diff --git a/application/config/aauth.php b/application/config/aauth.php index 523f026..b2a7080 100644 --- a/application/config/aauth.php +++ b/application/config/aauth.php @@ -38,7 +38,7 @@ defined('BASEPATH') OR exit('No direct script access allowed'); | ['max'] Maximum char long for Password | ['min'] Minimum char long for Password | -| ['valid_chars'] Valid chars for username. Non alphanumeric characters that are allowed by default +| ['additional_valid_chars'] Additional valid chars for username. Non alphanumeric characters that are allowed by default | | ['ddos_protection'] If it is true, the user will be banned temporary when he exceed the login 'try' | @@ -95,7 +95,7 @@ $config_aauth["default"] = array( 'max' => 13, 'min' => 5, - 'valid_chars' => array(), + 'additional_valid_chars' => array(), 'ddos_protection' => true, diff --git a/application/libraries/Aauth.php b/application/libraries/Aauth.php index 63ffbd3..fb48800 100644 --- a/application/libraries/Aauth.php +++ b/application/libraries/Aauth.php @@ -723,7 +723,7 @@ class Aauth { $this->error($this->CI->lang->line('aauth_error_password_invalid')); $valid = FALSE; } - if ($name != FALSE && !ctype_alnum(str_replace($this->config_vars['valid_chars'], '', $name))){ + if ($name != FALSE && !ctype_alnum(str_replace($this->config_vars['additional_valid_chars'], '', $name))){ $this->error($this->CI->lang->line('aauth_error_username_invalid')); $valid = FALSE; } @@ -819,7 +819,7 @@ class Aauth { $this->error($this->CI->lang->line('aauth_error_update_username_exists')); $valid = FALSE; } - if ($name !='' && !ctype_alnum(str_replace($this->config_vars['valid_chars'], '', $name))){ + if ($name !='' && !ctype_alnum(str_replace($this->config_vars['additional_valid_chars'], '', $name))){ $this->error($this->CI->lang->line('aauth_error_username_invalid')); $valid = FALSE; }