Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package perl-Authen-Passphrase for
openSUSE:Factory checked in at 2026-05-18 17:57:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-Authen-Passphrase (Old)
and /work/SRC/openSUSE:Factory/.perl-Authen-Passphrase.new.1966 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "perl-Authen-Passphrase"
Mon May 18 17:57:58 2026 rev:3 rq:1353849 version:0.9.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/perl-Authen-Passphrase/perl-Authen-Passphrase.changes
2025-06-03 19:11:12.771098300 +0200
+++
/work/SRC/openSUSE:Factory/.perl-Authen-Passphrase.new.1966/perl-Authen-Passphrase.changes
2026-05-18 17:57:59.741077039 +0200
@@ -1,0 +2,11 @@
+Thu Apr 16 07:04:24 UTC 2026 - Tina Müller <[email protected]>
+
+- updated to 0.9.0 (0.009)
+ see /usr/share/doc/packages/perl-Authen-Passphrase/Changes
+
+ version 0.009; 2026-04-15
+ * Mark module as deprecated
+ * Switch from Data::Entropy to Crypt::SysRandom
+ * Fix various documentation issues.
+
+-------------------------------------------------------------------
Old:
----
Authen-Passphrase-0.008.tar.gz
New:
----
Authen-Passphrase-0.009.tar.gz
README.md
_scmsync.obsinfo
build.specials.obscpio
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ perl-Authen-Passphrase.spec ++++++
--- /var/tmp/diff_new_pack.JXj5Cl/_old 2026-05-18 17:58:00.689116294 +0200
+++ /var/tmp/diff_new_pack.JXj5Cl/_new 2026-05-18 17:58:00.689116294 +0200
@@ -1,7 +1,7 @@
#
# spec file for package perl-Authen-Passphrase
#
-# Copyright (c) 2025 SUSE LLC
+# Copyright (c) 2026 SUSE LLC and contributors
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -18,14 +18,15 @@
%define cpan_name Authen-Passphrase
Name: perl-Authen-Passphrase
-Version: 0.8.0
+Version: 0.9.0
Release: 0
-# 0.008 -> normalize -> 0.8.0
-%define cpan_version 0.008
+# 0.009 -> normalize -> 0.9.0
+%define cpan_version 0.009
License: Artistic-1.0 OR GPL-1.0-or-later
Summary: Hashed passwords/passphrases as objects
URL: https://metacpan.org/release/%{cpan_name}
-Source0:
https://cpan.metacpan.org/authors/id/Z/ZE/ZEFRAM/%{cpan_name}-%{cpan_version}.tar.gz
+Source0:
https://cpan.metacpan.org/authors/id/L/LE/LEONT/%{cpan_name}-%{cpan_version}.tar.gz
+Source100: README.md
BuildArch: noarch
BuildRequires: perl
BuildRequires: perl-macros
@@ -34,9 +35,9 @@
BuildRequires: perl(Crypt::Eksblowfish::Bcrypt) >= 0.8
BuildRequires: perl(Crypt::Eksblowfish::Uklblowfish) >= 0.8
BuildRequires: perl(Crypt::MySQL) >= 0.30
-BuildRequires: perl(Crypt::PasswdMD5) >= 1.0.0
+BuildRequires: perl(Crypt::PasswdMD5) >= 1.0
+BuildRequires: perl(Crypt::SysRandom)
BuildRequires: perl(Crypt::UnixCrypt_XS) >= 0.80
-BuildRequires: perl(Data::Entropy::Algorithms)
BuildRequires: perl(Digest::MD4) >= 1.200
BuildRequires: perl(Digest::SHA)
BuildRequires: perl(Module::Build)
@@ -48,9 +49,9 @@
Requires: perl(Crypt::Eksblowfish::Bcrypt) >= 0.8
Requires: perl(Crypt::Eksblowfish::Uklblowfish) >= 0.8
Requires: perl(Crypt::MySQL) >= 0.30
-Requires: perl(Crypt::PasswdMD5) >= 1.0.0
+Requires: perl(Crypt::PasswdMD5) >= 1.0
+Requires: perl(Crypt::SysRandom)
Requires: perl(Crypt::UnixCrypt_XS) >= 0.80
-Requires: perl(Data::Entropy::Algorithms)
Requires: perl(Digest::MD4) >= 1.200
Requires: perl(Digest::SHA)
Requires: perl(Module::Runtime) >= 0.11
@@ -79,6 +80,10 @@
%{perl_requires}
%description
+*THIS MODULE IS DEPRECATED*. For a module that's more extensible, and less
+held-back by legacy algorithms, you may want to use Crypt::Passphrase
+instead.
