* @output wp-admin/js/password-strength-meter.js
window.wp = window.wp || {};
sprintf = wp.i18n.sprintf;
* Contains functions to determine the password strength.
* Determines the strength of a given password.
* Compares first password to the password confirmation.
* @param {string} password1 The subject password.
* @param {Array} disallowedList An array of words that will lower the entropy of
* @param {string} password2 The password confirmation.
* @return {number} The password strength score.
meter : function( password1, disallowedList, password2 ) {
if ( ! Array.isArray( disallowedList ) )
disallowedList = [ disallowedList.toString() ];
if (password1 != password2 && password2 && password2.length > 0)
if ( 'undefined' === typeof window.zxcvbn ) {
// Password strength unknown.
var result = zxcvbn( password1, disallowedList );
* Builds an array of words that should be penalized.
* Certain words need to be penalized because it would lower the entropy of a
* password if they were used. The disallowedList is based on user input fields such
* as username, first name, email etc.
* @deprecated 5.5.0 Use {@see 'userInputDisallowedList()'} instead.
* @return {string[]} The array of words to be disallowed.
userInputBlacklist : function() {
/* translators: 1: Deprecated function name, 2: Version number, 3: Alternative function name. */
__( '%1$s is deprecated since version %2$s! Use %3$s instead. Please consider writing more inclusive code.' ),
'wp.passwordStrength.userInputBlacklist()',
'wp.passwordStrength.userInputDisallowedList()'
return wp.passwordStrength.userInputDisallowedList();
* Builds an array of words that should be penalized.
* Certain words need to be penalized because it would lower the entropy of a
* password if they were used. The disallowed list is based on user input fields such
* as username, first name, email etc.
* @return {string[]} The array of words to be disallowed.
userInputDisallowedList : function() {
var i, userInputFieldsLength, rawValuesLength, currentField,
userInputFields = [ 'user_login', 'first_name', 'last_name', 'nickname', 'display_name', 'email', 'url', 'description', 'weblog_title', 'admin_email' ];
// Collect all the strings we want to disallow.
rawValues.push( document.title );
rawValues.push( document.URL );
userInputFieldsLength = userInputFields.length;
for ( i = 0; i < userInputFieldsLength; i++ ) {
currentField = $( '#' + userInputFields[ i ] );
if ( 0 === currentField.length ) {
rawValues.push( currentField[0].defaultValue );
rawValues.push( currentField.val() );
* Strip out non-alphanumeric characters and convert each word to an
rawValuesLength = rawValues.length;
for ( i = 0; i < rawValuesLength; i++ ) {
disallowedList = disallowedList.concat( rawValues[ i ].replace( /\W/g, ' ' ).split( ' ' ) );
* Remove empty values, short words and duplicates. Short words are likely to
* cause many false positives.
disallowedList = $.grep( disallowedList, function( value, key ) {
if ( '' === value || 4 > value.length ) {
return $.inArray( value, disallowedList ) === key;
// Backward compatibility.
* Password strength meter function.
* @deprecated 3.7.0 Use wp.passwordStrength.meter instead.
* @type {wp.passwordStrength.meter}
window.passwordStrength = wp.passwordStrength.meter;