Skip to content

Releases: DivineOmega/password_exposed

v3.2.0

20 Apr 09:35
327f93e
Compare
Choose a tag to compare

v3.1.1

06 Dec 11:40
4ae85ce
Compare
Choose a tag to compare

v3.1.0

27 Sep 09:58
6ad5613
Compare
Choose a tag to compare
  • Force use of Certainty v2.4.x (defaults to a 5 second HTTP timeout).
  • Retrieval of the Certainty bundle will now make the first attempt against the replica Chronicle, not the primary.

v3.0.1

20 Feb 12:29
3f000ed
Compare
Choose a tag to compare
  • Fix Laravel 5.7 incompatibility (#25).

v3.0.0

04 Feb 22:58
Compare
Choose a tag to compare
  • Dropped support for PHP 5.6, 7.0 and HHVM. PHP 7.1 or above is now required.
  • Added support for using a custom PSR-6 caching library and PSR-18 HTTP client.
  • Added additional password_is_exposed and password_is_exposed_by_hash helper functions which return a boolean that represents if a password has been exposed in a data breach, or null in case of error.

Special thanks to @nicklog for his work on this major release.

v2.8.0

25 Jan 12:03
908ed8e
Compare
Choose a tag to compare
  • Add a password_exposed_by_hash($hash) helper function to check if a password is exposed based on its SHA1 hash.

v2.7.0

14 Dec 23:48
6050ee1
Compare
Choose a tag to compare
  • Allow Certainty v2+.

v2.6.0

06 Dec 12:31
cc48b59
Compare
Choose a tag to compare
  • Add passwordExposedByHash method to check for password exposure by SHA1 hash.

v2.5.5

09 Oct 11:19
3d63dd6
Compare
Choose a tag to compare
  • Improvements to unit tests.

v2.5.4

05 Oct 11:18
43b61d6
Compare
Choose a tag to compare
  • Fix compatibility with Windows and platforms that do not have a native /tmp/ directory.