+
This is the base class for a system of objects that encapsulate
passphrases. An object of this type is a passphrase recogniser: its job is
to recognise whether an offered passphrase is the right one. For security,
++++++ Authen-Passphrase-0.008.tar.gz -> Authen-Passphrase-0.009.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/Build.PL
new/Authen-Passphrase-0.009/Build.PL
--- old/Authen-Passphrase-0.008/Build.PL 2012-02-04 15:06:54.000000000
+0100
+++ new/Authen-Passphrase-0.009/Build.PL 2026-04-15 21:16:50.000000000
+0200
@@ -1,4 +1,4 @@
-{ use 5.006; }
+use 5.006;
use warnings;
use strict;
@@ -29,8 +29,8 @@
"Crypt::Eksblowfish::Uklblowfish" => "0.008",
"Crypt::MySQL" => "0.03",
"Crypt::PasswdMD5" => "1.0",
+ "Crypt::SysRandom" => 0,
"Crypt::UnixCrypt_XS" => "0.08",
- "Data::Entropy::Algorithms" => 0,
"Digest" => "1.00",
"Digest::MD4" => "1.2",
"Digest::MD5" => "1.9953",
@@ -44,9 +44,18 @@
"warnings" => 0,
},
dynamic_config => 0,
- meta_add => { distribution_type => "module" },
- create_makefile_pl => "passthrough",
- sign => 1,
+ meta_merge => {
+ x_deprecated => 1,
+ "meta-spec" => {
+ "version" => 2,
+ },
+ resources => {
+ repository => {
+ type => "git",
+ web =>
"https://github.com/Leont/authen-passphrase",
+ },
+ },
+ },
)->create_build_script;
1;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/Changes
new/Authen-Passphrase-0.009/Changes
--- old/Authen-Passphrase-0.008/Changes 2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/Changes 2026-04-15 21:16:50.000000000 +0200
@@ -1,3 +1,11 @@
+version 0.009; 2026-04-15
+
+ * Mark module as deprecated
+
+ * Switch from Data::Entropy to Crypt::SysRandom
+
+ * Fix various documentation issues.
+
version 0.008; 2012-02-04
* bugfix: avoid passing magic variables $1 et al into functions where
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/MANIFEST
new/Authen-Passphrase-0.009/MANIFEST
--- old/Authen-Passphrase-0.008/MANIFEST 2012-02-04 15:06:54.000000000
+0100
+++ new/Authen-Passphrase-0.009/MANIFEST 2026-04-15 21:16:50.000000000
+0200
@@ -49,4 +49,3 @@
t/ssha.t
t/traddescrypt.t
t/vmspurdy.t
-SIGNATURE Added here by Module::Build
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/META.json
new/Authen-Passphrase-0.009/META.json
--- old/Authen-Passphrase-0.008/META.json 2012-02-04 15:06:54.000000000
+0100
+++ new/Authen-Passphrase-0.009/META.json 2026-04-15 21:16:50.000000000
+0200
@@ -4,142 +4,148 @@
"Andrew Main (Zefram) <[email protected]>"
],
"dynamic_config" : 0,
- "generated_by" : "Module::Build version 0.38, CPAN::Meta::Converter version
2.112621",
+ "generated_by" : "Module::Build version 0.4234",
"license" : [
"perl_5"
],
"meta-spec" : {
"url" : "http://search.cpan.org/perldoc?CPAN::Meta::Spec",
- "version" : "2"
+ "version" : 2
},
"name" : "Authen-Passphrase",
"prereqs" : {
"build" : {
"requires" : {
"MIME::Base64" : "2.21",
- "Module::Build" : 0,
- "Test::More" : 0,
+ "Module::Build" : "0",
+ "Test::More" : "0",
"perl" : "5.006",
- "strict" : 0,
- "warnings" : 0
+ "strict" : "0",
+ "warnings" : "0"
}
},
"configure" : {
"requires" : {
- "Module::Build" : 0,
+ "Module::Build" : "0",
"perl" : "5.006",
- "strict" : 0,
- "warnings" : 0
+ "strict" : "0",
+ "warnings" : "0"
}
},
"runtime" : {
"requires" : {
"Authen::DecHpwd" : "2.003",
- "Carp" : 0,
- "Crypt::DES" : 0,
+ "Carp" : "0",
+ "Crypt::DES" : "0",
"Crypt::Eksblowfish::Bcrypt" : "0.008",
"Crypt::Eksblowfish::Uklblowfish" : "0.008",
"Crypt::MySQL" : "0.03",
"Crypt::PasswdMD5" : "1.0",
+ "Crypt::SysRandom" : "0",
"Crypt::UnixCrypt_XS" : "0.08",
- "Data::Entropy::Algorithms" : 0,
"Digest" : "1.00",
"Digest::MD4" : "1.2",
"Digest::MD5" : "1.9953",
