equal
deleted
inserted
replaced
523 // and yet the password got encrypted, that means the user screwed with the code, and if the user screwed with the code and thus |
523 // and yet the password got encrypted, that means the user screwed with the code, and if the user screwed with the code and thus |
524 // forgot his password, that's his problem. |
524 // forgot his password, that's his problem. |
525 |
525 |
526 if ( $_POST['use_crypt'] == 'yes' ) |
526 if ( $_POST['use_crypt'] == 'yes' ) |
527 { |
527 { |
528 $aes = new AESCrypt(AES_BITS, AES_BLOCKSIZE); |
528 $aes = AESCrypt::singleton(AES_BITS, AES_BLOCKSIZE); |
529 $crypt_key = $session->fetch_public_key($_POST['crypt_key']); |
529 $crypt_key = $session->fetch_public_key($_POST['crypt_key']); |
530 if ( !$crypt_key ) |
530 if ( !$crypt_key ) |
531 { |
531 { |
532 $s = $lang->get('user_reg_err_missing_key'); |
532 $s = $lang->get('user_reg_err_missing_key'); |
533 } |
533 } |
1233 return false; |
1233 return false; |
1234 } |
1234 } |
1235 |
1235 |
1236 if ( isset($_POST['do_stage2']) ) |
1236 if ( isset($_POST['do_stage2']) ) |
1237 { |
1237 { |
1238 $aes = new AESCrypt(AES_BITS, AES_BLOCKSIZE); |
1238 $aes = AESCrypt::singleton(AES_BITS, AES_BLOCKSIZE); |
1239 if($_POST['use_crypt'] == 'yes') |
1239 if($_POST['use_crypt'] == 'yes') |
1240 { |
1240 { |
1241 $crypt_key = $session->fetch_public_key($_POST['crypt_key']); |
1241 $crypt_key = $session->fetch_public_key($_POST['crypt_key']); |
1242 if(!$crypt_key) |
1242 if(!$crypt_key) |
1243 { |
1243 { |