_socket_client("$transport://$connectServer:$connectPort", $this->errno, $this->errstr, $connectTimeout, |
765 | 765 | STREAM_CLIENT_CONNECT, $context); |
766 | 766 | if ($fp) { |
767 | - if ($timeout > 0) { |
|
767 | + if ($timeout>0) { |
|
768 | 768 | stream_set_timeout($fp, $timeout); |
769 | 769 | } |
770 | 770 | } else { |
771 | - $this->errstr = 'Connect error: ' . $this->errstr; |
|
772 | - $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr . ' (' . $this->errno . ')'); |
|
771 | + $this->errstr = 'Connect error: '.$this->errstr; |
|
772 | + $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr.' ('.$this->errno.')'); |
|
773 | 773 | |
774 | 774 | return $r; |
775 | 775 | } |
@@ -877,7 +877,7 @@ discard block |
||
877 | 877 | $encodingHdr = ''; |
878 | 878 | } |
879 | 879 | |
880 | - if ($this->debug > 1) { |
|
880 | + if ($this->debug>1) { |
|
881 | 881 | Logger::instance()->debugMessage("---SENDING---\n$payload\n---END---"); |
882 | 882 | } |
883 | 883 | |
@@ -887,7 +887,7 @@ discard block |
||
887 | 887 | } else { |
888 | 888 | $protocol = $method; |
889 | 889 | } |
890 | - $curl = curl_init($protocol . '://' . $server . ':' . $port . $this->path); |
|
890 | + $curl = curl_init($protocol.'://'.$server.':'.$port.$this->path); |
|
891 | 891 | if ($keepAlive) { |
892 | 892 | $this->xmlrpc_curl_handle = $curl; |
893 | 893 | } |
@@ -898,7 +898,7 @@ discard block |
||
898 | 898 | // results into variable |
899 | 899 | curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); |
900 | 900 | |
901 | - if ($this->debug > 1) { |
|
901 | + if ($this->debug>1) { |
|
902 | 902 | curl_setopt($curl, CURLOPT_VERBOSE, true); |
903 | 903 | /// @todo allow callers to redirect curlopt_stderr to some stream which can be buffered |
904 | 904 | } |
@@ -924,7 +924,7 @@ discard block |
||
924 | 924 | } |
925 | 925 | } |
926 | 926 | // extra headers |
927 | - $headers = array('Content-Type: ' . $req->content_type, 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings)); |
|
927 | + $headers = array('Content-Type: '.$req->content_type, 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)); |
|
928 | 928 | // if no keepalive is wanted, let the server know it in advance |
929 | 929 | if (!$keepAlive) { |
930 | 930 | $headers[] = 'Connection: close'; |
@@ -941,7 +941,7 @@ discard block |
||
941 | 941 | curl_setopt($curl, CURLOPT_HTTPHEADER, $headers); |
942 | 942 | // timeout is borked |
943 | 943 | if ($timeout) { |
944 | - curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout - 1); |
|
944 | + curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout-1); |
|
945 | 945 | } |
946 | 946 | |
947 | 947 | if ($method == 'http10') { |
@@ -951,11 +951,11 @@ discard block |
||
951 | 951 | } |
952 | 952 | |
953 | 953 | if ($username && $password) { |
954 | - curl_setopt($curl, CURLOPT_USERPWD, $username . ':' . $password); |
|
954 | + curl_setopt($curl, CURLOPT_USERPWD, $username.':'.$password); |
|
955 | 955 | if (defined('CURLOPT_HTTPAUTH')) { |
956 | 956 | curl_setopt($curl, CURLOPT_HTTPAUTH, $authType); |
957 | 957 | } elseif ($authType != 1) { |
958 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
958 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
959 | 959 | } |
960 | 960 | } |
961 | 961 | |
@@ -996,13 +996,13 @@ discard block |
||
996 | 996 | if ($proxyPort == 0) { |
997 | 997 | $proxyPort = 8080; // NB: even for HTTPS, local connection is on port 8080 |
998 | 998 | } |
999 | - curl_setopt($curl, CURLOPT_PROXY, $proxyHost . ':' . $proxyPort); |
|
999 | + curl_setopt($curl, CURLOPT_PROXY, $proxyHost.':'.$proxyPort); |
|
1000 | 1000 | if ($proxyUsername) { |
1001 | - curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername . ':' . $proxyPassword); |
