auth_cookie_bad_username action-hookWP 2.7.0

Fires if a bad username is entered in the user authentication process.

Usage

add_action( 'auth_cookie_bad_username', 'wp_kama_auth_cookie_bad_username_action' );

/**
 * Function for `auth_cookie_bad_username` action-hook.
 * 
 * @param string[] $cookie_elements Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value.
 *
 * @return void
 */
function wp_kama_auth_cookie_bad_username_action( $cookie_elements ){

	// action...
}
$cookie_elements(string[])

Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value.

  • username(string)
    User's username.

  • expiration(string)
    The time the cookie expires as a UNIX timestamp.

  • token(string)
    User's session token used.

  • hmac(string)
    The security hash for the cookie.

  • scheme(string)
    The cookie scheme to use.

Changelog

Since 2.7.0 Introduced.

Where the hook is called

wp_validate_auth_cookie()
auth_cookie_bad_username
wp-includes/pluggable.php 761
do_action( 'auth_cookie_bad_username', $cookie_elements );

Where the hook is used in WordPress

wp-includes/default-filters.php 324
add_action( 'auth_cookie_bad_username', 'rest_cookie_collect_status' );