


Problem with garbled file names when uploading Chinese files in PHP, _PHP tutorial
The problem of garbled file names when uploading Chinese files in php,
Uploading files in php is the most basic technical point, but there are many problems that need to be solved when going deeper. No, after uploading the Chinese file, the file name became garbled.
The following is the problem code, it is very simple:
1. Question code
html part:
<span> 1</span> <span><</span><span>html</span><span>></span> <span> 2</span> <span><</span><span>body</span><span>></span> <span> 3</span> <span> 4</span> <span><</span><span>form </span><span>action</span><span>="upload_file.php"</span><span> method</span><span>="post"</span> <span> 5</span> <span>enctype</span><span>="multipart/form-data"</span><span>></span> <span> 6</span> <span><</span><span>label </span><span>for</span><span>="file"</span><span>></span>Filename:<span></</span><span>label</span><span>></span> <span> 7</span> <span><</span><span>input </span><span>type</span><span>="file"</span><span> name</span><span>="file"</span><span> id</span><span>="file"</span> <span>/></span> <span> 8</span> <span><</span><span>br </span><span>/></span> <span> 9</span> <span><</span><span>input </span><span>type</span><span>="submit"</span><span> name</span><span>="submit"</span><span> value</span><span>="Submit"</span> <span>/></span> <span>10</span> <span></</span><span>form</span><span>></span> <span>11</span> <span>12</span> <span></</span><span>body</span><span>></span> <span>13</span> <span></</span><span>html</span><span>></span>
php part:
<span> 1</span> <?<span>php </span><span> 2</span> <span>if</span> (<span>$_FILES</span>["file"]["error"] > 0<span>) </span><span> 3</span> <span>{ </span><span> 4</span> <span>echo</span> "Return Code: " . <span>$_FILES</span>["file"]["error"] . "<br />"<span>; </span><span> 5</span> <span>}</span><span>else</span> <span> 7</span> <span>{ </span><span> 8</span> <span>echo</span> "Upload: " . <span>$_FILES</span>["file"]["name"] . "<br />"<span>; </span><span> 9</span> <span>echo</span> "Type: " . <span>$_FILES</span>["file"]["type"] . "<br />"<span>; </span><span>10</span> <span>echo</span> "Size: " . (<span>$_FILES</span>["file"]["size"] / 1024) . " Kb<br />"<span>; </span><span>11</span> <span>echo</span> "Temp file: " . <span>$_FILES</span>["file"]["tmp_name"] . "<br />"<span>; </span><span>12</span> <span>13</span> <span>if</span> (<span>file_exists</span>("upload/" . <span>$_FILES</span>["file"]["name"<span>])) </span><span>14</span> <span> { </span><span>15</span> <span>echo</span> <span>$_FILES</span>["file"]["name"] . " already exists. "<span>; </span><span>16</span> <span> } </span><span>17</span> <span>else</span> <span>18</span> <span> { </span><span>19</span> <span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"], <span>20</span> "upload/" . <span>$_FILES</span>["file"]["name"]);<br /> }<br /> }
Uploaded a file named "test data.txt", oh ho, the file was uploaded, but the file name was garbled.
2. Preliminary test
Search the Internet for solutions and add
<span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"], "upload/" . <span>$_FILES</span>["file"]["name"]);
changed to
<span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"],"upload/" . <span>iconv</span>("UTF-8","gbk",<span>$_FILES</span>["file"]["name"]));
It turns out that the return value of iconv function is false.
Check the function manual and find that the second parameter has a special usage. A simple translation is meYou can append //TRANSLIT or //IGNORE after the encoding, the former will remove the characters that cannot be translated Convert to the closest character, the latter simply ignores characters that cannot be converted.
Try it:
<span>1</span> <span>var_dump</span>( <span>iconv</span>("UTF-8","gbk//TRANSLIT",<span>$_FILES</span>["file"]["name"<span>])); </span><span>2</span> <span>var_dump</span>( <span>iconv</span>("UTF-8","gbk//IGNORE",<span>$_FILES</span>["file"]["name"]));
Result:
<p><span>bool(false) string(4) ".txt"<br /> </span></p>
That is to say, Chinese characters cannot be converted, and there are not even close characters. It seems that the methods introduced online are not omnipotent.
3. The online introduction method failed, try again
Let me guess, Maybe my system will cause garbled characters when creating Chinese files, so I rewrote the code:
<span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"], "upload/测试数据.txt");
The result was successfully created without garbled characters. . . In other words, it is not a system problem.
Think about it, my php file itself is utf8 encoded, then
<span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"],"upload/测试数据.txt");
This statement must use utf8 encoding, so the file name uploaded before must not be utf8 encoded, then the following statement must be wrong, because the source string itself is not utf8 encoded:
<span>iconv</span>("UTF-8","gbk//TRANSLIT",<span>$_FILES</span>["file"]["name"]);
Use the function to check the encoding of the source string:
<span>1</span> <span>$e</span>=mb_detect_encoding(<span>$text</span>, <span>array</span>(‘UTF-8’, ‘GBK’,<span>’gb2312’)); </span><span>2</span> <span>echo</span> <span>$e</span>;
The result is CP936, that is, the source string encoding is GBK.
Try it
<span>move_uploaded_file</span>(<span>$_FILES</span>["file"]["tmp_name"],"upload/" . <span>iconv</span>("gbk","UTF-8",<span>$_FILES</span>["file"]["name"]));
Problem solved, no more garbled characters
4. Another solution
In fact, there is another solution, which is to add
in the middle of the head tag of the html file.<span><</span><span>meta </span><span>http-equiv</span><span>="Content-Type"</span><span> content</span><span>="text/html; charset=utf-8"</span> <span>/></span>
This way the encoding remains unified and there is no need to transcode any more
5.The following is the conclusion

