PageRenderTime 45ms CodeModel.GetById 20ms RepoModel.GetById 1ms app.codeStats 0ms

/login.php

https://bitbucket.org/websightdesigns/project-manager
PHP | 48 lines | 37 code | 8 blank | 3 comment | 10 complexity | 298aeaf8107c265e0d0b2710e071f1be MD5 | raw file
  1. <?php
  2. include("config.php");
  3. require("mysql.php");
  4. // assign referrer variable
  5. $redirect = '';
  6. if(isset($_POST['redirect']))
  7. $redirect = mysql_real_escape_string($_POST['redirect']);
  8. // assign admin username variable
  9. $username = '';
  10. if(isset($_POST['managewsd_login_username']))
  11. $username = mysql_real_escape_string($_POST['managewsd_login_username']);
  12. // assign admin username variable
  13. $password = '';
  14. if(isset($_POST['managewsd_login_password']))
  15. $password = mysql_real_escape_string($_POST['managewsd_login_password']);
  16. $query = "SELECT id, password, salt, fullname
  17. FROM users
  18. WHERE username = '$username'";
  19. $result = mysql_query($query) or die(mysql_error());
  20. if(mysql_num_rows($result) < 1) { // no such user exists
  21. header('Location: auth.php');
  22. }
  23. $userData = mysql_fetch_array($result, MYSQL_ASSOC);
  24. $hash = sha1( $userData['salt'] . sha1($password) );
  25. if($hash == $userData['password']) { // correct password
  26. $_SESSION[$session_name] = TRUE;
  27. $_SESSION['username_auth'] = $username;
  28. $_SESSION['userid_auth'] = $userData['id'];
  29. $_SESSION['userfullname_auth'] = $userData['fullname'];
  30. if($redirect && $redirect != $protocol."://".$hostname.$basehref)
  31. header("Location: ".$protocol."://".$hostname.$basehref);
  32. else
  33. header("Location: ".$redirect);
  34. exit();
  35. } else { // incorrect password
  36. header("Location: ".$protocol."://".$hostname.$basehref."auth.php");
  37. exit();
  38. }
  39. mysql_close($link);
  40. ?>