auth_cookie_bad_username
Fires if a bad username is entered in the user authentication process.
Usage
add_action( 'auth_cookie_bad_username', 'wp_kama_auth_cookie_bad_username_action' ); /** * Function for `auth_cookie_bad_username` action-hook. * * @param string[] $cookie_elements Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value. * * @return void */ function wp_kama_auth_cookie_bad_username_action( $cookie_elements ){ // action... }
- $cookie_elements(string[])
Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value.
-
username(string)
User's username. -
expiration(string)
The time the cookie expires as a UNIX timestamp. -
token(string)
User's session token used. -
hmac(string)
The security hash for the cookie. - scheme(string)
The cookie scheme to use.
-
Changelog
Since 2.7.0 | Introduced. |
Where the hook is called
auth_cookie_bad_username
wp-includes/pluggable.php 761
do_action( 'auth_cookie_bad_username', $cookie_elements );
Where the hook is used in WordPress
wp-includes/default-filters.php 324
add_action( 'auth_cookie_bad_username', 'rest_cookie_collect_status' );