Additional Sql-injection functions and techniques for escaping;
[openemr.git] / interface / forms / dictation / save.php
blob916219c45b85a6766d6200513256309133a42b64
1 <?php
2 //------------Forms generated from formsWiz
4 $fake_register_globals=false;
5 $sanitize_all_escapes=true;
7 include_once("../../globals.php");
8 include_once("$srcdir/api.inc");
9 include_once("$srcdir/forms.inc");
10 if ($encounter == "")
11 $encounter = date("Ymd");
12 if ($_GET["mode"] == "new"){
13 $newid = formSubmit("form_dictation", $_POST, $_GET["id"], $userauthorized);
14 addForm($encounter, "Speech Dictation", $newid, "dictation", $pid, $userauthorized);
15 }elseif ($_GET["mode"] == "update") {
16 sqlInsert("update form_dictation set pid = ?,groupname=?,user=?,authorized=?,activity=1, date = NOW(), dictation=?, additional_notes=? where id=?",array($_SESSION["pid"],$_SESSION["authProvider"],$_SESSION["authUser"],$userauthorized,$_POST["dictation"],$_POST["additional_notes"],$_GET["id"]));
18 $_SESSION["encounter"] = $encounter;
19 formHeader("Redirecting....");
20 formJump();
21 formFooter();