php过滤空值的问题这个要死的POST,已经忽视了IF判断直接把空值写入数据库了
PHP接收端:
<br />if($_GET['do'] =='add'){<br />if(!isset($_POST['porgnum']) && empty($_POST['porgnum'])){<br />echo '未填写登录名!';<br />}else if(!isset($_POST['porgname']) && empty($_POST['porgname'])){<br />echo '未填写昵称!';<br />}else if(!isset($_POST['ppasswd']) && empty($_POST['ppasswd'])){<br />echo '未填写密码!';<br />}else{<br />$orgid =$_POST['porgnum'];<br />$orgname =$_POST['porgname'];<br />$passwd =$_POST['ppasswd'];<br />$author =$_POST['pauthor'];<br />$con = mysql_connect(DB_HOST,DB_USER,DB_PASSWD);<br />mysql_select_db(DB_NAME,$con);<br />mysql_query("SET NAMES 'utf8'");<br />mysql_query("SET CHARACTER_SET_CLIENT=utf8");<br />mysql_query("SET CHARACTER_SET_RESULTS=utf8");<br />if(!mysql_query("INSERT INTO `".DB_PRE."menber` (orgnum, orgname, passwd, power) VALUES ('$orgid', '$orgname', '$passwd', '$author')")){<br />die('错误!代码:' .mysql_error());<br />}else{<br />echo '注册成功!';<br />};<br />mysql_close($con);<br />};<br />
PHP表单:
<br /><tr><td>登录名</td><td><input type="text" id="orgnum" /></td></tr><br /><tr><td>名称</td><td><input type="text" id="orgname" /></td></tr><br /><tr><td>新密码</td><td><input type="text" id="passwd" /></td></tr><br /><tr><td>12</td><td><select id="author"><option value="v">123</option></select></td></tr><br /><tr><td colspan="2"><input type="button" value="提交" onclick="new_org();" /></td></tr><br /><tr><td colspan="2"><div class="admin_display"></div></td></tr><br />
JQUERY:
<br />function new_org(){<br />var orgnum = j('#orgnum').val();<br />var orgname = j('#orgname').val();<br />var passwd = j('#passwd').val();<br />var author = j('#author').val();<br />j.ajax({<br />type:"POST",<br />url:"action.php?do=add",<br />data:{<br />porgnum:orgnum,<br />porgname:orgname,<br />ppasswd:passwd,<br />pauthor:author<br />},<br />dataType:"html",<br />cache:false,<br />async:false,<br />error:function(){<br />alert("发送失败!");<br />},<br />success:function(msg){<br />j('.admin_display').html(msg);<br />alert(orgnum);<br />}<br />});<br />};<br />
能正常注册,写入数据库,但是,如果前端的iput不输入,直接提交,接收端会无视前端POST过来的“空值”,暂且称为“空值”吧,我也不知道是什么值,反正接收端已经无视这个空值,直接写入数据库了,大神们,求解脱,我已经块暴走了……
------解决思路----------------------
这里无论如何都会执行到else代码里面去呀 你可以在最后一个else 输出一个值调试下 我想问题应该在这里
------解决思路----------------------
if(!isset($_POST['porgnum']) && empty($_POST['porgnum'])){
这个就不对了
应该是 if(isset($_POST['porgnum']) && empty($_POST['porgnum'])){
$_POST['porgnum'] 存在且为空
按你写的,如果 $_POST['porgnum'] 不存在的话,不就进到 else 分支了吗?
其他类同
------解决思路----------------------
你没理解isset是什么意思,把&&换成或者(
------解决思路----------------------
)
------解决思路----------------------
这个完全是你自己疏忽了或者对isset没有理解
------解决思路----------------------
isset 检查变量是否定义。
没有定义放入变量当然可以认为是空
但值为空的变量也是变量呀
所以逆命题不成立

Reasons for PHPSession failure include configuration errors, cookie issues, and session expiration. 1. Configuration error: Check and set the correct session.save_path. 2.Cookie problem: Make sure the cookie is set correctly. 3.Session expires: Adjust session.gc_maxlifetime value to extend session time.

Methods to debug session problems in PHP include: 1. Check whether the session is started correctly; 2. Verify the delivery of the session ID; 3. Check the storage and reading of session data; 4. Check the server configuration. By outputting session ID and data, viewing session file content, etc., you can effectively diagnose and solve session-related problems.

Multiple calls to session_start() will result in warning messages and possible data overwrites. 1) PHP will issue a warning, prompting that the session has been started. 2) It may cause unexpected overwriting of session data. 3) Use session_status() to check the session status to avoid repeated calls.

Configuring the session lifecycle in PHP can be achieved by setting session.gc_maxlifetime and session.cookie_lifetime. 1) session.gc_maxlifetime controls the survival time of server-side session data, 2) session.cookie_lifetime controls the life cycle of client cookies. When set to 0, the cookie expires when the browser is closed.

The main advantages of using database storage sessions include persistence, scalability, and security. 1. Persistence: Even if the server restarts, the session data can remain unchanged. 2. Scalability: Applicable to distributed systems, ensuring that session data is synchronized between multiple servers. 3. Security: The database provides encrypted storage to protect sensitive information.

Implementing custom session processing in PHP can be done by implementing the SessionHandlerInterface interface. The specific steps include: 1) Creating a class that implements SessionHandlerInterface, such as CustomSessionHandler; 2) Rewriting methods in the interface (such as open, close, read, write, destroy, gc) to define the life cycle and storage method of session data; 3) Register a custom session processor in a PHP script and start the session. This allows data to be stored in media such as MySQL and Redis to improve performance, security and scalability.

SessionID is a mechanism used in web applications to track user session status. 1. It is a randomly generated string used to maintain user's identity information during multiple interactions between the user and the server. 2. The server generates and sends it to the client through cookies or URL parameters to help identify and associate these requests in multiple requests of the user. 3. Generation usually uses random algorithms to ensure uniqueness and unpredictability. 4. In actual development, in-memory databases such as Redis can be used to store session data to improve performance and security.

Managing sessions in stateless environments such as APIs can be achieved by using JWT or cookies. 1. JWT is suitable for statelessness and scalability, but it is large in size when it comes to big data. 2.Cookies are more traditional and easy to implement, but they need to be configured with caution to ensure security.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Linux new version
SublimeText3 Linux latest version

Notepad++7.3.1
Easy-to-use and free code editor

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
