<?php
include("../connection.php");
// echo "<pre>";
// print_r($_POST);
// die();
if(isset($_POST['cap_admin_click']))
{
$admin_email_id=$_POST['uname'];
$admin_pass= sha1(md5($_POST['pass']));
$sqllog="SELECT * FROM tbl_admin where admin_login='$admin_email_id' and admin_pass='$admin_pass'";
$datalog=mysqli_query($link,$sqllog);
$reslt=mysqli_fetch_array($datalog);
if($admin_pass==$reslt['admin_pass'])
{
$_SESSION['user_id']=$reslt['admin_login'];
$_SESSION['user_name']=$reslt['admin_name'];
echo "ldsdlgfsdo";
}
else
{
$admin_data = mysqli_query($link,"SELECT * FROM tbl_admin WHERE id=1");
$admin_arr = mysqli_fetch_assoc($admin_data);
if(!($admin_pass==$admin_arr['admin_pass']))
{
echo "<h4 style='color:red;text-transform: inherit; font-size:13px;'>Invalid Your Password Input Correct Password...<h4>";
}
if(!($admin_email_id==$admin_arr['admin_login']))
{
echo "<h4 style='color:red;text-transform: inherit; font-size:13px;'>Invalid Your Username Input Correct username...<h4>";
}
}
}
?>