- "Digest::SHA" : 0,
+ "Digest::SHA" : "0",
"MIME::Base64" : "2.21",
"Module::Runtime" : "0.011",
- "Params::Classify" : 0,
- "parent" : 0,
+ "Params::Classify" : "0",
+ "parent" : "0",
"perl" : "5.006",
- "strict" : 0,
- "warnings" : 0
+ "strict" : "0",
+ "warnings" : "0"
}
}
},
"provides" : {
"Authen::Passphrase" : {
"file" : "lib/Authen/Passphrase.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::AcceptAll" : {
"file" : "lib/Authen/Passphrase/AcceptAll.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::BigCrypt" : {
"file" : "lib/Authen/Passphrase/BigCrypt.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::BlowfishCrypt" : {
"file" : "lib/Authen/Passphrase/BlowfishCrypt.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::Clear" : {
"file" : "lib/Authen/Passphrase/Clear.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::Crypt16" : {
"file" : "lib/Authen/Passphrase/Crypt16.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::DESCrypt" : {
"file" : "lib/Authen/Passphrase/DESCrypt.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::EggdropBlowfish" : {
"file" : "lib/Authen/Passphrase/EggdropBlowfish.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::LANManager" : {
"file" : "lib/Authen/Passphrase/LANManager.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::LANManagerHalf" : {
"file" : "lib/Authen/Passphrase/LANManagerHalf.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::MD5Crypt" : {
"file" : "lib/Authen/Passphrase/MD5Crypt.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::MySQL323" : {
"file" : "lib/Authen/Passphrase/MySQL323.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::MySQL41" : {
"file" : "lib/Authen/Passphrase/MySQL41.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::NTHash" : {
"file" : "lib/Authen/Passphrase/NTHash.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::NetscapeMail" : {
"file" : "lib/Authen/Passphrase/NetscapeMail.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::PHPass" : {
"file" : "lib/Authen/Passphrase/PHPass.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::RejectAll" : {
"file" : "lib/Authen/Passphrase/RejectAll.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::SaltedDigest" : {
"file" : "lib/Authen/Passphrase/SaltedDigest.pm",
- "version" : "0.008"
+ "version" : "0.009"
},
"Authen::Passphrase::VMSPurdy" : {
"file" : "lib/Authen/Passphrase/VMSPurdy.pm",
- "version" : "0.008"
+ "version" : "0.009"
}
},
"release_status" : "stable",
"resources" : {
"license" : [
"http://dev.perl.org/licenses/"
- ]
+ ],
+ "repository" : {
+ "type" : "git",
+ "web" : "https://github.com/Leont/authen-passphrase"
+ }
},
- "version" : "0.008"
+ "version" : "0.009",
+ "x_deprecated" : 1,
+ "x_serialization_backend" : "JSON::PP version 4.16"
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/META.yml
new/Authen-Passphrase-0.009/META.yml
--- old/Authen-Passphrase-0.008/META.yml 2012-02-04 15:06:54.000000000
+0100
+++ new/Authen-Passphrase-0.009/META.yml 2026-04-15 21:16:50.000000000
+0200
@@ -3,103 +3,106 @@
author:
- 'Andrew Main (Zefram) <[email protected]>'
build_requires:
- MIME::Base64: 2.21
- Module::Build: 0
- Test::More: 0
- perl: 5.006
- strict: 0
- warnings: 0
+ MIME::Base64: '2.21'
+ Module::Build: '0'
+ Test::More: '0'
+ perl: '5.006'
+ strict: '0'
+ warnings: '0'
configure_requires:
- Module::Build: 0
- perl: 5.006
- strict: 0
- warnings: 0
+ Module::Build: '0'
+ perl: '5.006'
+ strict: '0'
+ warnings: '0'
dynamic_config: 0
-generated_by: 'Module::Build version 0.38, CPAN::Meta::Converter version
2.112621'
+generated_by: 'Module::Build version 0.4234, CPAN::Meta::Converter version