|
1001 | + curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername.':'.$proxyPassword); |
|
1002 | 1002 | if (defined('CURLOPT_PROXYAUTH')) { |
1003 | 1003 | curl_setopt($curl, CURLOPT_PROXYAUTH, $proxyAuthType); |
1004 | 1004 | } elseif ($proxyAuthType != 1) { |
1005 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1005 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1006 | 1006 | } |
1007 | 1007 | } |
1008 | 1008 | } |
@@ -1013,7 +1013,7 @@ discard block |
||
1013 | 1013 | if (count($this->cookies)) { |
1014 | 1014 | $cookieHeader = ''; |
1015 | 1015 | foreach ($this->cookies as $name => $cookie) { |
1016 | - $cookieHeader .= $name . '=' . $cookie['value'] . '; '; |
|
1016 | + $cookieHeader .= $name.'='.$cookie['value'].'; '; |
|
1017 | 1017 | } |
1018 | 1018 | curl_setopt($curl, CURLOPT_COOKIE, substr($cookieHeader, 0, -2)); |
1019 | 1019 | } |
@@ -1024,13 +1024,13 @@ discard block |
||
1024 | 1024 | |
1025 | 1025 | $result = curl_exec($curl); |
1026 | 1026 | |
1027 | - if ($this->debug > 1) { |
|
1027 | + if ($this->debug>1) { |
|
1028 | 1028 | $message = "---CURL INFO---\n"; |
1029 | 1029 | foreach (curl_getinfo($curl) as $name => $val) { |
1030 | 1030 | if (is_array($val)) { |
1031 | 1031 | $val = implode("\n", $val); |
1032 | 1032 | } |
1033 | - $message .= $name . ': ' . $val . "\n"; |
|
1033 | + $message .= $name.': '.$val."\n"; |
|
1034 | 1034 | } |
1035 | 1035 | $message .= '---END---'; |
1036 | 1036 | Logger::instance()->debugMessage($message); |
@@ -1040,7 +1040,7 @@ discard block |
||
1040 | 1040 | /// @todo we should use a better check here - what if we get back '' or '0'? |
1041 | 1041 | |
1042 | 1042 | $this->errstr = 'no response'; |
1043 | - $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'] . ': ' . curl_error($curl)); |
|
1043 | + $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'].': '.curl_error($curl)); |
|
1044 | 1044 | curl_close($curl); |
1045 | 1045 | if ($keepAlive) { |
1046 | 1046 | $this->xmlrpc_curl_handle = null; |
@@ -1150,7 +1150,7 @@ discard block |
||
1150 | 1150 | $call['methodName'] = new Value($req->method(), 'string'); |
1151 | 1151 | $numParams = $req->getNumParams(); |
1152 | 1152 | $params = array(); |
1153 | - for ($i = 0; $i < $numParams; $i++) { |
|
1153 | + for ($i = 0; $i<$numParams; $i++) { |
|
1154 | 1154 | $params[$i] = $req->getParam($i); |
1155 | 1155 | } |
1156 | 1156 | $call['params'] = new Value($params, 'array'); |
@@ -1176,15 +1176,15 @@ discard block |
||
1176 | 1176 | /// @todo test this code branch... |
1177 | 1177 | $rets = $result->value(); |
1178 | 1178 | if (!is_array($rets)) { |
1179 | - return false; // bad return type from system.multicall |
|
1179 | + return false; // bad return type from system.multicall |
|
1180 | 1180 | } |
1181 | 1181 | $numRets = count($rets); |
1182 | 1182 | if ($numRets != count($reqs)) { |
1183 | - return false; // wrong number of return values. |
|
1183 | + return false; // wrong number of return values. |
|
1184 | 1184 | } |
1185 | 1185 | |
1186 | 1186 | $response = array(); |
1187 | - for ($i = 0; $i < $numRets; $i++) { |
|
1187 | + for ($i = 0; $i<$numRets; $i++) { |
|
1188 | 1188 | $val = $rets[$i]; |
1189 | 1189 | if (!is_array($val)) { |
1190 | 1190 | return false; |
@@ -1192,7 +1192,7 @@ discard block |
||
1192 | 1192 | switch (count($val)) { |
1193 | 1193 | case 1: |
1194 | 1194 | if (!isset($val[0])) { |
1195 | - return false; // Bad value |
|
1195 | + return false; // Bad value |
|
1196 | 1196 | } |
1197 | 1197 | // Normal return value |
1198 | 1198 | $response[$i] = new Response($val[0], 0, '', 'phpvals'); |
@@ -1220,19 +1220,19 @@ discard block |
||
1220 | 1220 | |
