@@ -135,11 +135,11 @@ function authenticate_user($user, $password, $twofa = "") {
135135 if ($ return_var > 0 ) {
136136 sleep (2 );
137137 if ($ return_var == 5 ) {
138- $ error = ' <p class="error"> ' . _ ("Account has been suspended " ) . " </p> " ;
138+ $ error = _ ("Account has been suspended " );
139139 } elseif ($ return_var == 1 ) {
140- $ error = ' <p class="error"> ' . _ ("Unsupported hash method " ) . " </p> " ;
140+ $ error = _ ("Unsupported hash method " );
141141 } else {
142- $ error = ' <p class="error"> ' . _ ("Invalid username or password " ) . " </p> " ;
142+ $ error = _ ("Invalid username or password " );
143143 }
144144 return $ error ;
145145 } else {
@@ -196,7 +196,7 @@ function authenticate_user($user, $password, $twofa = "") {
196196 // Check API answer
197197 if ($ return_var > 0 ) {
198198 sleep (2 );
199- $ error = ' <p class="error"> ' . _ ("Invalid username or password " ) . " </p> " ;
199+ $ error = _ ("Invalid username or password " );
200200 $ v_session_id = quoteshellarg ($ _POST ["token " ]);
201201 exec (
202202 HESTIA_CMD .
@@ -219,7 +219,7 @@ function authenticate_user($user, $password, $twofa = "") {
219219 unset($ output );
220220 if ($ data [$ user ]["LOGIN_DISABLED " ] === "yes " ) {
221221 sleep (2 );
222- $ error = ' <p class="error"> ' . _ ("Invalid username or password " ) . " </p> " ;
222+ $ error = _ ("Invalid username or password " );
223223 $ v_session_id = quoteshellarg ($ _POST ["token " ]);
224224 exec (
225225 HESTIA_CMD .
@@ -243,7 +243,7 @@ function authenticate_user($user, $password, $twofa = "") {
243243 $ v_login_user_allowed_ips = array_map ("trim " , $ v_login_user_allowed_ips );
244244 if (!in_array ($ ip , $ v_login_user_allowed_ips , true )) {
245245 sleep (2 );
246- $ error = ' <p class="error"> ' . _ ("Invalid username or password " ) . " </p> " ;
246+ $ error = _ ("Invalid username or password " );
247247 $ v_session_id = quoteshellarg ($ _POST ["token " ]);
248248 exec (
249249 HESTIA_CMD .
@@ -269,7 +269,7 @@ function authenticate_user($user, $password, $twofa = "") {
269269 $ output ,
270270 $ return_var ,
271271 );
272- $ error = "<p class= \"error \"> " . _ ("Invalid or missing 2FA token " ) . " </p> " ;
272+ $ error = "<p class= \"error \"> " . _ ("Invalid or missing 2FA token " );
273273 if (empty ($ twofa )) {
274274 $ _SESSION ["login " ]["username " ] = $ user ;
275275 $ _SESSION ["login " ]["password " ] = $ password ;
@@ -284,8 +284,7 @@ function authenticate_user($user, $password, $twofa = "") {
284284 unset($ output );
285285 if ($ return_var > 0 ) {
286286 sleep (2 );
287- $ error =
288- '<p class="error"> ' . _ ("Invalid or missing 2FA token " ) . "</p> " ;
287+ $ error = _ ("Invalid or missing 2FA token " );
289288 $ _SESSION ["login " ]["username " ] = $ user ;
290289 $ _SESSION ["login " ]["password " ] = $ password ;
291290 $ v_session_id = quoteshellarg ($ _POST ["token " ]);
0 commit comments