<?php
session_start();
include('admin/config/dbcon.php');

if(isset($_POST['register_btn']))
{
    $fname= mysqli_real_escape_string($con, $_POST['fname']);
    $lname= mysqli_real_escape_string($con, $_POST['lname']);
    $email= mysqli_real_escape_string($con, $_POST['email']);
    $password= mysqli_real_escape_string($con, $_POST['password']);
     
    $confirm_password= mysqli_real_escape_string($con, $_POST['cpassword']);
    $hash = password_hash($_POST['password'], PASSWORD_DEFAULT); 
    $chash = password_hash($_POST['cpassword'], PASSWORD_DEFAULT);  
        if($password == $confirm_password)
        {
            $checkemail = "SELECT email FROM users WHERE email= '$email'";
            $checkemail_num = mysqli_query($con, $checkemail);

                if(mysqli_num_rows($checkemail_num) > 0)
                {
                    //Already Email Exists
                    $_SESSION['message'] = "Email Already Exist";
                    header("Location: register.php");
                    exit(0); 
                } else{
                    $user_query = "INSERT INTO users (fname, lname, email, password) VALUES ('$fname', '$lname', '$email', '$hash')";
                    $user_query_run = mysqli_query($con, $user_query);

                        if($user_query_run){
                            $_SESSION['message'] = "Registered Successfully";
                            header("Location: login.php");
                            exit(0); 
                        }else{
                            $_SESSION['message'] =  "Something Went Wrong";
                            header("Location: register.php");
                            exit(0); 
                        }
                }


        }else{
            $_SESSION['message'] = "Password & Confirm Password does not match";
            header("Location: register.php");
            exit(0);
        }

}else{

header("Location: register.php");
exit();
}

?>