wp_validate_auth_cookie() – Validates authentication cookie.

You appear to be a bot. Output may be restricted

Description

Validates authentication cookie.

The checks include making sure that the authentication cookie is set and pulling in the contents (if $cookie is not used). Makes sure the cookie is not expired. Verifies the hash in cookie is what is should be and compares the two.

Usage

$int|false = wp_validate_auth_cookie( $cookie, $scheme );

Parameters

$cookie
( string ) optional – Optional. If used, will validate contents instead of cookie's.
$scheme
( string ) optional – Optional. The cookie scheme to use: 'auth', 'secure_auth', or 'logged_in'.

Returns

int|false User ID if valid cookie, false if invalid.

Source

File name: wordpress/wp-includes/pluggable.php
Lines:

1 to 100 of 148
  function wp_validate_auth_cookie( $cookie = '', $scheme = '' ) {
    $cookie_elements = wp_parse_auth_cookie( $cookie, $scheme );
    if ( ! $cookie_elements ) {
      
/**
 * Fires if an authentication cookie is malformed.
 *
 * @since 2.7.0
 *
 * @param string $cookie Malformed auth cookie.
 * @param string $scheme Authentication scheme. Values include 'auth', 'secure_auth',
 *                       or 'logged_in'.
 */
      do_action( 'auth_cookie_malformed', $cookie, $scheme );
      return false;
    }

    $scheme     = $cookie_elements['scheme'];
    $username   = $cookie_elements['username'];
    $hmac       = $cookie_elements['hmac'];
    $token      = $cookie_elements['token'];
    $expired    = $cookie_elements['expiration'];
    $expiration = $cookie_elements['expiration'];

    // Allow a grace period for POST and Ajax requests.
    if ( wp_doing_ajax() || 'POST' === $_SERVER['REQUEST_METHOD'] ) {
      $expired += HOUR_IN_SECONDS;
    }

    // Quick check to see if an honest cookie has expired.
    if ( $expired < time() ) {
      
/**
 * Fires once an authentication cookie has expired.
 *
 * @since 2.7.0
 *
 * @param string[] $cookie_elements {
 *     Authentication cookie components. None of the components should be assumed
 *     to be valid as they come directly from a client-provided cookie value.
 *
 *     @type string $username   User's username.
 *     @type string $expiration The time the cookie expires as a UNIX timestamp.
 *     @type string $token      User's session token used.
 *     @type string $hmac       The security hash for the cookie.
 *     @type string $scheme     The cookie scheme to use.
 * }
 */
      do_action( 'auth_cookie_expired', $cookie_elements );
      return false;
    }

    $user = get_user_by( 'login', $username );
    if ( ! $user ) {
      
/**
 * Fires if a bad username is entered in the user authentication process.
 *
 * @since 2.7.0
 *
 * @param string[] $cookie_elements {
 *     Authentication cookie components. None of the components should be assumed
 *     to be valid as they come directly from a client-provided cookie value.
 *
 *     @type string $username   User's username.
 *     @type string $expiration The time the cookie expires as a UNIX timestamp.
 *     @type string $token      User's session token used.
 *     @type string $hmac       The security hash for the cookie.
 *     @type string $scheme     The cookie scheme to use.
 * }
 */
      do_action( 'auth_cookie_bad_username', $cookie_elements );
      return false;
    }

    $pass_frag = substr( $user->user_pass, 8, 4 );

    $key = wp_hash( $username . '|' . $pass_frag . '|' . $expiration . '|' . $token, $scheme );

    // If ext/hash is not present, compat.php's hash_hmac() does not support sha256.
    $algo = function_exists( 'hash' ) ? 'sha256' : 'sha1';
    $hash = hash_hmac( $algo, $username . '|' . $expiration . '|' . $token, $key );

    if ( ! hash_equals( $hash, $hmac ) ) {
      
/**
 * Fires if a bad authentication cookie hash is encountered.
 *
 * @since 2.7.0
 *
 * @param string[] $cookie_elements {
 *     Authentication cookie components. None of the components should be assumed
 *     to be valid as they come directly from a client-provided cookie value.
 *
 *     @type string $username   User's username.
 *     @type string $expiration The time the cookie expires as a UNIX timestamp.
 *     @type string $token      User's session token used.
 *     @type string $hmac       The security hash for the cookie.
 *     @type string $scheme     The cookie scheme to use.
 * }
 */
      do_action( 'auth_cookie_bad_hash', $cookie_elements );
      return false;
    }
 

 View on GitHub View on Trac