colder Wed Apr 12 15:16:34 2006 UTC
Modified files:
/phpdoc/en/security database.xml
Log:
Recommend pg_escape_string instead of addslashes in the example (spotted by
[EMAIL PROTECTED])
http://cvs.php.net/viewcvs.cgi/phpdoc/en/security/database.xml?r1=1.11&r2=1.12&diff_format=u
Index: phpdoc/en/security/database.xml
diff -u phpdoc/en/security/database.xml:1.11
phpdoc/en/security/database.xml:1.12
--- phpdoc/en/security/database.xml:1.11 Mon Feb 14 14:09:59 2005
+++ phpdoc/en/security/database.xml Wed Apr 12 15:16:34 2006
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.11 $ -->
+<!-- $Revision: 1.12 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
<chapter id="security.database">
<title>Database Security</title>
@@ -121,12 +121,12 @@
// storing password hash
$query = sprintf("INSERT INTO users(name,pwd) VALUES('%s','%s');",
- addslashes($username), md5($password));
+ pg_escape_string($username), md5($password));
$result = pg_query($connection, $query);
// querying if user submitted the right password
$query = sprintf("SELECT 1 FROM users WHERE name='%s' AND pwd='%s';",
- addslashes($username), md5($password));
+ pg_escape_string($username), md5($password));
$result = pg_query($connection, $query);
if (pg_num_rows($result) > 0) {