2.150010'
license: perl
meta-spec:
url: http://module-build.sourceforge.net/META-spec-v1.4.html
- version: 1.4
+ version: '1.4'
name: Authen-Passphrase
provides:
Authen::Passphrase:
file: lib/Authen/Passphrase.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::AcceptAll:
file: lib/Authen/Passphrase/AcceptAll.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::BigCrypt:
file: lib/Authen/Passphrase/BigCrypt.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::BlowfishCrypt:
file: lib/Authen/Passphrase/BlowfishCrypt.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::Clear:
file: lib/Authen/Passphrase/Clear.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::Crypt16:
file: lib/Authen/Passphrase/Crypt16.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::DESCrypt:
file: lib/Authen/Passphrase/DESCrypt.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::EggdropBlowfish:
file: lib/Authen/Passphrase/EggdropBlowfish.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::LANManager:
file: lib/Authen/Passphrase/LANManager.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::LANManagerHalf:
file: lib/Authen/Passphrase/LANManagerHalf.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::MD5Crypt:
file: lib/Authen/Passphrase/MD5Crypt.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::MySQL323:
file: lib/Authen/Passphrase/MySQL323.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::MySQL41:
file: lib/Authen/Passphrase/MySQL41.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::NTHash:
file: lib/Authen/Passphrase/NTHash.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::NetscapeMail:
file: lib/Authen/Passphrase/NetscapeMail.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::PHPass:
file: lib/Authen/Passphrase/PHPass.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::RejectAll:
file: lib/Authen/Passphrase/RejectAll.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::SaltedDigest:
file: lib/Authen/Passphrase/SaltedDigest.pm
- version: 0.008
+ version: '0.009'
Authen::Passphrase::VMSPurdy:
file: lib/Authen/Passphrase/VMSPurdy.pm
- version: 0.008
+ version: '0.009'
requires:
- Authen::DecHpwd: 2.003
- Carp: 0
- Crypt::DES: 0
- Crypt::Eksblowfish::Bcrypt: 0.008
- Crypt::Eksblowfish::Uklblowfish: 0.008
- Crypt::MySQL: 0.03
- Crypt::PasswdMD5: 1.0
- Crypt::UnixCrypt_XS: 0.08
- Data::Entropy::Algorithms: 0
- Digest: 1.00
- Digest::MD4: 1.2
- Digest::MD5: 1.9953
- Digest::SHA: 0
- MIME::Base64: 2.21
- Module::Runtime: 0.011
- Params::Classify: 0
- parent: 0
- perl: 5.006
- strict: 0
- warnings: 0
+ Authen::DecHpwd: '2.003'
+ Carp: '0'
+ Crypt::DES: '0'
+ Crypt::Eksblowfish::Bcrypt: '0.008'
+ Crypt::Eksblowfish::Uklblowfish: '0.008'
+ Crypt::MySQL: '0.03'
+ Crypt::PasswdMD5: '1.0'
+ Crypt::SysRandom: '0'
+ Crypt::UnixCrypt_XS: '0.08'
+ Digest: '1.00'
+ Digest::MD4: '1.2'
+ Digest::MD5: '1.9953'
+ Digest::SHA: '0'
+ MIME::Base64: '2.21'
+ Module::Runtime: '0.011'
+ Params::Classify: '0'
+ parent: '0'
+ perl: '5.006'
+ strict: '0'
+ warnings: '0'
resources:
license: http://dev.perl.org/licenses/
-version: 0.008
+ repository: https://github.com/Leont/authen-passphrase
+version: '0.009'
+x_deprecated: 1
+x_serialization_backend: 'CPAN::Meta::YAML version 0.020'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/SIGNATURE
new/Authen-Passphrase-0.009/SIGNATURE
--- old/Authen-Passphrase-0.008/SIGNATURE 2012-02-04 15:06:58.000000000
+0100
+++ new/Authen-Passphrase-0.009/SIGNATURE 1970-01-01 01:00:00.000000000
+0100
@@ -1,74 +0,0 @@
-This file contains message digests of all files listed in MANIFEST,
-signed via the Module::Signature module, version 0.68.
