Download the PHP package divineomega/password_exposed without Composer

On this page you can find all versions of the php package divineomega/password_exposed. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.

FAQ

After the download, you have to make one include require_once('vendor/autoload.php');. After that you have to import the classes with use statements.

Example:
If you use only one package a project is not needed. But if you use more then one package, without a project it is not possible to import the classes with use statements.

In general, it is recommended to use always a project to download your libraries. In an application normally there is more than one library needed.
Some PHP packages are not free to download and because of that hosted in private repositories. In this case some credentials are needed to access such packages. Please use the auth.json textarea to insert credentials, if a package is coming from a private repository. You can look here for more information.

  • Some hosting areas are not accessible by a terminal or SSH. Then it is not possible to use Composer.
  • To use Composer is sometimes complicated. Especially for beginners.
  • Composer needs much resources. Sometimes they are not available on a simple webspace.
  • If you are using private repositories you don't need to share your credentials. You can set up everything on our site and then you provide a simple download link to your team member.
  • Simplify your Composer build process. Use our own command line tool to download the vendor folder as binary. This makes your build process faster and you don't need to expose your credentials for private repositories.
Please rate this library. Is it a good library?

Informations about the package password_exposed

🔒 Password Exposed Helper Function

This PHP package provides a password_exposed helper function, that uses the haveibeenpwned.com API to check if a password has been exposed in a data breach.

Build Status StyleCI

Installation

The password_exposed package can be easily installed using Composer. Just run the following command from the root of your project.

If you have never used the Composer dependency manager before, head to the Composer website for more information on how to get started.

Usage

To check if a password has been exposed in a data breach, just pass it to the password_exposed method.

Here is a basic usage example:

If you prefer to avoid using helper functions, the following syntax is also available.

SHA1 Hash

You can also supply the SHA1 hash instead of the plain text password, by using the following method.

or...


All versions of password_exposed with dependencies

PHP Build Version
Package Version
Requires php Version ^7.1||^8.0
psr/http-client Version ^1.0
psr/cache Version ^1.0
psr/http-message Version ^1.0
psr/http-message-implementation Version ^1.0
psr/http-factory-implementation Version ^1.0
php-http/discovery Version ^1.6
nyholm/psr7 Version ^1.0
paragonie/certainty Version ^2.4
divineomega/do-file-cache-psr-6 Version ^2.0
divineomega/psr-18-guzzle-adapter Version ^1.0
Composer command for our command line client (download client) This client runs in each environment. You don't need a specific PHP version etc. The first 20 API calls are free. Standard composer command

The package divineomega/password_exposed contains the following files

Loading the files please wait ....