header(); $passwordconfirmiswrong = false; $passwordistooshort = false; $user = new User($con, 0); $userexists = false; if(isset($_POST['submit'])) { $username = $_POST['username']; $password = $_POST['pass']; $passwordconfirm = $_POST['passconfirm']; echo ''; $user = new User($con, $user->getID($con, $username)); if ($password == $passwordconfirm) { $passwordconfirmiswrong = false; } else { $passwordconfirmiswrong = true; } if (strlen($password) < 8) { $passwordistooshort = true; } else { $passwordistooshort = false; } if ($passwordistooshort == false && $passwordconfirmiswrong == false) { $password = password_hash($password, PASSWORD_BCRYPT); $query = $con->prepare('SELECT COUNT(*) FROM users WHERE username=:username'); $query->bindParam(':username', $username); $query->execute(); $result = $query->fetchColumn(); if ($result == 0) { $query = $con->prepare('INSERT INTO users (username, password) VALUES (:username, :password)'); $query->bindParam(':username', $username); $query->bindParam(':password', $password); $query->execute(); $_POST['success'] = 1; $_SESSION["user"] = $user->getID($con, $username); header("Location: /home"); } else { $userexists = true; } } } ?>
{"data"}; ?>