


Detailed explanation of functions that come with PHP to verify whether email, URL, and IP are legal
In the past, I used PHP to verify whether the email, URL, and IP were legal by writing regular rules myself. However, sometimes I was confused and might write a regular rule that was not completely correct, causing verification errors. Today I discovered that PHP itself automatically With functions to verify whether the email, URL, and IP are legal
The filter_var function is mainly used.
Syntax
filter_var(variable, filter, options)
Parameter description
variable Required. Specifies the variables to filter.
filter Optional. Specifies the ID of the filter to use.
options Specifies an array containing flags/options. Check the possible flags and options for each filter.
PHP Filters
ID Name | Description |
---|---|
FILTER_CALLBACK | Call user-defined function to filter data. |
FILTER_SANITIZE_STRING | Remove tags, remove or encode special characters. |
FILTER_SANITIZE_STRIPPED | "string" Alias for the filter. |
FILTER_SANITIZE_ENCODED | URL-encode string, remove or encode special characters. |
##FILTER_SANITIZE_SPECIAL_CHARS | HTML escape characters ‘”<>& and characters with ASCII values less than 32.|
FILTER_SANITIZE_EMAIL | Remove all characters except letters, numbers and !#$%&'* -/=?^_`{| }~@.[] |
FILTER_SANITIZE_URL | Remove all characters except letters, numbers and $-_. !*'(), {}|\\^~[]`<>#%”;/?:@&= |
#FILTER_SANITIZE_NUMBER_INT | Delete all characters , except numbers and -|
FILTER_SANITIZE_NUMBER_FLOAT | Remove all characters except numbers, - and.,eE.|
FILTER_SANITIZE_MAGIC_QUOTES | Apply addslashes().|
FILTER_UNSAFE_RAW | Does not do any filtering, stripping or encoding of special characters. |
FILTER_VALIDATE_INT | Validates values as integers in the specified range. |
FILTER_VALIDATE_BOOLEAN | If it is "1", "true", "on" and "yes", then return true, if it is " 0″, “false”, “off”, “no” and “”, then false is returned. Otherwise NULL is returned. |
FILTER_VALIDATE_FLOAT | Validate the value as a floating point number. |
FILTER_VALIDATE_REGEXP | Validates values based on regexp, a Perl-compatible regular expression. |
FILTER_VALIDATE_URL | Validate the value as a URL. |
FILTER_VALIDATE_EMAIL | Validate the value as an e-mail. |
FILTER_VALIDATE_IP | Validate the value as an IP address. |
Example #1 A filter_var() example
<?php var_dump(filter_var('bob@example.com', FILTER_VALIDATE_EMAIL)); var_dump(filter_var('http://example.com', FILTER_VALIDATE_URL, FILTER_FLAG_PATH_REQUIRED)); ?>
The above routine will output:
string(15) "bob@example.com" bool(false)
The above is the content of this article All content, I hope it will be helpful to everyone's study.
Related recommendations:
PHP email verification example tutorial, php email example
PHP comes with its own method to verify whether the email exists , php comes with verification email
PHP email verification example tutorial, php email example_PHP tutorial
The above is the detailed content of Detailed explanation of functions that come with PHP to verify whether email, URL, and IP are legal. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

This article provides a detailed Gate.io registration tutorial, covering every step from accessing the official website to completing registration, including filling in registration information, verifying, reading user agreements, etc. The article also emphasizes security measures after successful registration, such as setting up secondary verification and completing real-name authentication, and gives tips from beginners to help users safely start their digital asset trading journey.

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

This article provides newbies with detailed Gate.io registration tutorials, guiding them to gradually complete the registration process, including accessing the official website, filling in information, identity verification, etc., and emphasizes the security settings after registration. In addition, the article also mentioned other exchanges such as Binance, Ouyi and Sesame Open Door. It is recommended that novices choose the right platform according to their own needs, and remind readers that digital asset investment is risky and should invest rationally.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

Method for obtaining the return code when Laravel email sending fails. When using Laravel to develop applications, you often encounter situations where you need to send verification codes. And in reality...

The method of handling Laravel's email failure to send verification code is to use Laravel...

This article provides a detailed Gate.io web version latest registration tutorial to help users easily get started with digital asset trading. The tutorial covers every step from accessing the official website to completing registration, and emphasizes security settings after registration. The article also briefly introduces other trading platforms such as Binance, Ouyi and Sesame Open Door. It is recommended that users choose the right platform according to their own needs and pay attention to investment risks.
