> <?php bloginfo('name'); ?> › <?php echo $title; ?> text_direction) ) : ?>

\n"; $errors = $newerrors; } echo '
' . apply_filters('login_errors', $errors) . "
\n"; echo "

".__("Note: You must enable cookies to use this site.")."

"; } } // End of login_header() switch ($action) { case 'logout' : wp_clearcookie(); do_action('wp_logout'); $redirect_to = 'wp-login.php?loggedout=true'; if ( isset( $_REQUEST['redirect_to'] ) ) $redirect_to = $_REQUEST['redirect_to']; wp_redirect($redirect_to); exit(); break; case 'lostpassword' : case 'retrievepassword' : $user_login = ''; $user_pass = ''; if ( $_POST ) { if ( empty( $_POST['user_login'] ) ) $errors['user_login'] = __('ERROR: The username field is empty.'); if ( empty( $_POST['user_email'] ) ) $errors['user_email'] = __('ERROR: The e-mail field is empty.'); do_action('lostpassword_post'); if ( empty( $errors ) ) { $user_data = get_userdatabylogin(trim($_POST['user_login'])); // redefining user_login ensures we return the right case in the email $user_login = $user_data->user_login; $user_email = $user_data->user_email; if (!$user_email || $user_email != $_POST['user_email']) { $errors['invalidcombo'] = __('ERROR: Invalid username / e-mail combination.'); } else { do_action('retreive_password', $user_login); // Misspelled and deprecated do_action('retrieve_password', $user_login); // Generate something random for a password... md5'ing current time with a rand salt $key = substr( md5( uniqid( microtime() ) ), 0, 8); // Now insert the new pass md5'd into the db $wpdb->query("UPDATE $wpdb->users SET user_activation_key = '$key' WHERE user_login = '$user_login'"); $message = __('Someone has asked to reset the password for the following site and username.') . "\r\n\r\n"; $message .= get_option('siteurl') . "\r\n\r\n"; $message .= sprintf(__('Username: %s'), $user_login) . "\r\n\r\n"; $message .= __('To reset your password visit the following address, otherwise just ignore this email and nothing will happen.') . "\r\n\r\n"; $message .= get_option('siteurl') . "/wp-login.php?action=rp&key=$key\r\n"; if (FALSE == wp_mail($user_email, sprintf(__('[%s] Password Reset'), get_option('blogname')), $message)) { die('

' . __('The e-mail could not be sent.') . "
\n" . __('Possible reason: your host may have disabled the mail() function...') . '

'); } else { wp_redirect('wp-login.php?checkemail=confirm'); exit(); } } } } if ( 'invalidkey' == $_GET['error'] ) $errors['invalidkey'] = __('Sorry, that key does not appear to be valid.'); do_action('lost_password'); login_header(__('Lost Password'), '

' . __('Please enter your username and e-mail address. You will receive a new password via e-mail.') . '

'); ?>

get_row("SELECT * FROM $wpdb->users WHERE user_activation_key = '$key'"); if ( empty( $user ) ) { wp_redirect('wp-login.php?action=lostpassword&error=invalidkey'); exit(); } do_action('password_reset'); // Generate something random for a password... md5'ing current time with a rand salt $new_pass = substr( md5( uniqid( microtime() ) ), 0, 7); $wpdb->query("UPDATE $wpdb->users SET user_pass = MD5('$new_pass'), user_activation_key = '' WHERE user_login = '$user->user_login'"); wp_cache_delete($user->ID, 'users'); wp_cache_delete($user->user_login, 'userlogins'); $message = sprintf(__('Username: %s'), $user->user_login) . "\r\n"; $message .= sprintf(__('Password: %s'), $new_pass) . "\r\n"; $message .= get_option('siteurl') . "/wp-login.php\r\n"; if (FALSE == wp_mail($user->user_email, sprintf(__('[%s] Your new password'), get_option('blogname')), $message)) { die('

' . __('The e-mail could not be sent.') . "
\n" . __('Possible reason: your host may have disabled the mail() function...') . '

'); } else { wp_redirect('wp-login.php?checkemail=newpass'); exit(); } break; case 'auth' : $_COOKIE = array(); // Prevent redirect loops caused by corrupted cookies case 'login' : default: $user_login = ''; $user_pass = ''; $using_cookie = FALSE; if ( !isset( $_REQUEST['redirect_to'] ) || is_user_logged_in() ) $redirect_to = 'wp-admin/'; else $redirect_to = $_REQUEST['redirect_to']; if ( $_POST ) { $user_login = $_POST['log']; $user_login = sanitize_user( $user_login ); $user_pass = $_POST['pwd']; $rememberme = $_POST['rememberme']; } else { $cookie_login = wp_get_cookie_login(); if ( ! empty($cookie_login) ) { $using_cookie = true; $user_login = $cookie_login['login']; $user_pass = $cookie_login['password']; } } do_action_ref_array('wp_authenticate', array(&$user_login, &$user_pass)); if ( $user_login && $user_pass && empty( $errors ) ) { $user = new WP_User(0, $user_login); // If the user can't edit posts, send them to their profile. if ( !$user->has_cap('edit_posts') && ( empty( $redirect_to ) || $redirect_to == 'wp-admin/' ) ) $redirect_to = get_option('siteurl') . '/wp-admin/profile.php'; if ( wp_login($user_login, $user_pass, $using_cookie) ) { if ( !$using_cookie ) wp_setcookie($user_login, $user_pass, false, '', '', $rememberme); do_action('wp_login', $user_login); wp_redirect($redirect_to); exit(); } else { if ( $using_cookie ) $errors['expiredsession'] = __('Your session has expired.'); } } if ( $_POST && empty( $user_login ) ) $errors['user_login'] = __('ERROR: The username field is empty.'); if ( $_POST && empty( $user_pass ) ) $errors['user_pass'] = __('ERROR: The password field is empty.'); // Some parts of this script use the main login form to display a message if ( TRUE == $_GET['loggedout'] ) $errors['loggedout'] = __('Successfully logged you out.'); elseif ( 'disabled' == $_GET['registration'] ) $errors['registerdiabled'] = __('User registration is currently not allowed.'); elseif ( 'confirm' == $_GET['checkemail'] ) $errors['confirm'] = __('Check your e-mail for the confirmation link.'); elseif ( 'newpass' == $_GET['checkemail'] ) $errors['newpass'] = __('Check your e-mail for your new password.'); elseif ( 'registered' == $_GET['checkemail'] ) $errors['registered'] = __('Registration complete. Please check your e-mail.'); if ( ! is_user_logged_in() ) wp_clearcookie(); // Start with a clean slate login_header(__('Login')); ?>