Home
last modified time | relevance | path

Searched refs:sanitiser (Results 1 – 13 of 13) sorted by relevance

/plugin/publist/
H A Dsyntax.php106 if ( empty($sanitiser) ) {
107 $sanitiser = create_function('$i', 'return $i;');
109 $parser = new BibtexConverter($data['options'],$sanitiser);
H A Dsanitiser.php14 $sanitiser = function ($inputstr) { function
H A Dchangelog6 * Included simple (optional) TeX to utf8 sanitiser in syntax.php.
H A DTODO37 - sanitiser function/file selection
/plugin/publistx/
H A Dsyntax.php123 if ( empty($sanitiser) ) {
124 $sanitiser = create_function('$i', 'return $i;');
126 $parser = new BibtexConverter($data['options'],$sanitiser,$authors);
H A Dsanitiser.php14 $sanitiser = function ($inputstr) { function
H A Dchangelog16 * Included simple (optional) TeX to utf8 sanitiser in syntax.php.
H A DTODO37 - sanitiser function/file selection
/plugin/publistf/
H A Dsyntax.php124 if ( empty($sanitiser) ) {
125 $sanitiser = create_function('$i', 'return $i;');
127 $parser = new BibtexConverter($data['options'],$sanitiser,$authors);
H A Dsanitiser.php15 $sanitiser = function ($inputstr) { function
H A DTODO37 - sanitiser function/file selection
H A DCHANGELOG.md51 * Included simple (optional) TeX to utf8 sanitiser in syntax.php.
/plugin/aichat/vendor/erusev/parsedown/
H A DREADME.md49 If instead, you wish to allow HTML within untrusted user-input, but still want output to be free from XSS it is recommended that you make use of a HTML sanitiser that allows HTML tags to be whitelisted, like [HTML Purifier](http://htmlpurifier.org/).