query("SELECT status FROM user WHERE email='$safe_email';");
$test_status_arr = $test_status_db->fetchArray(SQLITE3_NUM);
$test_status_int = $test_status_arr[0];
$test_key_db = $db->query("SELECT key FROM user WHERE email='$safe_email';");
$test_key_arr = $test_key_db->fetchArray(SQLITE3_NUM);
$test_key = $test_key_arr[0];
if ($test_status_int != 0 || $email == "" || $test_key != $_POST["key"] || $test_key == ""){
header("Refresh: 0; /register?reason=prohibited");
exit;
} else {
$id_db = $db->query("SELECT id FROM user WHERE email='$safe_email';");
$id_ar = $id_db->fetchArray(SQLITE3_NUM);
$id = $id_ar[0];
/*Generates the encrypted password and the database transactions*/
$salt = uniqid(mt_rand(), true);
$password = "$salt"."$cleartext_password";
$hash_password = md5($password);
for($i=0;$i<15000;$i++)
$hash_password = md5($hash_password);
if($db->exec("
BEGIN TRANSACTION;
UPDATE user SET name='$safe_name', salt='$salt', password='$hash_password', invites=5, status=1, register=(SELECT datetime()) WHERE id=$id;
INSERT INTO files (id, parent, owner, name, folder, mime, size, share, extra) VALUES (NULL, 0, $id, '/', 'DIRECTORY', NULL, NULL, 'PUBLIC', NULL);
COMMIT;")
){
$_SESSION["login"] = true;
$_SESSION["username"] = $name;
header("Refresh: 0; /register?reason=registration");
} else {
header("Refresh: 0; /register?reason=database");
}
}
} else {
foreach ($_GET as $name => $value) {
echo 'Name: ' . $name . ' Value: ' . $value . '
';
}
echo "