Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: auth_cookie_bad_username

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

Line Code
656      $user = get_user_by('login', $username);
657      if ( ! $user ) {
658           /**
659            * Fires if a bad username is entered in the user authentication process.
660            *
661            * @since 2.7.0
662            *
663            * @param array $cookie_elements An array of data for the authentication cookie.
664            */
665           do_action( 'auth_cookie_bad_username', $cookie_elements );
666           return false;
667      }
668
669      $pass_frag = substr($user->user_pass, 8, 4);
670
671      $key = wp_hash( $username . '|' . $pass_frag . '|' . $expiration . '|' . $token, $scheme );
672      $hash = hash_hmac( 'sha256', $username . '|' . $expiration . '|' . $token, $key );
673
674      if ( ! hash_equals( $hash, $hmac ) ) {