|
|
@@ -137,8 +137,8 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
if ( $return_var > 0 ) {
|
|
|
sleep(2);
|
|
|
$error = "<a class=\"error\">"._('Invalid username or password')."</a>";
|
|
|
- $v_murmur = escapeshellarg($_POST['token']);
|
|
|
- exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
|
|
|
+ $v_session_id = escapeshellarg($_POST['token']);
|
|
|
+ exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id, $output, $return_var);
|
|
|
|
|
|
return $error;
|
|
|
} else {
|
|
|
@@ -161,8 +161,8 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
$error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
|
|
|
$_SESSION['login']['username'] = $user;
|
|
|
$_SESSION['login']['password'] = $password;
|
|
|
- $v_murmur = escapeshellarg($_POST['token']);
|
|
|
- exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
|
|
|
+ $v_session_id = escapeshellarg($_POST['token']);
|
|
|
+ exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id, $output, $return_var);
|
|
|
return $error;
|
|
|
unset($_POST['twofa']);
|
|
|
}
|
|
|
@@ -175,8 +175,8 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
$_SESSION['user'] = key($data);
|
|
|
$v_user = $_SESSION['user'];
|
|
|
//log successfull login attempt
|
|
|
- $v_murmur = escapeshellarg($_POST['token']);
|
|
|
- exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_murmur, $output, $return_var);
|
|
|
+ $v_session_id = escapeshellarg($_POST['token']);
|
|
|
+ exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_session_id, $output, $return_var);
|
|
|
|
|
|
$_SESSION['LAST_ACTIVITY'] = time();
|
|
|
$_SESSION['MURMUR'] = $_POST['murmur'];
|