mirror of
https://github.com/sigmasternchen/php-doc-en
synced 2025-03-16 00:48:54 +00:00
Use of proper case
git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@131094 c90b9560-bf6c-de11-be94-00142212c4b1
This commit is contained in:
parent
c15b45f174
commit
e56feec9d7
6 changed files with 17 additions and 17 deletions
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.56 $ -->
|
||||
<!-- $Revision: 1.57 $ -->
|
||||
<chapter id="security">
|
||||
<title>Security</title>
|
||||
|
||||
|
@ -920,7 +920,7 @@ $query = sprintf("SELECT id, name FROM products ORDER BY name LIMIT 20 OFFSET %d
|
|||
<title>Attacking Variables with a custom HTML page</title>
|
||||
<programlisting role="php">
|
||||
<![CDATA[
|
||||
<form method="post" action="attacktarget?username=badfoo&password=badfoo">
|
||||
<form method="POST" action="attacktarget?username=badfoo&password=badfoo">
|
||||
<input type="hidden" name="username" value="badfoo">
|
||||
<input type="hidden" name="password" value="badfoo">
|
||||
</form>
|
||||
|
@ -947,7 +947,7 @@ $query = sprintf("SELECT id, name FROM products ORDER BY name LIMIT 20 OFFSET %d
|
|||
<title>Exploiting common debugging variables</title>
|
||||
<programlisting role="php">
|
||||
<![CDATA[
|
||||
<form method="post" action="attacktarget?errors=Y&showerrors=1"&debug=1">
|
||||
<form method="POST" action="attacktarget?errors=Y&showerrors=1"&debug=1">
|
||||
<input type="hidden" name="errors" value="Y">
|
||||
<input type="hidden" name="showerrors" value="1">
|
||||
<input type="hidden" name="debug" value="1">
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.61 $ -->
|
||||
<!-- $Revision: 1.62 $ -->
|
||||
<chapter id="features.file-upload">
|
||||
<title>Handling file uploads</title>
|
||||
|
||||
|
@ -40,7 +40,7 @@
|
|||
<title>File Upload Form</title>
|
||||
<programlisting role="html">
|
||||
<![CDATA[
|
||||
<form enctype="multipart/form-data" action="_URL_" method="post">
|
||||
<form enctype="multipart/form-data" action="_URL_" method="POST">
|
||||
<input type="hidden" name="MAX_FILE_SIZE" value="30000">
|
||||
Send this file: <input name="userfile" type="file">
|
||||
<input type="submit" value="Send File">
|
||||
|
@ -355,7 +355,7 @@ if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
|
|||
<title>Uploading multiple files</title>
|
||||
<programlisting role="html">
|
||||
<![CDATA[
|
||||
<form action="file-upload.php" method="post" enctype="multipart/form-data">
|
||||
<form action="file-upload.php" method="POST" enctype="multipart/form-data">
|
||||
Send these files:<br>
|
||||
<input name="userfile[]" type="file"><br>
|
||||
<input name="userfile[]" type="file"><br>
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.61 $ -->
|
||||
<!-- $Revision: 1.62 $ -->
|
||||
<chapter id="language.variables">
|
||||
<title>Variables</title>
|
||||
|
||||
|
@ -753,7 +753,7 @@ echo "$a $hello";
|
|||
<title>A simple HTML form</title>
|
||||
<programlisting role="html">
|
||||
<![CDATA[
|
||||
<form action="foo.php" method="post">
|
||||
<form action="foo.php" method="POST">
|
||||
Name: <input type="text" name="username"><br>
|
||||
Email: <input type="text" name="email"><br>
|
||||
<input type="submit" name="submit" value="Submit me!">
|
||||
|
@ -859,7 +859,7 @@ if ($HTTP_POST_VARS['action'] == 'submitted') {
|
|||
print '</pre>';
|
||||
} else {
|
||||
?>
|
||||
<form action="<?php echo $HTTP_SERVER_VARS['PHP_SELF']; ?>" method="post">
|
||||
<form action="<?php echo $HTTP_SERVER_VARS['PHP_SELF']; ?>" method="POST">
|
||||
Name: <input type="text" name="personal[name]"><br>
|
||||
Email: <input type="text" name="personal[email]"><br>
|
||||
Beer: <br>
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.3 $ -->
|
||||
<!-- $Revision: 1.4 $ -->
|
||||
<!-- splitted from ./en/functions/oci8.xml, last change in rev 1.2 -->
|
||||
<refentry id="function.ocinewdescriptor">
|
||||
<refnamediv>
|
||||
|
@ -62,13 +62,13 @@
|
|||
<?php
|
||||
/* This script demonstrates file upload to LOB columns
|
||||
* The formfield used for this example looks like this
|
||||
* <form action="upload.php" method="post" enctype="multipart/form-data">
|
||||
* <form action="upload.php" method="POST" enctype="multipart/form-data">
|
||||
* <input type="file" name="lob_upload">
|
||||
* ...
|
||||
*/
|
||||
if(!isset($lob_upload) || $lob_upload == 'none'){
|
||||
?>
|
||||
<form action="upload.php" method="post" enctype="multipart/form-data">
|
||||
<form action="upload.php" method="POST" enctype="multipart/form-data">
|
||||
Upload file: <input type="file" name="lob_upload"><br>
|
||||
<input type="submit" value="Upload"> - <input type="reset">
|
||||
</form>
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.9 $ -->
|
||||
<!-- $Revision: 1.10 $ -->
|
||||
<reference id="ref.yaz">
|
||||
<title>YAZ functions</title>
|
||||
<titleabbrev>YAZ</titleabbrev>
|
||||
|
@ -65,7 +65,7 @@
|
|||
<![CDATA[
|
||||
$num_hosts = count ($host);
|
||||
if (empty($term) || count($host) == 0) {
|
||||
echo '<form method="get">
|
||||
echo '<form method="GET">
|
||||
<input type="checkbox"
|
||||
name="host[]" value="bagel.indexdata.dk/gils">
|
||||
GILS test
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<?xml version="1.0" encoding="iso-8859-1"?>
|
||||
<!-- $Revision: 1.56 $ -->
|
||||
<!-- $Revision: 1.57 $ -->
|
||||
<chapter id="security">
|
||||
<title>Security</title>
|
||||
|
||||
|
@ -920,7 +920,7 @@ $query = sprintf("SELECT id, name FROM products ORDER BY name LIMIT 20 OFFSET %d
|
|||
<title>Attacking Variables with a custom HTML page</title>
|
||||
<programlisting role="php">
|
||||
<![CDATA[
|
||||
<form method="post" action="attacktarget?username=badfoo&password=badfoo">
|
||||
<form method="POST" action="attacktarget?username=badfoo&password=badfoo">
|
||||
<input type="hidden" name="username" value="badfoo">
|
||||
<input type="hidden" name="password" value="badfoo">
|
||||
</form>
|
||||
|
@ -947,7 +947,7 @@ $query = sprintf("SELECT id, name FROM products ORDER BY name LIMIT 20 OFFSET %d
|
|||
<title>Exploiting common debugging variables</title>
|
||||
<programlisting role="php">
|
||||
<![CDATA[
|
||||
<form method="post" action="attacktarget?errors=Y&showerrors=1"&debug=1">
|
||||
<form method="POST" action="attacktarget?errors=Y&showerrors=1"&debug=1">
|
||||
<input type="hidden" name="errors" value="Y">
|
||||
<input type="hidden" name="showerrors" value="1">
|
||||
<input type="hidden" name="debug" value="1">
|
||||
|
|
Loading…
Reference in a new issue