/var/www/(Del)skdb.hk/admin/check_login.php


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
<?php

/* check login script, included in db_connect.php. */
require_once 'configure.php';
require_once 
'function_login_block.php';
die_if_login_block();

session_start();

if (!isset(
$_SESSION['username']) || !isset($_SESSION['password'])) {
    
$logged_in 0;
    return;
} else {

    
// remember, $_SESSION['password'] will be encrypted.

    
if(!get_magic_quotes_gpc()) {
        
$_SESSION['username'] = addslashes($_SESSION['username']);
    }


    
// addslashes to session username before using in a query.
    /*
    $pass = $db_object->query("SELECT password FROM users WHERE username = '".$_SESSION['username']."'");

    if(DB::isError($pass) || $pass->numRows() != 1) {
        $logged_in = 0;
        unset($_SESSION['username']);
        unset($_SESSION['password']);
        // kill incorrect session variables.
    }

    $db_pass = $pass->fetchRow();
    */
    // now we have encrypted pass from DB in 
    //$db_pass['password'], stripslashes() just incase:

    //$db_pass['password'] = stripslashes($db_pass['password']);
    //$_SESSION['password'] = stripslashes($_SESSION['password']);



    //compare:
    
if($_SESSION['password'] == "dragonone") { 
        
// valid password for username
        
$logged_in 1// they have correct info
                    // in session variables.
    
} else {
        
$logged_in 0;
        unset(
$_SESSION['username']);
        unset(
$_SESSION['password']);
        
// kill incorrect session variables.
    
}
}


// clean up
unset($db_pass['password']);

$_SESSION['username'] = stripslashes($_SESSION['username']);

?>