1221 | 1221 | $rets = $result->value(); |
1222 | 1222 | if ($rets->kindOf() != 'array') { |
1223 | - return false; // bad return type from system.multicall |
|
1223 | + return false; // bad return type from system.multicall |
|
1224 | 1224 | } |
1225 | 1225 | $numRets = $rets->count(); |
1226 | 1226 | if ($numRets != count($reqs)) { |
1227 | - return false; // wrong number of return values. |
|
1227 | + return false; // wrong number of return values. |
|
1228 | 1228 | } |
1229 | 1229 | |
1230 | 1230 | $response = array(); |
1231 | - foreach($rets as $val) { |
|
1231 | + foreach ($rets as $val) { |
|
1232 | 1232 | switch ($val->kindOf()) { |
1233 | 1233 | case 'array': |
1234 | 1234 | if ($val->count() != 1) { |
1235 | - return false; // Bad value |
|
1235 | + return false; // Bad value |
|
1236 | 1236 | } |
1237 | 1237 | // Normal return value |
1238 | 1238 | $response[] = new Response($val[0]); |
@@ -22,12 +22,12 @@ discard block |
||
22 | 22 | |
23 | 23 | // read chunk-size, chunk-extension (if any) and crlf |
24 | 24 | // get the position of the linebreak |
25 | - $chunkEnd = strpos($buffer, "\r\n") + 2; |
|
25 | + $chunkEnd = strpos($buffer, "\r\n")+2; |
|
26 | 26 | $temp = substr($buffer, 0, $chunkEnd); |
27 | 27 | $chunkSize = hexdec(trim($temp)); |
28 | 28 | $chunkStart = $chunkEnd; |
29 | - while ($chunkSize > 0) { |
|
30 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart + $chunkSize); |
|
29 | + while ($chunkSize>0) { |
|
30 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart+$chunkSize); |
|
31 | 31 | |
32 | 32 | // just in case we got a broken connection |
33 | 33 | if ($chunkEnd == false) { |
@@ -39,19 +39,19 @@ discard block |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | // read chunk-data and crlf |
42 | - $chunk = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
42 | + $chunk = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
43 | 43 | // append chunk-data to entity-body |
44 | 44 | $new .= $chunk; |
45 | 45 | // length := length + chunk-size |
46 | 46 | $length += strlen($chunk); |
47 | 47 | // read chunk-size and crlf |
48 | - $chunkStart = $chunkEnd + 2; |
|
48 | + $chunkStart = $chunkEnd+2; |
|
49 | 49 | |
50 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart) + 2; |
|
50 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart)+2; |
|
51 | 51 | if ($chunkEnd == false) { |
52 | 52 | break; //just in case we got a broken connection |
53 | 53 | } |
54 | - $temp = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
54 | + $temp = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
55 | 55 | $chunkSize = hexdec(trim($temp)); |
56 | 56 | $chunkStart = $chunkEnd; |
57 | 57 | } |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | * @return array with keys 'headers' and 'cookies' |
69 | 69 | * @throws \Exception |
70 | 70 | */ |
71 | - public function parseResponseHeaders(&$data, $headersProcessed = false, $debug=0) |
|
71 | + public function parseResponseHeaders(&$data, $headersProcessed = false, $debug = 0) |
|
72 | 72 | { |
73 | 73 | $httpResponse = array('raw_data' => $data, 'headers'=> array(), 'cookies' => array()); |
74 | 74 | |
@@ -78,11 +78,11 @@ discard block |
||
78 | 78 | // (even though it is not valid http) |
79 | 79 | $pos = strpos($data, "\r\n\r\n"); |
80 | 80 | if ($pos || is_int($pos)) { |
81 | - $bd = $pos + 4; |
|
81 | + $bd = $pos+4; |
|
82 | 82 | } else { |
83 | 83 | $pos = strpos($data, "\n\n"); |
84 | 84 | if ($pos || is_int($pos)) { |
85 | - $bd = $pos + 2; |
|
85 | + $bd = $pos+2; |
|
86 | 86 | } else { |
87 | 87 | // No separation between response headers and body: fault? |
88 | 88 | $bd = 0; |
@@ -93,8 +93,8 @@ discard block |
||
