From 1d689fba1b641b3c49bab289c575ce124a0d1396 Mon Sep 17 00:00:00 2001 From: BodgeMaster <> Date: Wed, 19 Feb 2020 16:23:08 +0100 Subject: [PATCH] disarmed a bomb --- threadr/signup/redirect.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/threadr/signup/redirect.php b/threadr/signup/redirect.php index adbd8cf..5bfefef 100644 --- a/threadr/signup/redirect.php +++ b/threadr/signup/redirect.php @@ -38,13 +38,13 @@ if (!$error) { //add user $statement = $pdo->prepare('INSERT INTO users (name, authentication_string, authentication_salt, authentication_algorithm) VALUES (:name, :authentication_string, :authentication_salt, :authentication_algorithm)'); - $result = $statement->execute(array('name' => $_POST['name'], 'authentication_string' => hash($password_hash_method, $_POST['password'] . $random_salt), 'authentication_salt' => $random_salt, 'authentication_algorithm' => $password_hash_method)); + //$result = $statement->execute(array('name' => $_POST['name'], 'authentication_string' => hash($password_hash_method, $_POST['password'] . $random_salt), 'authentication_salt' => $random_salt, 'authentication_algorithm' => $password_hash_method)); if (!$result) { $error_message = "Error: SQL error.\n" . $statement->queryString . "\n" . $statement->errorInfo()[2]; } } //You know, just in case... (To be removed after proper error handling is in place) - echo $error_message; + //echo $error_message; ?>