-
-To verify the content in this distribution, first make sure you have
-Module::Signature installed, then type:
-
- % cpansign -v
-
-It will check each file's integrity, as well as the signature's
-validity. If "==> Signature verified OK! <==" is not displayed,
-the distribution may already have been compromised, and you should
-not run its Makefile.PL or Build.PL.
-
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA1
-
-SHA1 4ff607a9628b3a53d1d5f493d07f80c62e05a1cc .gitignore
-SHA1 35ad1741a2e8227aa927f65735bc60253412a468 Build.PL
-SHA1 66892da20c7745991fd39ca7b1d3760d532a3a97 Changes
-SHA1 b3dbe8d80575d887abec73ceb39d52596e510571 MANIFEST
-SHA1 61126660bd129b1f4b1dc9cf2477ffa1049dc93a META.json
-SHA1 683a1207e98036d1af45f84afa1f32c68db5c7da META.yml
-SHA1 a4df8e97ccd390a42212af5a9f4d0986c85e7a5f Makefile.PL
-SHA1 4ce3500e0561cedc483673a918e6da960b169bda README
-SHA1 9e0c16edc63873594d30d569537d469ca7b21bf7 lib/Authen/Passphrase.pm
-SHA1 a023195088f0aae1a528fbb2911a606041b05b48
lib/Authen/Passphrase/AcceptAll.pm
-SHA1 46869a335237a2710ee4766fcd457b8b51b56a85 lib/Authen/Passphrase/BigCrypt.pm
-SHA1 c258c203f227b3edefeb20add41a9c3d2d5a45da
lib/Authen/Passphrase/BlowfishCrypt.pm
-SHA1 8ef489ef2319e2d32208ccfc161def8692fa2fbb lib/Authen/Passphrase/Clear.pm
-SHA1 d221e22b9248ad5d25ee2b1b2a298083ab1fcbca lib/Authen/Passphrase/Crypt16.pm
-SHA1 336e4289f8dabb81dabfee444d0d0e082d2098f3 lib/Authen/Passphrase/DESCrypt.pm
-SHA1 c8115f18ecf9311fab5eaccd02692fd7fdd7be6d
lib/Authen/Passphrase/EggdropBlowfish.pm
-SHA1 a02b462c3c62a34df09e3f36e2779dfc7823a50d
lib/Authen/Passphrase/LANManager.pm
-SHA1 3709df52ff5709859ef14995810b1a450102f7ad
lib/Authen/Passphrase/LANManagerHalf.pm
-SHA1 3ef6611b31b3c9f7f3df0720dc3366fe5f4c3f7a lib/Authen/Passphrase/MD5Crypt.pm
-SHA1 b55f6385b2a72a3c54c3a02fe80a5fadcbedff91 lib/Authen/Passphrase/MySQL323.pm
-SHA1 4e54f5b1745ddf18b353917f849c96606187d843 lib/Authen/Passphrase/MySQL41.pm
-SHA1 67c654ee5ccd3fb9e9c81bf1ce62cd76ea68631a lib/Authen/Passphrase/NTHash.pm
-SHA1 c945e262da2dbaaa560c62ec96452b87da03b6cf
lib/Authen/Passphrase/NetscapeMail.pm
-SHA1 5ebc6d58d440440b0649b5eeb32c06cb9640bdf6 lib/Authen/Passphrase/PHPass.pm
-SHA1 e9435e9f46ed4b168746f2ee4a2a7770c5f391cc
lib/Authen/Passphrase/RejectAll.pm
-SHA1 c681e467e3ad1dceb49ad85845ab6a0b4f4b4b35
lib/Authen/Passphrase/SaltedDigest.pm
-SHA1 c899b1dd540b115ac8274649c0ac1ed76eea72c0 lib/Authen/Passphrase/VMSPurdy.pm
-SHA1 701b95f420406bb412f27ce12bbabd4e2c388284 t/acceptall.t
-SHA1 c3888dbc795188d78a5498fed6167143d9aaed8f t/bigcrypt.t
