WP hooks navigation: Home/browse • Actions index • Filters index
To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).
The best way to understand what a hook does is to look at where it occurs in the source code.
do_action( "hook_name" )apply_filters( "hook_name", "what_to_filter" ).Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.
| Line | Code |
|---|---|
| 759 | * to be valid as they come directly from a client-provided cookie value. |
| 760 | * |
| 761 | * @type string $username User's username. |
| 762 | * @type string $expiration The time the cookie expires as a UNIX timestamp. |
| 763 | * @type string $token User's session token used. |
| 764 | * @type string $hmac The security hash for the cookie. |
| 765 | * @type string $scheme The cookie scheme to use. |
| 766 | * } |
| 767 | */ |
| 768 | do_action( 'auth_cookie_bad_username', $cookie_elements ); |
| 769 | return false; |
| 770 | } |
| 771 | |
| 772 | if ( str_starts_with( $user->user_pass, '$P$' ) || str_starts_with( $user->user_pass, '$2y$' ) ) { |
| 773 | // Retain previous behaviour of phpass or vanilla bcrypt hashed passwords. |
| 774 | $pass_frag = substr( $user->user_pass, 8, 4 ); |
| 775 | } else { |
| 776 | // Otherwise, use a substring from the end of the hash to avoid dealing with potentially long hash prefixes. |
| 777 | $pass_frag = substr( $user->user_pass, -4 ); |