Server IP : 184.154.167.98 / Your IP : 18.221.165.190 Web Server : Apache System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 User : puertode ( 1767) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /home/puertode/www/mesa/setup/test/tests/ |
Upload File : |
<?php require_once "class.test.php"; require_once "class.php_analyze.php"; class UnitializedVars extends Test { var $name = "Access to unitialized variables"; function testUnitializedUsage() { $scripts = static::getAllScripts(); $matches = array(); foreach ($scripts as $s) { $a = new SourceAnalyzer($s); $a->parseFile(); foreach ($a->bugs as $bug) { if ($bug['type'] == 'UNDEF_ACCESS') { list($line, $file) = $bug['line']; $this->fail($file, $line, "'{$bug['name']}'"); } elseif ($bug['type'] == 'MAYBE_UNDEF_ACCESS') { list($line, $file) = $bug['line']; $this->warn("Possible access to NULL object @ $file : $line"); } } if (!$a->bugs) $this->pass(); } } } return 'UnitializedVars'; ?>