-SHA1 a62299eeccc77e682893549122cba19558b6f5b9 t/blowfishcrypt.t
-SHA1 63691c2ef336fddaa8f9a131d8bc32539c5395b5 t/clear.t
-SHA1 022e065813caf9d462df1a52c7c48ad04feafbb0 t/crypt16.t
-SHA1 006723ca9e3d56b57444f55e4cd5c9da76f26410 t/eggdropblowfish.t
-SHA1 eb7784180618d43171420d6c72f7d64210c4c6bf t/extdescrypt.t
-SHA1 e625976a80c74e79718278ce36f50dfa40c72cad t/gendescrypt.t
-SHA1 2fd7ec5f8a364a541d161249bb8132e78846ded7 t/intdescrypt.t
-SHA1 4168299f662fa8c10f2924790fb6a7887c9c3e9d t/lanman.t
-SHA1 b45c94717b50731f513a60a3b8b792d0610c85da t/lanmanhalf.t
-SHA1 b5b993f5a8141fd3562893f69af313b70bc0a074 t/md5crypt.t
-SHA1 183801ccda7843e9a07746395618a9b4e9a5f94b t/mysql323.t
-SHA1 7b4dedc232b78764aa493216818ec5d62944d5cb t/mysql41.t
-SHA1 957e5eb52221c1ccb139984757e00774dc49a398 t/netscapemail.t
-SHA1 0334ae266aa54c7b03019b95bf156afac05ac288 t/nthash.t
-SHA1 1f09f3f17eb280eec2791d2dffdfc3936fabe173 t/phpass.t
-SHA1 904d9a4f76525e2303e4b0c168c68230f223c8de t/pod_cvg.t
-SHA1 65c75abdef6f01a5d1588a307f2ddfe2333dc961 t/pod_syn.t
-SHA1 e3962e176588f0498b58b16c989fa1a674ee861f t/rejectall.t
-SHA1 3a48f131cf21940c853f01690ccf19c18f6a0eac t/smd5.t
-SHA1 dec2ee0c0b163930850cf1942485877a855fe45d t/ssha.t
-SHA1 c9ef4b2237f83808e82f864775684a42c1a4f43c t/traddescrypt.t
-SHA1 66c4083e0684fdc049a1fdcff3e93f0cdf80e120 t/vmspurdy.t
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v1.4.10 (GNU/Linux)
-
-iEYEARECAAYFAk8tO34ACgkQOV9mt2VyAVHkAACeMgXakr7kFcTJWZdRKkMigwe0
-kc0AmgM9GAbozkMGecF0mB2/066nzQyy
-=k1za
------END PGP SIGNATURE-----
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/AcceptAll.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/AcceptAll.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/AcceptAll.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/AcceptAll.pm
2026-04-15 21:16:50.000000000 +0200
@@ -43,7 +43,7 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BigCrypt.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BigCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BigCrypt.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BigCrypt.pm
2026-04-15 21:16:50.000000000 +0200
@@ -73,9 +73,9 @@
use Authen::Passphrase::DESCrypt;
use Carp qw(croak);
use Crypt::UnixCrypt_XS 0.08 qw(base64_to_block base64_to_int12);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -102,8 +102,7 @@
Causes salt for the first section to be generated randomly. The value
given for this attribute must be 12, indicating generation of 12 bits
-of salt. The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+of salt.
