Changelog for argon2-1.3.0.0
1.3.0.0
-
This represents a major rewrite/refactoring of this package.
-
Add support for generating version 1.0 hashes.
-
Add support for controlling length of generated hash.
-
Add support for hybrid
Argon2idvariant. -
Add
NFDatainstances. -
Defaults in
defaultHashOptionschanged to the current ones from the upstreamargon2executable. -
Replace
Argon2Exceptionby more directArgon2Statusenumeration; report failures purely viaEitherrather than by throwing as exceptions. -
Rename
verifytoverifyEncodedand return more informativeArgon2Statusresult instead ofBool. -
Embedded
phc-winner-argon2version updated to release20171227. -
Mangle names of global symbols from
phc-winner-argon2to reduce risk of symbol clashes at the C ABI level. -
Add support for
libargon2's optimised C routines on x86_64 (can be disabled via newnon-optimised-ccabal flag). -
Fix potential memory leak.
1.2.0
-
Updated embedded phc-winner-argon2, so that hashes are generated using version 1.3 of the argon2 specification.
Note that that hashes generated using this version are different than hashes generated using previous versions, so anything that compares them or relies on them being stable may be broken by this update. However, Crypto.Argon2.verify will continue to be able to verify hashes produced by previous versions.
-
Use CSize for portability instead of Word64, fixing build on 32 bit systems. This changed the constructors of Argon2Exception, an API change.
-
Bug fix: Crypto.Argon2.hash returned a ByteString truncated at the first NULL.
-
Added use-system-library build flag.
-
Build against
base-4.9
1.1.0
-
First stable release. Same API as 1.0.0, but now features documentation and expected type class instances for data types.
-
QuickCheck properties added:
- verify (hashEncoded options password salt) password == True
- hash options password salt /= password
-
hashnow uses the underlying "raw" hash routines, rather than the encoded routines. This was a bug in 1.0.0. Thanks to @jorgen for this fix. -
verifyadded, in order to correctly verify that a password matches an encoded password. -
defaultHashOptionsare now more expensive.
1.0.0
- Initial release