// empty username = not really a hacking attempt.
if (empty($_REQUEST['username'])) { //|| (strpos($_REQUEST['username'], '@') < 1)) {
// empty username = not really a hacking attempt.
if (empty($_REQUEST['username'])) { //|| (strpos($_REQUEST['username'], '@') < 1)) {
$ff= HTML_FlexyFramework::get();
if (!empty($ff->Pman['auth_comptype']) && $ff->Pman['auth_comptype'] != $u->company()->comptype) {
//print_r($u->company());
$ff= HTML_FlexyFramework::get();
if (!empty($ff->Pman['auth_comptype']) && $ff->Pman['auth_comptype'] != $u->company()->comptype) {
//print_r($u->company());
}
// note we trim \x10 -- line break - as it was injected the front end
// may have an old bug on safari/chrome that added that character in certian wierd scenarios..
if (!$u->checkPassword(trim($_REQUEST['password'],"\x10"))) {
}
// note we trim \x10 -- line break - as it was injected the front end
// may have an old bug on safari/chrome that added that character in certian wierd scenarios..
if (!$u->checkPassword(trim($_REQUEST['password'],"\x10"))) {
- $this->jerror('LOGIN-BAD', 'You typed the wrong Username or Password (2)'); // - " . htmlspecialchars(print_r($_POST,true))."'");
+ $this->jerror($this->event_prefix . 'LOGIN-BAD', 'You typed the wrong Username or Password (2)'); // - " . htmlspecialchars(print_r($_POST,true))."'");