=item B<hash>
@@ -150,7 +149,7 @@
if defined $salt;
croak "\"$value\" is not a valid salt size"
unless $value == 12;
- $salt = rand_int(1 << $value);
+ $salt = unpack("S", random_bytes(2)) % 4096;
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if @hashes || defined($passphrase);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BlowfishCrypt.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BlowfishCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BlowfishCrypt.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BlowfishCrypt.pm
2026-04-15 21:16:50.000000000 +0200
@@ -8,12 +8,12 @@
use Authen::Passphrase::BlowfishCrypt;
$ppr = Authen::Passphrase::BlowfishCrypt->new(
- cost => 8,
+ cost => 14,
salt => "sodium__chloride",
hash_base64 => "BPZijhMHLvPeNMHd6XwZyNamOXVBTPi");
$ppr = Authen::Passphrase::BlowfishCrypt->new(
- cost => 8, salt_random => 1,
+ cost => 14, salt_random => 1,
passphrase => "passphrase");
$ppr = Authen::Passphrase::BlowfishCrypt->from_crypt(
@@ -98,9 +98,9 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
use Crypt::Eksblowfish::Bcrypt 0.008 qw(bcrypt_hash en_base64 de_base64);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -141,8 +141,7 @@
=item B<salt_random>
Causes salt to be generated randomly. The value given for this attribute
-is ignored. The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+is ignored.
=item B<hash>
@@ -194,7 +193,7 @@
} elsif($attr eq "salt_random") {
croak "salt specified redundantly"
if exists $self->{salt};
- $self->{salt} = rand_bits(128);
+ $self->{salt} = random_bytes(16);
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Clear.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Clear.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Clear.pm 2012-02-04
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Clear.pm 2026-04-15
21:16:50.000000000 +0200
@@ -37,7 +37,7 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Crypt16.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Crypt16.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Crypt16.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Crypt16.pm
2026-04-15 21:16:50.000000000 +0200
@@ -70,9 +70,9 @@
use Authen::Passphrase::DESCrypt;
use Carp qw(croak);
use Crypt::UnixCrypt_XS 0.08 qw(base64_to_block base64_to_int12);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -99,8 +99,6 @@
Causes salt to be generated randomly. The value given for this
attribute must be 12, indicating generation of 12 bits of salt.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash>
@@ -147,7 +145,7 @@
if defined $salt;
croak "\"$value\" is not a valid salt size"
unless $value == 12;
- $salt = rand_int(1 << $value);
+ $salt = unpack("S", random_bytes(2)) % 4096;
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if defined($hash) || defined($passphrase);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/DESCrypt.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/DESCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/DESCrypt.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/DESCrypt.pm
2026-04-15 21:16:50.000000000 +0200
@@ -127,9 +127,9 @@
base64_to_int24 int24_to_base64
base64_to_int12 int12_to_base64
);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -182,8 +182,6 @@
Causes salt to be generated randomly. The value given for this attribute
must be either 12 or 24, giving the number of bits of salt to generate.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash>
@@ -260,7 +258,7 @@
if exists $self->{salt};
croak "\"$value\" is not a valid salt size"
unless $value == 12 || $value == 24;
- $self->{salt} = rand_int(1 << $value);
+ $self->{salt} = unpack("I", random_bytes(4)) % (1 <<
$value);
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/EggdropBlowfish.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/EggdropBlowfish.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/EggdropBlowfish.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/EggdropBlowfish.pm
2026-04-15 21:16:50.000000000 +0200
@@ -54,7 +54,7 @@
use Carp qw(croak);
use Crypt::Eksblowfish::Uklblowfish 0.008;
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManager.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManager.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManager.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManager.pm
2026-04-15 21:16:50.000000000 +0200
@@ -59,7 +59,7 @@
use Authen::Passphrase::LANManagerHalf;
use Carp qw(croak);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManagerHalf.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManagerHalf.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManagerHalf.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManagerHalf.pm
2026-04-15 21:16:50.000000000 +0200
@@ -62,7 +62,7 @@
use Carp qw(croak);
use Crypt::DES;
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MD5Crypt.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MD5Crypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MD5Crypt.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MD5Crypt.pm
2026-04-15 21:16:50.000000000 +0200
@@ -85,9 +85,10 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
use Crypt::PasswdMD5 1.0 qw(unix_md5_crypt);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
