- Timestamp:
- Mar 1, 2010, 10:23:51 PM (14 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/2.0/include/functions.inc.php
r5003 r5017 1517 1517 $param_value = $param_array[$param_name]; 1518 1518 } 1519 1519 1520 1520 // it's ok if the input parameter is null 1521 1521 if (empty($param_value)) … … 1523 1523 return true; 1524 1524 } 1525 1525 1526 1526 if ($is_array) 1527 1527 { 1528 1528 if (!is_array($param_value)) 1529 1529 { 1530 die('[Hacking attempt] the input parameter "'.$param_name.'" should be an array');1530 fatal_error('[Hacking attempt] the input parameter "'.$param_name.'" should be an array'); 1531 1531 } 1532 1532 … … 1535 1535 if (!preg_match($pattern, $item_to_check)) 1536 1536 { 1537 die('[Hacking attempt] an item is not valid in input parameter "'.$param_name.'"');1537 fatal_error('[Hacking attempt] an item is not valid in input parameter "'.$param_name.'"'); 1538 1538 } 1539 1539 } … … 1543 1543 if (!preg_match($pattern, $param_value)) 1544 1544 { 1545 die('[Hacking attempt] the input parameter "'.$param_name.'" is not valid');1545 fatal_error('[Hacking attempt] the input parameter "'.$param_name.'" is not valid'); 1546 1546 } 1547 1547 } … … 1553 1553 * else pwg_token is compare to server token 1554 1554 * 1555 * @return void access denied if token given is not equal to server token 1555 * @return void access denied if token given is not equal to server token 1556 1556 */ 1557 1557 function check_pwg_token() … … 1570 1570 if ($given_token != $valid_token) 1571 1571 { 1572 access_denied(); 1572 access_denied(); 1573 1573 } 1574 1574 }
Note: See TracChangeset
for help on using the changeset viewer.