Activated strict SQL mode, minor SQL injection fix, fixed _vl() debug helper.
[fa-stable.git] / includes / ui / ui_input.inc
index dbcdee67de47e2568a181bec8cc6d56d9f7e451d..59a3676ef5664ed7ccc7bd004411ac37c2c824aa 100644 (file)
@@ -348,7 +348,13 @@ function select_button_cell($name, $value, $title=false)
 
 function check_value($name)
 {
-    return (empty($_POST[$name]) ? 0 : 1);
+       if (is_array($name)) {
+               $ret = array();
+               foreach($name as $key)
+                       $ret[$key] = check_value($key);
+               return $ret;
+       } else
+               return (empty($_POST[$name]) ? 0 : 1);
 }
 
 function checkbox($label, $name, $value=null, $submit_on_change=false, $title=false)
@@ -1005,7 +1011,7 @@ function bank_balance_row($bank_acc, $parms='')
        $bal = get_balance_before_for_bank_account($bank_acc, $to);
        label_row( _("Bank Balance:"),
                "<a target='_blank' " . ($bal<0 ? 'class="redfg"' : '')
-               ."href='$path_to_root/gl/inquiry/bank_inquiry.php?bank_account=".$bank_acc."&no_header=1"."'"           
+               ."href='$path_to_root/gl/inquiry/bank_inquiry.php?bank_account=".$bank_acc."'"
                ." onclick=\"javascript:openWindow(this.href,this.target); return false;\" >&nbsp;"
                . price_format($bal)
                ."</a>", $parms);