Additional Sql-injection functions and techniques for escaping;
[openemr.git] / interface / forms / dictation / report.php
blob3388bc43475ba5c0cda907b33407fe48f0568460
1 <?php
2 //------------Forms generated from formsWiz
3 include_once("../../globals.php");
4 include_once($GLOBALS["srcdir"]."/api.inc");
5 function dictation_report( $pid, $encounter, $cols, $id) {
6 $count = 0;
7 $data = formFetch("form_dictation", $id);
8 if ($data) {
9 print "<table><tr>";
10 foreach($data as $key => $value) {
11 if ($key == "id" || $key == "pid" || $key == "user" ||
12 $key == "groupname" || $key == "authorized" || $key == "activity" ||
13 $key == "date" || $value == "" || $value == "0000-00-00 00:00:00")
15 continue;
17 if ($value == "on") {
18 $value = "yes";
20 $key=ucwords(str_replace("_"," ",$key));
21 print "<td><span class=bold>" . xlt($key) . ": </span><span class=text>" .
22 nl2br(text($value)) . "</span></td>";
23 $count++;
24 if ($count == $cols) {
25 $count = 0;
26 print "</tr><tr>\n";
30 print "</tr></table>";