- Update
node-pre-gyp
to 1.0.0
- Fix the bcrypt "wrap-around" bug. It affects passwords with lengths >= 255. It is uncommon but it's a bug nevertheless. Previous attempts to fix the bug was unsuccessful.
- Experimental support for z/OS
- Fix a bug related to NUL in password input
- Update
node-pre-gyp
to 0.15.0
- Fix compilation errors in Alpine linux
- Switch to NAPI bcrypt
- Drop support for NodeJS 8
- Update
node-pre-gyp
to 0.14 - Pre-built binaries for NodeJS 13
- Update
nan
to 2.14.0 - Update
node-pre-gyp
to 0.13
- Update
nan
to 2.13.2
- Update
nan
to 2.13.1 - NodeJS 12 compatibility
- Remove
node-pre-gyp
from bundled dependencies
- Sync N-API bcrypt with NAN bcrypt
- Fix GCC, NAN and V8 deprecation warnings
- Update
nan
to 2.12.1
- Update
nan
to 2.11.1
- Update
nan
to 2.11.0
- Drop support for NodeJS <= 4
- Update
node-pre-gyp
to allow downloading prebuilt modules
- Make
2b
the default bcrypt version
- Initial support for N-API
- update to nan v2.6.2 for NodeJS 8 support
- Fix: use npm scripts instead of node-gyp directly.
- Fix
compare
promise rejection with invalid arguments
- Fix destructuring imports with promises
- add Promise support (commit 2488473)
- update nan to 2.3.5 for improved node v6 support
- update nan for node v6 support
- update to nan v2 (adds support for iojs 3)
- fix deprecation warning for the Encode API
- update nan to 1.8.4 for iojs 2.x support
- always use callback for generating random bytes to avoid blocking
- update NaN to 1.5.0 for iojs support
- migrate to NAN for bindings
- Fix for issue around empty string params throwing Errors.
- Method deprecation.
- Upgrade from libeio/ev to libuv. (shtylman) ** --- NOTE --- Breaks 0.4.x compatability
- EV_MULTIPLICITY compile flag.
- Thread safety fix around OpenSSL (GH-32). (bnoordhuis - through node)
- C++ code changes using delete and new instead of malloc and free. (shtylman)
- Compile options for speed, zoom. (shtylman)
- Move much of the type and variable checking to the JS. (shtylman)
- Added getRounds function that will tell you the number of rounds within a hash/salt
- Fix api issue with async salt gen first param
- Compile under node 0.5.x
- Internal Refactoring
- Remove pthread dependencies and locking
- Fix compiler warnings and a memory bug
- Use threadsafe functions instead of pthread mutexes
- salt validation to make sure the salt is of the correct size and format
- cygwin support
- Remove dependency on libbsd, use libssl instead
- Added async functionality
- API changes
- hashpw -> encrypt
- all old sync methods now end with _sync
- Removed libbsd(arc4random) dependency...now uses openssl which is more widely spread
- Security fix. Wasn't reading rounds in properly and was always only using 4 rounds