Releases: DivineOmega/password_exposed
Releases · DivineOmega/password_exposed
v3.2.0
- Added support for PHP 8. Thanks @jameswilddev.
v3.1.1
- Update minimum version of
symfony/cache
(see CVE-2019-18889).
v3.1.0
- Force use of Certainty v2.4.x (defaults to a 5 second HTTP timeout).
- Retrieval of the Certainty bundle will now make the first attempt against the replica Chronicle, not the primary.
v3.0.1
v3.0.0
- Dropped support for PHP 5.6, 7.0 and HHVM. PHP 7.1 or above is now required.
- Added support for using a custom PSR-6 caching library and PSR-18 HTTP client.
- Added additional
password_is_exposed
andpassword_is_exposed_by_hash
helper functions which return a boolean that represents if a password has been exposed in a data breach, or null in case of error.
Special thanks to @nicklog for his work on this major release.
v2.8.0
- Add a
password_exposed_by_hash($hash)
helper function to check if a password is exposed based on its SHA1 hash.
v2.7.0
- Allow Certainty v2+.
v2.6.0
- Add
passwordExposedByHash
method to check for password exposure by SHA1 hash.
v2.5.5
- Improvements to unit tests.
v2.5.4
- Fix compatibility with Windows and platforms that do not have a native
/tmp/
directory.