diff --git a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocket13FrameDecoder.java b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocket13FrameDecoder.java index 41272e7793..ee38bfb245 100644 --- a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocket13FrameDecoder.java +++ b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocket13FrameDecoder.java @@ -73,20 +73,19 @@ public class WebSocket13FrameDecoder extends WebSocket08FrameDecoder { } /** - * Constructor - * - * @param maskedPayload - * Web socket servers must set this to true processed incoming - * masked payload. Client implementations must set this to false. - * @param allowExtensions - * Flag to allow reserved extension bits to be used or not - * @param maxFramePayloadLength - * Maximum length of a frame's payload. Setting this to an - * appropriate value for you application helps check for denial - * of services attacks. - */ - public WebSocket13FrameDecoder(boolean maskedPayload, - boolean allowExtensions, long maxFramePayloadLength) { - super(maskedPayload, allowExtensions, maxFramePayloadLength); - } + * Constructor + * + * @param maskedPayload + * Web socket servers must set this to true processed incoming + * masked payload. Client implementations must set this to false. + * @param allowExtensions + * Flag to allow reserved extension bits to be used or not + * @param maxFramePayloadLength + * Maximum length of a frame's payload. Setting this to an + * appropriate value for you application helps check for denial + * of services attacks. + */ + public WebSocket13FrameDecoder(boolean maskedPayload, boolean allowExtensions, long maxFramePayloadLength) { + super(maskedPayload, allowExtensions, maxFramePayloadLength); + } } diff --git a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshaker08.java b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshaker08.java index 2f8dbde774..4ca3cac92d 100644 --- a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshaker08.java +++ b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshaker08.java @@ -170,7 +170,7 @@ public class WebSocketServerHandshaker08 extends WebSocketServerHandshaker { } p.replace(HttpRequestDecoder.class, "wsdecoder", - new WebSocket08FrameDecoder(true, allowExtensions, this.getMaxFramePayloadLength())); + new WebSocket08FrameDecoder(true, allowExtensions, this.getMaxFramePayloadLength())); p.replace(HttpResponseEncoder.class, "wsencoder", new WebSocket08FrameEncoder(false)); return future; diff --git a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshakerFactory.java b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshakerFactory.java index 85c764a14c..6cc107185f 100644 --- a/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshakerFactory.java +++ b/src/main/java/org/jboss/netty/handler/codec/http/websocketx/WebSocketServerHandshakerFactory.java @@ -63,7 +63,7 @@ public class WebSocketServerHandshakerFactory { * reduce denial of service attacks using long data frames. */ public WebSocketServerHandshakerFactory(String webSocketURL, String subprotocols, boolean allowExtensions, - long maxFramePayloadLength) { + long maxFramePayloadLength) { this.webSocketURL = webSocketURL; this.subprotocols = subprotocols; this.allowExtensions = allowExtensions;