To protect the application from session-related XSS attacks, the following measures are required: 1. Set the HttpOnly and Secure flags to protect the session cookies. 2. Export codes for all user inputs. 3. Implement content security policy (CSP) to limit script sources. Through these policies, session-related XSS attacks can be effectively protected and user data can be ensured.

Methods to optimize PHP session performance include: 1. Delay session start, 2. Use database to store sessions, 3. Compress session data, 4. Manage session life cycle, and 5. Implement session sharing. These strategies can significantly improve the efficiency of applications in high concurrency environments.

Thesession.gc_maxlifetimesettinginPHPdeterminesthelifespanofsessiondata,setinseconds.1)It'sconfiguredinphp.iniorviaini_set().2)Abalanceisneededtoavoidperformanceissuesandunexpectedlogouts.3)PHP'sgarbagecollectionisprobabilistic,influencedbygc_probabi

In PHP, you can use the session_name() function to configure the session name. The specific steps are as follows: 1. Use the session_name() function to set the session name, such as session_name("my_session"). 2. After setting the session name, call session_start() to start the session. Configuring session names can avoid session data conflicts between multiple applications and enhance security, but pay attention to the uniqueness, security, length and setting timing of session names.

The session ID should be regenerated regularly at login, before sensitive operations, and every 30 minutes. 1. Regenerate the session ID when logging in to prevent session fixed attacks. 2. Regenerate before sensitive operations to improve safety. 3. Regular regeneration reduces long-term utilization risks, but the user experience needs to be weighed.

Setting session cookie parameters in PHP can be achieved through the session_set_cookie_params() function. 1) Use this function to set parameters, such as expiration time, path, domain name, security flag, etc.; 2) Call session_start() to make the parameters take effect; 3) Dynamically adjust parameters according to needs, such as user login status; 4) Pay attention to setting secure and httponly flags to improve security.

The main purpose of using sessions in PHP is to maintain the status of the user between different pages. 1) The session is started through the session_start() function, creating a unique session ID and storing it in the user cookie. 2) Session data is saved on the server, allowing data to be passed between different requests, such as login status and shopping cart content.

How to share a session between subdomains? Implemented by setting session cookies for common domain names. 1. Set the domain of the session cookie to .example.com on the server side. 2. Choose the appropriate session storage method, such as memory, database or distributed cache. 3. Pass the session ID through cookies, and the server retrieves and updates the session data based on the ID.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Dreamweaver Mac version
Visual web development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software