93 | 93 | // maybe we could take them into account, too? |
94 | 94 | $data = substr($data, $bd); |
95 | 95 | } else { |
96 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
96 | + error_log('XML-RPC: '.__METHOD__.': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
98 | 98 | } |
99 | 99 | } |
100 | 100 | |
@@ -120,20 +120,20 @@ discard block |
||
120 | 120 | } |
121 | 121 | |
122 | 122 | if (!preg_match('/^HTTP\/[0-9.]+ 200 /', $data)) { |
123 | - $errstr = substr($data, 0, strpos($data, "\n") - 1); |
|
124 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTP error, got response: ' . $errstr); |
|
125 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (' . $errstr . ')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
123 | + $errstr = substr($data, 0, strpos($data, "\n")-1); |
|
124 | + error_log('XML-RPC: '.__METHOD__.': HTTP error, got response: '.$errstr); |
|
125 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' ('.$errstr.')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
126 | 126 | } |
127 | 127 | |
128 | 128 | // be tolerant to usage of \n instead of \r\n to separate headers and data |
129 | 129 | // (even though it is not valid http) |
130 | 130 | $pos = strpos($data, "\r\n\r\n"); |
131 | 131 | if ($pos || is_int($pos)) { |
132 | - $bd = $pos + 4; |
|
132 | + $bd = $pos+4; |
|
133 | 133 | } else { |
134 | 134 | $pos = strpos($data, "\n\n"); |
135 | 135 | if ($pos || is_int($pos)) { |
136 | - $bd = $pos + 2; |
|
136 | + $bd = $pos+2; |
|
137 | 137 | } else { |
138 | 138 | // No separation between response headers and body: fault? |
139 | 139 | // we could take some action here instead of going on... |
@@ -144,10 +144,10 @@ discard block |
||
144 | 144 | // be tolerant to line endings, and extra empty lines |
145 | 145 | $ar = preg_split("/\r?\n/", trim(substr($data, 0, $pos))); |
146 | 146 | |
147 | - foreach($ar as $line) { |
|
147 | + foreach ($ar as $line) { |
|
148 | 148 | // take care of multi-line headers and cookies |
149 | 149 | $arr = explode(':', $line, 2); |
150 | - if (count($arr) > 1) { |
|
150 | + if (count($arr)>1) { |
|
151 | 151 | $headerName = strtolower(trim($arr[0])); |
152 | 152 | /// @todo some other headers (the ones that allow a CSV list of values) |
153 | 153 | /// do allow many values to be passed using multiple header lines. |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | // glue together all received cookies, using a comma to separate them |
166 | 166 | // (same as php does with getallheaders()) |
167 | 167 | if (isset($httpResponse['headers'][$headerName])) { |
168 | - $httpResponse['headers'][$headerName] .= ', ' . trim($cookie); |
|
168 | + $httpResponse['headers'][$headerName] .= ', '.trim($cookie); |
|
169 | 169 | } else { |
170 | 170 | $httpResponse['headers'][$headerName] = trim($cookie); |
171 | 171 | } |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | } |
195 | 195 | } elseif (isset($headerName)) { |
196 | 196 | /// @todo version1 cookies might span multiple lines, thus breaking the parsing above |
197 | - $httpResponse['headers'][$headerName] .= ' ' . trim($line); |
|
197 | + $httpResponse['headers'][$headerName] .= ' '.trim($line); |
|
198 | 198 | } |
199 | 199 | } |
200 | 200 | |
@@ -218,7 +218,7 @@ discard block |
||
218 | 218 | // Decode chunked encoding sent by http 1.1 servers |
219 | 219 | if (isset($httpResponse['headers']['transfer-encoding']) && $httpResponse['headers']['transfer-encoding'] == 'chunked') { |
220 | 220 | if (!$data = Http::decodeChunked($data)) { |
221 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to rebuild the chunked data received from server'); |
|
221 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to rebuild the chunked data received from server'); |
