![]() Server : Apache/2 System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64 User : gositeme ( 1004) PHP Version : 8.2.29 Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname Directory : /home/gositeme/domains/lavocat.ca/public_html/node_modules/cookie-signature/ |
1.2.2 / 2024-10-29 ================== * various metadata/documentation tweaks (incl. #51) 1.2.1 / 2023-02-27 ================== * update annotations for allowed secret key types (#44, thanks @jyasskin!) 1.2.0 / 2022-02-17 ================== * allow buffer and other node-supported types as key (#33) * be pickier about extra content after signed portion (#40) * some internal code clarity/cleanup improvements (#26) 1.1.0 / 2018-01-18 ================== * switch to built-in `crypto.timingSafeEqual` for validation instead of previous double-hash method (thank you @jodevsa!) 1.0.7 / 2023-04-12 ================== Later release for older node.js versions. See the [v1.0.x branch notes](https://github.com/tj/node-cookie-signature/blob/v1.0.x/History.md#107--2023-04-12). 1.0.6 / 2015-02-03 ================== * use `npm test` instead of `make test` to run tests * clearer assertion messages when checking input 1.0.5 / 2014-09-05 ================== * add license to package.json 1.0.4 / 2014-06-25 ================== * corrected avoidance of timing attacks (thanks @tenbits!) 1.0.3 / 2014-01-28 ================== * [incorrect] fix for timing attacks 1.0.2 / 2014-01-28 ================== * fix missing repository warning * fix typo in test 1.0.1 / 2013-04-15 ================== * Revert "Changed underlying HMAC algo. to sha512." * Revert "Fix for timing attacks on MAC verification." 0.0.1 / 2010-01-03 ================== * Initial release