Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: sanitize_file_name

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

This hook occurs 2 times in this file.

Line Code
943      if ( count( $parts ) <= 2 ) {
944           /**
945            * Filter a sanitized filename string.
946            *
947            * @since 2.8.0
948            *
949            * @param string $filename     Sanitized filename.
950            * @param string $filename_raw The filename prior to sanitization.
951            */
952           return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
953      }
954
955      // Process multiple extensions
956      $filename = array_shift($parts);
957      $extension = array_pop($parts);
958      $mimes = get_allowed_mime_types();
959
960      /*
961       * Loop over any intermediate extensions. Postfix them with a trailing underscore
 
Line Code
973                          break;
974                     }
975                }
976                if ( !$allowed )
977                     $filename .= '_';
978           }
979      }
980      $filename .= '.' . $extension;
981      /** This filter is documented in wp-includes/formatting.php */
982      return apply_filters('sanitize_file_name', $filename, $filename_raw);
983 }
984
985 /**
986  * Sanitizes a username, stripping out unsafe characters.
987  *
988  * Removes tags, octets, entities, and if strict is enabled, will only keep
989  * alphanumeric, _, space, ., -, @. After sanitizing, it passes the username,
990  * raw username (the username in the parameter), and the value of $strict as
991  * parameters for the 'sanitize_user' filter.