|
222 | 222 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['dechunk_fail'], PhpXmlRpc::$xmlrpcerr['dechunk_fail']); |
223 | 223 | } |
224 | 224 | } |
@@ -233,19 +233,19 @@ discard block |
||
233 | 233 | if ($httpResponse['headers']['content-encoding'] == 'deflate' && $degzdata = @gzuncompress($data)) { |
234 | 234 | $data = $degzdata; |
235 | 235 | if ($debug) { |
236 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
236 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
237 | 237 | } |
238 | 238 | } elseif ($httpResponse['headers']['content-encoding'] == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
239 | 239 | $data = $degzdata; |
240 | 240 | if ($debug) { |
241 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
241 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
242 | 242 | } |
243 | 243 | } else { |
244 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to decode the deflated data received from server'); |
|
244 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to decode the deflated data received from server'); |
|
245 | 245 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['decompress_fail'], PhpXmlRpc::$xmlrpcerr['decompress_fail']); |
246 | 246 | } |
247 | 247 | } else { |
248 | - error_log('XML-RPC: ' . __METHOD__ . ': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
248 | + error_log('XML-RPC: '.__METHOD__.': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
249 | 249 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['cannot_decompress'], PhpXmlRpc::$xmlrpcerr['cannot_decompress']); |
250 | 250 | } |
251 | 251 | } |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
4 | -include_once __DIR__ . '/../lib/xmlrpc_wrappers.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
4 | +include_once __DIR__.'/../lib/xmlrpc_wrappers.inc'; |
|
5 | 5 | |
6 | -include_once __DIR__ . '/parse_args.php'; |
|
6 | +include_once __DIR__.'/parse_args.php'; |
|
7 | 7 | |
8 | -include_once __DIR__ . '/3LocalhostTest.php'; |
|
8 | +include_once __DIR__.'/3LocalhostTest.php'; |
|
9 | 9 | |
10 | 10 | /** |
11 | 11 | * Tests which stress http features of the library. |
@@ -23,9 +23,9 @@ discard block |
||
23 | 23 | 'testExoticCharsetsRequests2', 'testExoticCharsetsRequests3', |
24 | 24 | // @todo the following are currently not compatible w Digest Auth (most likely because of client copy) and should be fixed |
25 | 25 | 'testcatchWarnings', 'testWrappedMethodAsSource', 'testTransferOfObjectViaWrapping'); |
26 | - foreach(get_class_methods('LocalhostTest') as $method) |
|
26 | + foreach (get_class_methods('LocalhostTest') as $method) |
|
27 | 27 | { |
28 | - if(strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
28 | + if (strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
29 | 29 | { |
30 | 30 | if (!isset(self::$failed_tests[$method])) |
31 | 31 | $this->$method(); |
@@ -39,7 +39,7 @@ discard block |
||
39 | 39 | |
40 | 40 | function testDeflate() |
41 | 41 | { |
42 | - if(!function_exists('gzdeflate')) |
|
42 | + if (!function_exists('gzdeflate')) |
|
43 | 43 | { |
44 | 44 | $this->markTestSkipped('Zlib missing: cannot test deflate functionality'); |
45 | 45 | return; |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | |
52 | 52 | function testGzip() |
53 | 53 | { |
54 | - if(!function_exists('gzdeflate')) |
|
54 | + if (!function_exists('gzdeflate')) |
|
55 | 55 | { |
56 | 56 | $this->markTestSkipped('Zlib missing: cannot test gzip functionality'); |
57 | 57 | return; |
@@ -63,7 +63,7 @@ discard block |
||
63 | 63 | |
64 | 64 | function testKeepAlives() |
65 | 65 | { |
66 | - if(!function_exists('curl_init')) |
|
66 | + if (!function_exists('curl_init')) |
