Windows NT KAMIDAKI 10.0 build 19045 (Windows 10) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.3.9
Server IP : 192.168.3.16 & Your IP : 216.73.216.52
Domains :
Cant Read [ /etc/named.conf ]
User : SISTEMA
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
C: /
xampp /
php /
pear /
PHP /
CodeSniffer /
Delete
Unzip
Name
Size
Permission
Date
Action
CommentParser
[ DIR ]
drwxrwxrwx
2024-07-26 18:49
DocGenerators
[ DIR ]
drwxrwxrwx
2024-07-26 18:49
Reports
[ DIR ]
drwxrwxrwx
2024-07-26 18:49
Standards
[ DIR ]
drwxrwxrwx
2024-07-26 18:49
Tokenizers
[ DIR ]
drwxrwxrwx
2024-07-26 18:49
CLI.php
26.24
KB
-rw-rw-rw-
2016-01-27 13:08
Exception.php
1009
B
-rw-rw-rw-
2016-01-27 13:08
File.php
98.16
KB
-rw-rw-rw-
2016-01-27 13:08
MultiFileSniff.php
1.4
KB
-rw-rw-rw-
2016-01-27 13:08
Report.php
1.41
KB
-rw-rw-rw-
2016-01-27 13:08
Reporting.php
7.53
KB
-rw-rw-rw-
2016-01-27 13:08
Sniff.php
3
KB
-rw-rw-rw-
2016-01-27 13:08
Tokens.php
15.16
KB
-rw-rw-rw-
2016-01-27 13:08
Save
Rename
<?php /** * Represents a PHP_CodeSniffer sniff for sniffing coding standards. * * PHP version 5 * * @category PHP * @package PHP_CodeSniffer * @author Greg Sherwood <gsherwood@squiz.net> * @author Marc McIntyre <mmcintyre@squiz.net> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @link http://pear.php.net/package/PHP_CodeSniffer */ /** * Represents a PHP_CodeSniffer sniff for sniffing coding standards. * * A sniff registers what token types it wishes to listen for, then, when * PHP_CodeSniffer encounters that token, the sniff is invoked and passed * information about where the token was found in the stack, and the * PHP_CodeSniffer file in which the token was found. * * @category PHP * @package PHP_CodeSniffer * @author Greg Sherwood <gsherwood@squiz.net> * @author Marc McIntyre <mmcintyre@squiz.net> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @version Release: 1.3.3 * @link http://pear.php.net/package/PHP_CodeSniffer */ interface PHP_CodeSniffer_Sniff { /** * Registers the tokens that this sniff wants to listen for. * * An example return value for a sniff that wants to listen for whitespace * and any comments would be: * * <code> * return array( * T_WHITESPACE, * T_DOC_COMMENT, * T_COMMENT, * ); * </code> * * @return array(int) * @see Tokens.php */ public function register(); /** * Called when one of the token types that this sniff is listening for * is found. * * The stackPtr variable indicates where in the stack the token was found. * A sniff can acquire information this token, along with all the other * tokens within the stack by first acquiring the token stack: * * <code> * $tokens = $phpcsFile->getTokens(); * echo 'Encountered a '.$tokens[$stackPtr]['type'].' token'; * echo 'token information: '; * print_r($tokens[$stackPtr]); * </code> * * If the sniff discovers an anomilty in the code, they can raise an error * by calling addError() on the PHP_CodeSniffer_File object, specifying an error * message and the position of the offending token: * * <code> * $phpcsFile->addError('Encountered an error', $stackPtr); * </code> * * @param PHP_CodeSniffer_File $phpcsFile The PHP_CodeSniffer file where the * token was found. * @param int $stackPtr The position in the PHP_CodeSniffer * file's token stack where the token * was found. * * @return void */ public function process(PHP_CodeSniffer_File $phpcsFile, $stackPtr); }//end interface ?>