Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- include("config.php");
- session_start();
- if($_SERVER["REQUEST_METHOD"] == "POST") {
- // username and password sent from form
- $myusername = mysqli_real_escape_string($db,$_POST['username']);
- $mypassword = mysqli_real_escape_string($db,$_POST['password1']);
- $verifypass = mysqli_real_escape_string($db,$_POST['password2']);
- $sql = "SELECT id FROM admin WHERE username = '$myusername' and passcode = '$mypassword'";
- $result = mysqli_query($db,$sql);
- $row = mysqli_fetch_array($result,MYSQLI_ASSOC);
- $active = $row['active'];
- $count = mysqli_num_rows($result);
- if($count)
- {
- $error = "Account already exists";
- }
- else if(strlen($mypassword) < 3)
- {
- $error = "Password too short. (must be at least 3 characters)";
- }
- else if(strlen($myusername) < 3)
- {
- $error = "Username too short. (must be at least 3 characters)";
- }
- else if($mypassword != $verifypass)
- {
- $error = "Passwords don't match.";
- }
- else
- {
- $sql = "INSERT INTO admin (username, passcode) VALUES ('$myusername', '$mypassword')";
- $result = mysqli_query($db,$sql);
- header("Location: login.php");
- }
- }
- ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement