X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;ds=sidebyside;f=CRM%2FCore%2FHTMLInputCoder.php;h=7080c1a86a0e20be551886b4f33232ee63aeae3c;hb=3ad12a31bdfaa654a808b6fbc94aac70270262cd;hp=96ce85954dcc03dfabb8089d62882693cd951d03;hpb=58a50b22e20f112fdbfc7e50f18353c311ceb1ae;p=civicrm-core.git diff --git a/CRM/Core/HTMLInputCoder.php b/CRM/Core/HTMLInputCoder.php index 96ce85954d..7080c1a86a 100644 --- a/CRM/Core/HTMLInputCoder.php +++ b/CRM/Core/HTMLInputCoder.php @@ -1,9 +1,9 @@ isSkippedField($fldName); } /** - * This function is going to filter the + * going to filter the * submitted values across XSS vulnerability. * * @param array|string $values - * @param bool $castToString If TRUE, all scalars will be filtered (and therefore cast to strings) + * @param bool $castToString + * If TRUE, all scalars will be filtered (and therefore cast to strings). * If FALSE, then non-string values will be preserved */ public static function encodeInput(&$values, $castToString = TRUE) {