removed a file for plans that were scrapped
parent
483705d42e
commit
1b181ea3b1
|
@ -1,51 +0,0 @@
|
|||
<?php
|
||||
//permitted chars for password salt
|
||||
$permitted_chars = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ&/()[]$:?_';
|
||||
|
||||
//generates password salt
|
||||
function generate_salt($input, $strength = 5) {
|
||||
$input_length = strlen($input);
|
||||
$random_string = '';
|
||||
for($i = 0; $i < $strength; $i++) {
|
||||
$random_character = $input[random_int(0, $input_length - 1)];
|
||||
$random_string .= $random_character;
|
||||
}
|
||||
return $random_string;
|
||||
}
|
||||
|
||||
$random_salt = generate_salt($permitted_chars);
|
||||
$password_hash_method = "sha256";
|
||||
|
||||
$pdo = new PDO('mysql:host=localhost;dbname=web', 'webstuff', 'Schei// auf Pa$$w0rter!');
|
||||
//TODO: Add check for existing users
|
||||
//$query = "SELECT name FROM users WHERE name = :username;"; ← Do NOT use.
|
||||
|
||||
//error indicator for later use
|
||||
$error = false;
|
||||
|
||||
$error_message = "";
|
||||
if ($_POST['username']=='' || $_POST['password']=='' || $_POST['password_confirmation']=='') {
|
||||
$error = true;
|
||||
//TODO: Return redirect header, change index to php for handling highlighting of affected boxes
|
||||
$error_message = "Error: Not all values populated.";
|
||||
}
|
||||
if ($_POST['password'] != $_POST['password_confirmation']) {
|
||||
$error = true;
|
||||
//TODO: see above
|
||||
$error_message = "Error: How much does password?"; //Sorry, I *had* to do it.
|
||||
}
|
||||
//run only after basic user sanity checks
|
||||
if (!$error) {
|
||||
//add user
|
||||
$statement = $pdo->prepare('INSERT INTO users (name, authentication_string, authentication_salt, authentication_algorithm) VALUES (:name, :authentication_string, :authentication_salt, :authentication_algorithm)');
|
||||
//$result = $statement->execute(array('name' => $_POST['name'], 'authentication_string' => hash($password_hash_method, $_POST['password'] . $random_salt), 'authentication_salt' => $random_salt, 'authentication_algorithm' => $password_hash_method));
|
||||
if (!$result) {
|
||||
$error_message = "Error: SQL error.\n" . $statement->queryString . "\n" . $statement->errorInfo()[2];
|
||||
}
|
||||
}
|
||||
//You know, just in case... (To be removed after proper error handling is in place)
|
||||
//echo $error_message;
|
||||
?>
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
Loading…
Reference in New Issue