|
67 | 67 | { |
68 | 68 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
69 | 69 | return; |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | |
87 | 87 | function testHttp11() |
88 | 88 | { |
89 | - if(!function_exists('curl_init')) |
|
89 | + if (!function_exists('curl_init')) |
|
90 | 90 | { |
91 | 91 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
92 | 92 | return; |
@@ -101,7 +101,7 @@ discard block |
||
101 | 101 | |
102 | 102 | function testHttp11Gzip() |
103 | 103 | { |
104 | - if(!function_exists('curl_init')) |
|
104 | + if (!function_exists('curl_init')) |
|
105 | 105 | { |
106 | 106 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
107 | 107 | return; |
@@ -116,7 +116,7 @@ discard block |
||
116 | 116 | |
117 | 117 | function testHttp11Deflate() |
118 | 118 | { |
119 | - if(!function_exists('curl_init')) |
|
119 | + if (!function_exists('curl_init')) |
|
120 | 120 | { |
121 | 121 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
122 | 122 | return; |
@@ -131,7 +131,7 @@ discard block |
||
131 | 131 | |
132 | 132 | function testHttp11Proxy() |
133 | 133 | { |
134 | - if(!function_exists('curl_init')) |
|
134 | + if (!function_exists('curl_init')) |
|
135 | 135 | { |
136 | 136 | $this->markTestSkipped('CURL missing: cannot test http 1.1 w. proxy'); |
137 | 137 | return; |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | |
153 | 153 | function testHttps() |
154 | 154 | { |
155 | - if(!function_exists('curl_init')) |
|
155 | + if (!function_exists('curl_init')) |
|
156 | 156 | { |
157 | 157 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
158 | 158 | return; |
@@ -169,7 +169,7 @@ discard block |
||
169 | 169 | |
170 | 170 | function testHttpsProxy() |
171 | 171 | { |
172 | - if(!function_exists('curl_init')) |
|
172 | + if (!function_exists('curl_init')) |
|
173 | 173 | { |
174 | 174 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
175 | 175 | return; |
@@ -15,7 +15,7 @@ discard block |
||
15 | 15 | die(); |
16 | 16 | } |
17 | 17 | |
18 | -include_once __DIR__ . "/../../vendor/autoload.php"; |
|
18 | +include_once __DIR__."/../../vendor/autoload.php"; |
|
19 | 19 | |
20 | 20 | // out-of-band information: let the client manipulate the server operations. |
21 | 21 | // we do this to help the testsuite script: do not reproduce in production! |
@@ -25,7 +25,7 @@ discard block |
||
25 | 25 | mkdir($GLOBALS['PHPUNIT_COVERAGE_DATA_DIRECTORY']); |
26 | 26 | } |
27 | 27 | |
28 | - include_once __DIR__ . "/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
28 | + include_once __DIR__."/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
29 | 29 | } |
30 | 30 | |
31 | 31 | use PhpXmlRpc\Value; |
@@ -122,11 +122,11 @@ discard block |
||
122 | 122 | // extract the value of the state number |
123 | 123 | $snv = $sno->scalarval(); |
124 | 124 | // look it up in our array (zero-based) |
125 | - if (isset($stateNames[$snv - 1])) { |
|
126 | - $stateName = $stateNames[$snv - 1]; |
|
125 | + if (isset($stateNames[$snv-1])) { |
|
126 | + $stateName = $stateNames[$snv-1]; |
|
127 | 127 | } else { |
128 | 128 | // not there, so complain |
129 | - $err = "I don't have a state for the index '" . $snv . "'"; |
|
129 | + $err = "I don't have a state for the index '".$snv."'"; |
|
130 | 130 | } |
131 | 131 | |
132 | 132 | // if we generated an error, create an error return response |
@@ -152,11 +152,11 @@ discard block |
||
152 | 152 | { |
153 | 153 | global $stateNames; |
154 | 154 | |
155 | - if (isset($stateNames[$stateNo - 1])) { |
|
156 | - return $stateNames[$stateNo - 1]; |
|
155 | + if (isset($stateNames[$stateNo-1])) { |
|
156 | + return $stateNames[$stateNo-1]; |
|
157 | 157 | } else { |
