View Source Changelog

v2.1.0 (2024-05-02)

  • Use System.os_time/1 as the token signing date, since tokens are meant to be shared across machines

v2.0.0 (2023-10-06)

  • Update Elixir requirement to v1.11+ and require Erlang/OTP 23.
  • Encryption now uses XChaCha20-Poly1305, which is safer, faster, and generates smaller payloads. This means data encrypted with Plug.Crypto v2.0 cannot be decrypted on Plug.Crypto v1.x. However, Plug.Crypto v2.0 can still decrypt data from Plug.Crypto v1.0.
  • Optimize secure_compare, masked_compare, and key generator algorithms by relying on :crypto code when using more recent Erlang/OTP versions.

v1.2.5 (2023-03-10)

  • Allow AAD to be given as iolist

v1.2.4 (2023-03-10)

  • Allow AAD to be given as argument on message encryptor

v1.2.3 (2022-08-19)

  • Remove warnings on Elixir v1.14

v1.2.2 (2021-03-25)

  • Remove warnings on Elixir v1.12

v1.2.1 (2021-02-17)

  • Add support for Erlang/OTP 24

v1.2.0 (2020-10-07)

  • Update Elixir requirement to Elixir 1.7+.
  • Fixed a bug that allowed to sign and encrypt stuff with nil secret key base and salt.

v1.1.2 (2020-02-16)

  • Do not key derive empty salts (default to no salt instead).

v1.1.1 (2020-02-14)

  • Do not expose encryption with salt API.
  • Allow default :max_age to be set when signing/encrypting.

v1.1.0 (2020-02-11)

  • Add high-level Plug.Crypto.sign/verify and Plug.Crypto.encrypt/decrypt.

v1.0.0 (2018-10-03)