您好,欢迎访问一九零五行业门户网

很好用的php防止sql注入漏洞过滤函数的代码

$v ) {$array [$k] = sec ( $v );}} else if (is_string ( $array )) {//使用addslashes函数来处理$array = addslashes ( $array );} else if (is_numeric ( $array )) {$array = intval ( $array );}return $array;}//整型过滤函数function num_check($id) {if (! $id) {die ( '参数不能为空!' );} //是否为空的判断else if (inject_check ( $id )) {die ( '非法参数' );} //注入判断else if (! is_numetic ( $id )) {die ( '非法参数' );}//数字判断$id = intval ( $id );//整型化return $id;}//字符过滤函数function str_check($str) {if (inject_check ( $str )) {die ( '非法参数' );}//注入判断$str = htmlspecialchars ( $str );//转换htmlreturn $str;}function search_check($str) {$str = str_replace ( _, \_, $str );//把_过滤掉$str = str_replace ( %, \%, $str );//把%过滤掉$str = htmlspecialchars ( $str );//转换htmlreturn $str;}//表单过滤函数function post_check($str, $min, $max) {if (isset ( $min ) && strlen ( $str ) die ( '最少$min字节' );} else if (isset ( $max ) && strlen ( $str ) > $max) {die ( '最多$max字节' );}return stripslashes_array ( $str );}//防注入函数function inject_check($sql_str) {return eregi ( 'select|inert|update|delete|\'|\/\*|\*|\.\.\/|\.\/|union|into|load_file|outfile', $sql_str );// 进行过滤,防注入}function stripslashes_array(&$array) {if (is_array ( $array )) {foreach ( $array as $k => $v ) {$array [$k] = stripslashes_array ( $v );}} else if (is_string ( $array )) {$array = stripslashes ( $array );}return $array;}?>
复制代码
其它类似信息

推荐信息