Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: auth_cookie_bad_username

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

Line Code
746                 *     to be valid as they come directly from a client-provided cookie value.
747                 *
748                 *     @type string $username   User's username.
749                 *     @type string $expiration The time the cookie expires as a UNIX timestamp.
750                 *     @type string $token      User's session token used.
751                 *     @type string $hmac       The security hash for the cookie.
752                 *     @type string $scheme     The cookie scheme to use.
753                 * }
754                 */
755                do_action( 'auth_cookie_bad_username', $cookie_elements );
756                return false;
757           }
758
759           $pass_frag = substr( $user->user_pass, 8, 4 );
760
761           $key = wp_hash( $username . '|' . $pass_frag . '|' . $expiration . '|' . $token, $scheme );
762
763           // If ext/hash is not present, compat.php's hash_hmac() does not support sha256.
764           $algo = function_exists( 'hash' ) ? 'sha256' : 'sha1';