query("SELECT status FROM user WHERE email='$safe_email';"); $test_status_arr = $test_status_db->fetchArray(SQLITE3_NUM); $test_status_int = $test_status_arr[0]; $test_key_db = $db->query("SELECT key FROM user WHERE email='$safe_email';"); $test_key_arr = $test_key_db->fetchArray(SQLITE3_NUM); $test_key = $test_key_arr[0]; if ($test_status_int != 0 || $email == "" || $test_key != $_POST["key"] || $test_key == ""){ header("Refresh: 0; /register?reason=prohibited"); exit; } else { /*Generates the encrypted password and the database transactions*/ $salt = uniqid(mt_rand(), true); $password = "$salt"."$cleartext_password"; $hash_password = md5($password); for($i=0;$i<15000;$i++) $hash_password = md5($hash_password); if($db->exec(" BEGIN TRANSACTION; UPDATE user SET name='$safe_name', salt='$salt', password='$hash_password', status=1, invites=5 WHERE email='$safe_email'; CREATE TABLE $safe_name (id INTEGER PRIMARY KEY, folder INTEGER, name TEXT, type TEXT, mime TEXT, size INTEGER, public TEXT); INSERT INTO $safe_name (id, folder, name, type, public) VALUES (NULL, 0, '/', 'FOLDER', 'HIDDEN'); COMMIT;") ){ if(mkdir("/var/www/files/files/$name")){ $_SESSION["login"] = true; $_SESSION["username"] = $name; header("Refresh: 0; /register?reason=registration"); } else { header("Refresh: 0; /register?reason=mkdir"); } } else { header("Refresh: 0; /register?reason=database"); } } } else { foreach ($_GET as $name => $value) { echo 'Name: ' . $name . ' Value: ' . $value . '
'; } echo "

Name:

pswd:

2ndpsdw:

key:

email:

"; }