158 | 158 | // not, there so complain |
159 | - throw new Exception("I don't have a state for the index '" . $stateNo . "'", PhpXmlRpc\PhpXmlRpc::$xmlrpcerruser); |
|
159 | + throw new Exception("I don't have a state for the index '".$stateNo."'", PhpXmlRpc\PhpXmlRpc::$xmlrpcerruser); |
|
160 | 160 | } |
161 | 161 | } |
162 | 162 | |
@@ -186,17 +186,17 @@ discard block |
||
186 | 186 | eval($findstate9_sig['source']); |
187 | 187 | |
188 | 188 | $findstate10_sig = array( |
189 | - "function" => function ($req) { return findState($req); }, |
|
189 | + "function" => function($req) { return findState($req); }, |
|
190 | 190 | "signature" => $findstate_sig, |
191 | 191 | "docstring" => $findstate_doc, |
192 | 192 | ); |
193 | 193 | |
194 | -$findstate11_sig = $wrapper->wrapPhpFunction(function ($stateNo) { return inner_findstate($stateNo); }); |
|
194 | +$findstate11_sig = $wrapper->wrapPhpFunction(function($stateNo) { return inner_findstate($stateNo); }); |
|
195 | 195 | |
196 | 196 | $c = new xmlrpcServerMethodsContainer; |
197 | 197 | $moreSignatures = $wrapper->wrapPhpClass($c, array('prefix' => 'tests.', 'method_type' => 'all')); |
198 | 198 | |
199 | -$returnObj_sig = $wrapper->wrapPhpFunction(array($c, 'returnObject'), '', array('encode_php_objs' => true)); |
|
199 | +$returnObj_sig = $wrapper->wrapPhpFunction(array($c, 'returnObject'), '', array('encode_php_objs' => true)); |
|
200 | 200 | |
201 | 201 | // used to test signatures with NULL params |
202 | 202 | $findstate12_sig = array( |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | $s = $req->getParam(0); |
223 | 223 | $t = $req->getParam(1); |
224 | 224 | |
225 | - return new PhpXmlRpc\Response(new Value($s->scalarval() + $t->scalarval(), Value::$xmlrpcInt)); |
|
225 | + return new PhpXmlRpc\Response(new Value($s->scalarval()+$t->scalarval(), Value::$xmlrpcInt)); |
|
226 | 226 | } |
227 | 227 | |
228 | 228 | $addtwodouble_sig = array(array(Value::$xmlrpcDouble, Value::$xmlrpcDouble, Value::$xmlrpcDouble)); |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | $s = $req->getParam(0); |
233 | 233 | $t = $req->getParam(1); |
234 | 234 | |
235 | - return new PhpXmlRpc\Response(new Value($s->scalarval() + $t->scalarval(), Value::$xmlrpcDouble)); |
|
235 | + return new PhpXmlRpc\Response(new Value($s->scalarval()+$t->scalarval(), Value::$xmlrpcDouble)); |
|
236 | 236 | } |
237 | 237 | |
238 | 238 | $stringecho_sig = array(array(Value::$xmlrpcString, Value::$xmlrpcString)); |
@@ -248,7 +248,7 @@ discard block |
||
248 | 248 | function echoBack($req) |
249 | 249 | { |
250 | 250 | // just sends back a string with what i got sent to me, just escaped, that's all |
251 | - $s = "I got the following message:\n" . $req->serialize(); |
|
251 | + $s = "I got the following message:\n".$req->serialize(); |
|
252 | 252 | |
253 | 253 | return new PhpXmlRpc\Response(new Value($s)); |
254 | 254 | } |
@@ -305,7 +305,7 @@ discard block |
||
305 | 305 | return 0; |
306 | 306 | } |
307 | 307 | |
308 | - return ($agesorter_arr[$a] > $agesorter_arr[$b]) ? -1 : 1; |
|
308 | + return ($agesorter_arr[$a]>$agesorter_arr[$b]) ? -1 : 1; |
|
309 | 309 | } |
310 | 310 | |
311 | 311 | $agesorter_sig = array(array(Value::$xmlrpcArray, Value::$xmlrpcArray)); |
@@ -351,7 +351,7 @@ discard block |
||
351 | 351 | // hack, must make global as uksort() won't |
352 | 352 | // allow us to pass any other auxiliary information |
353 | 353 | uksort($agesorter_arr, 'agesorter_compare'); |
354 | - foreach($agesorter_arr as $key => $val) { |
|
354 | + foreach ($agesorter_arr as $key => $val) { |
|
355 | 355 | // recreate each struct element |
356 | 356 | $v[] = new Value( |
357 | 357 | array( |
