All Versions
Latest Version
Avg Release Cycle
88 days
Latest Release
479 days ago

Changelog History
Page 3

  • v1.7.0 Changes

    March 01, 2016
    • โœจ Enhancements

      • Add support for libdecaf NIF which provides support for;
      • Ed25519
      • Ed25519ph
      • Ed448
      • Ed448ph
      • X25519
      • X448
    • ๐Ÿ›  Fixes

      • Return 56 bytes instead of 57 bytes when converting between edwards448 and curve448.
      • EdDSA related refactoring/cleanup.
  • v1.6.1 Changes

    February 05, 2016
    • โœจ Enhancements
      • Add support for NIF version of keccakf1600 library with jose_sha3_keccakf1600_nif (version 2 and up) for even faster SHA-3 operations.
  • v1.6.0 Changes

    January 20, 2016
    • โœจ Enhancements

      • Add Ed448 and Ed448ph standards from draft-irtf-cfrg-eddsa.
      • Add support for keccakf1600 library with jose_sha3_keccakf1600 for faster SHA-3 operations.
      • Many, many more tests.
    • ๐Ÿ›  Fixes

      • Fix pure Erlang implementation of SHA-3 algorithms.
  • v1.5.2 Changes

    January 19, 2016
    • โœจ Enhancements

      • Documentation of the encryption algorithms, specifically JOSE.JWE.
    • ๐Ÿ›  Fixes

      • Corrected optional callbacks issue for Elixir.
      • More consistent behavior for ECDH related encryption and decryption.
  • v1.5.1 Changes

    January 16, 2016
    • ๐Ÿ›  Fixes
      • Corrected formatting on some of the documentation.
      • Fixed optional callbacks for jose_jwk_kty:sign/3
  • v1.5.0 Changes

    January 16, 2016
    • โœจ Enhancements
      • Support OKP key type with the following curves:
      • Ed25519 (external libsodium or fallback supported)
      • Ed25519ph (external libsodium or fallback supported)
      • X25519 (external libsodium or fallback supported)
      • Ed448 (no external, no fallback)
      • Ed448ph (no external, no fallback)
      • X448 (no external, but fallback supported)
      • Support SHA-3 functions for future use with Ed448 and Ed448ph.
      • Add jose_jwk:shared_secret/2 for computing the shared secret between two EC or OKP keys.
  • v1.4.2 Changes

    November 30, 2015
    • โœจ Enhancements

      • Support PKCS#8 formatted private key PEM files. See #13
    • ๐Ÿ›  Fixes

      • Add missing guards in jose_jws:sign/4 #11
      • Add missing guards in jose_jwe:block_encrypt/5
  • v1.4.1 Changes

    November 18, 2015
    • โœจ Enhancements

      • Added JOSE.JWS.peek_signature/1 for inspecting the signature parts of a signed binary.
      • JOSE.JWS.compact/1 and JOSE.JWS.expand/1 now work with signed lists.
      • First pass at documenting all of the major JOSE modules. JOSE.JWE still needs more examples. Closes #7
    • ๐Ÿ›  Fixes

      • Fix infinite loop on JOSE.JWE.key_decrypt/3 when no "enc" has been specified.
      • Fix various functions on JOSE.JWE that would fail due to JOSE.JWE.from_record/1 on wrong terms.
  • v1.4.0 Changes

    November 17, 2015
    • โœจ Enhancements
      • Added JOSE.unsecured_signing/0 and JOSE.unsecured_signing/1 for disabling the "none" algorithm due to the unsecured signing vulnerability and in relation to #10
      • Added JOSE.JWK.verify_strict/3, JOSE.JWS.verify_strict/3, and JOSE.JWT.verify_strict/3 for whitelisting which signing algorithms are allowed for verification.
      • Added JOSE.JWT.peek_payload/1 and JOSE.JWT.peek_protected/1 for inspecting the payload and protected parts of a signature.
  • v1.3.0 Changes

    September 22, 2015
    • โœจ Enhancements

      • oct key management (see JOSE.JWK.from_oct/1,2)
      • Key generation functions for EC, RSA, and oct keys (see JOSE.JWK.generate_key/1)
      • Add JOSE.JWK.box_encrypt/2 which generates an ephemeral private key based on the given key curve.
      • Add support for detecting OTP version 18 and up with optional_callbacks.
      • Document key generation under examples/
      • jiffy and jsone JSON support
      • Begin documenting the Elixir API (thanks to #8)
      • Add support for jose_jws:peek/1 and jose_jwt:peek/1
      • Preparations for future upstream OTP crypto changes.
      • Improved detection of AES CBC, ECB, and GCM support.
      • Improved detection of RSAES-OAEP, RSAES-PKCS1-v1_5, RSASSA-PKCS1-v1_5, and RSASSA-PSS support.
      • Implemented fallback RSAES-PKCS1-v1_5 and RSASSA-PKCS1-v1_5 algorithms.
      • Improved selection of encryptor for oct keys.
      • Improved algorithm support detection for jose_jwa.
    • ๐Ÿ›  Fixes

    • โœ… Tests

      • Only run 1 in 10 for AES GCM and 1 in 5 for AES KW CAVP test vectors to speed up tests.
      • Additional tests for RSAES-PKCS1-v1_5 and RSASSA-PKCS1-v1_5 algorithms.