@@ -406,17 +406,17 @@ discard block |
||
406 | 406 | $err = "Error, no 'From' field specified"; |
407 | 407 | } |
408 | 408 | |
409 | - $msgHdr = "From: " . $mFrom->scalarval() . "\n"; |
|
410 | - $msgHdr .= "To: " . $mTo->scalarval() . "\n"; |
|
409 | + $msgHdr = "From: ".$mFrom->scalarval()."\n"; |
|
410 | + $msgHdr .= "To: ".$mTo->scalarval()."\n"; |
|
411 | 411 | |
412 | 412 | if ($mCc->scalarval() != "") { |
413 | - $msgHdr .= "Cc: " . $mCc->scalarval() . "\n"; |
|
413 | + $msgHdr .= "Cc: ".$mCc->scalarval()."\n"; |
|
414 | 414 | } |
415 | 415 | if ($mBcc->scalarval() != "") { |
416 | - $msgHdr .= "Bcc: " . $mBcc->scalarval() . "\n"; |
|
416 | + $msgHdr .= "Bcc: ".$mBcc->scalarval()."\n"; |
|
417 | 417 | } |
418 | 418 | if ($mMime->scalarval() != "") { |
419 | - $msgHdr .= "Content-type: " . $mMime->scalarval() . "\n"; |
|
419 | + $msgHdr .= "Content-type: ".$mMime->scalarval()."\n"; |
|
420 | 420 | } |
421 | 421 | $msgHdr .= "X-Mailer: XML-RPC for PHP mailer 1.0"; |
422 | 422 | |
@@ -506,7 +506,7 @@ discard block |
||
506 | 506 | $moe = $sno["moe"]; |
507 | 507 | $larry = $sno["larry"]; |
508 | 508 | $curly = $sno["curly"]; |
509 | - $num = $moe->scalarval() + $larry->scalarval() + $curly->scalarval(); |
|
509 | + $num = $moe->scalarval()+$larry->scalarval()+$curly->scalarval(); |
|
510 | 510 | |
511 | 511 | return new PhpXmlRpc\Response(new Value($num, Value::$xmlrpcInt)); |
512 | 512 | } |
@@ -548,9 +548,9 @@ discard block |
||
548 | 548 | $ar = $req->getParam(0); |
549 | 549 | $sz = $ar->count(); |
550 | 550 | $first = $ar[0]; |
551 | - $last = $ar[$sz - 1]; |
|
551 | + $last = $ar[$sz-1]; |
|
552 | 552 | |
553 | - return new PhpXmlRpc\Response(new Value($first->scalarval() . |
|
553 | + return new PhpXmlRpc\Response(new Value($first->scalarval(). |
|
554 | 554 | $last->scalarval(), Value::$xmlrpcString)); |
555 | 555 | } |
556 | 556 | |
@@ -584,7 +584,7 @@ discard block |
||
584 | 584 | $larry = $fools["larry"]; |
585 | 585 | $moe = $fools["moe"]; |
586 | 586 | |
587 | - return new PhpXmlRpc\Response(new Value($curly->scalarval() + $larry->scalarval() + $moe->scalarval(), Value::$xmlrpcInt)); |
|
587 | + return new PhpXmlRpc\Response(new Value($curly->scalarval()+$larry->scalarval()+$moe->scalarval(), Value::$xmlrpcInt)); |
|
588 | 588 | } |
589 | 589 | |
590 | 590 | $v1_countTheEntities_sig = array(array(Value::$xmlrpcStruct, Value::$xmlrpcString)); |
@@ -598,7 +598,7 @@ discard block |
||
598 | 598 | $ap = 0; |
599 | 599 | $qu = 0; |
600 | 600 | $amp = 0; |
601 | - for ($i = 0; $i < strlen($str); $i++) { |
|
601 | + for ($i = 0; $i<strlen($str); $i++) { |
|
602 | 602 | $c = substr($str, $i, 1); |
603 | 603 | switch ($c) { |
604 | 604 | case ">": |
@@ -800,7 +800,7 @@ discard block |
||
800 | 800 | ), |
801 | 801 | // Greek word 'kosme'. NB: NOT a valid ISO8859 string! |
802 | 802 | // NB: we can only register this when setting internal encoding to UTF-8, or it will break system.listMethods |
803 | - "tests.utf8methodname." . 'κόσμε' => array( |
|
803 | + "tests.utf8methodname.".'κόσμε' => array( |
|
804 | 804 | "function" => "stringEcho", |
805 | 805 | "signature" => $stringecho_sig, |
806 | 806 | "docstring" => $stringecho_doc, |
@@ -996,5 +996,5 @@ discard block |
||
996 | 996 | // Out-of-band information: let the client manipulate the server operations. |
997 | 997 | // We do this to help the testsuite script: do not reproduce in production! |
998 | 998 | if (isset($_COOKIE['PHPUNIT_SELENIUM_TEST_ID']) && extension_loaded('xdebug')) { |
999 | - include_once __DIR__ . "/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
999 | + include_once __DIR__."/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
1000 | 1000 | } |