+use MIME::Base64 'encode_base64';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -111,8 +112,6 @@
Causes salt to be generated randomly. The value given for this
attribute is ignored. The salt will be a string of eight base 64 digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash_base64>
@@ -145,11 +144,8 @@
} elsif($attr eq "salt_random") {
croak "salt specified redundantly"
if exists $self->{salt};
- $self->{salt} = "";
- for(my $i = 8; $i--; ) {
- $self->{salt} .= chr(rand_int(64));
- }
- $self->{salt} =~ tr#\x00-\x3f#./0-9A-Za-z#;
+ $self->{salt} = encode_base64(random_bytes(6), '');
+ $self->{salt} =~ tr{A-Za-z0-9+/=}{./0-9A-Za-z}d;
} elsif($attr eq "hash_base64") {
croak "hash specified redundantly"
if exists($self->{hash_base64}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL323.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL323.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL323.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL323.pm
2026-04-15 21:16:50.000000000 +0200
@@ -48,7 +48,7 @@
use Carp qw(croak);
use Crypt::MySQL 0.03 qw(password);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL41.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL41.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL41.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL41.pm
2026-04-15 21:16:50.000000000 +0200
@@ -48,7 +48,7 @@
use Carp qw(croak);
use Digest::SHA qw(sha1);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NTHash.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NTHash.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NTHash.pm 2012-02-04
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NTHash.pm 2026-04-15
21:16:50.000000000 +0200
@@ -52,7 +52,7 @@
use Carp qw(croak);
use Digest::MD4 1.2 qw(md4);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NetscapeMail.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NetscapeMail.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NetscapeMail.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NetscapeMail.pm
2026-04-15 21:16:50.000000000 +0200
@@ -52,10 +52,10 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
use Digest::MD5 1.99_53 ();
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -79,8 +79,6 @@
Causes salt to be generated randomly. The value given for this attribute
is ignored. The salt will be a string of 32 lowercase hexadecimal digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash>
@@ -116,7 +114,7 @@
} elsif($attr eq "salt_random") {
croak "salt specified redundantly"
if exists $self->{salt};
- $self->{salt} = unpack("H*", rand_bits(128));
+ $self->{salt} = unpack("H*", random_bytes(16));
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/PHPass.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/PHPass.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/PHPass.pm 2012-02-04
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/PHPass.pm 2026-04-15
21:16:50.000000000 +0200
@@ -66,10 +66,10 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
use Digest::MD5 1.99_53 ();
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -150,8 +150,6 @@
Causes salt to be generated randomly. The value given for this
attribute is ignored. The salt will be a string of eight base 64 digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash>
@@ -201,7 +199,7 @@
} elsif($attr eq "salt_random") {
croak "salt specified redundantly"
if exists $self->{salt};
- $self->{salt} = _en_base64(rand_bits(48));
+ $self->{salt} = _en_base64(random_bytes(6));
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/RejectAll.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/RejectAll.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/RejectAll.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/RejectAll.pm
2026-04-15 21:16:50.000000000 +0200
@@ -21,7 +21,7 @@
=head1 DESCRIPTION
-An object of this class is a passphrase recogniser that accepts any
+An object of this class is a passphrase recogniser that accepts no
passphrase whatsoever. This is a subclass of L<Authen::Passphrase>, and
this document assumes that the reader is familiar with the documentation
for that class.
@@ -42,7 +42,7 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/SaltedDigest.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/SaltedDigest.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/SaltedDigest.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/SaltedDigest.pm
2026-04-15 21:16:50.000000000 +0200
@@ -75,13 +75,13 @@
use Authen::Passphrase 0.003;
use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
use Digest 1.00;
use MIME::Base64 2.21 qw(encode_base64 decode_base64);
use Module::Runtime 0.011 qw(is_valid_module_name use_module);
use Params::Classify 0.000 qw(is_string is_blessed);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -137,8 +137,6 @@
Causes salt to be generated randomly. The value given for this
attribute must be a non-negative integer, giving the number of bytes
of salt to generate. (The same length as the hash is recommended.)
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
=item B<hash>
@@ -186,7 +184,7 @@
if exists $self->{salt};
croak "\"$value\" is not a valid salt length"
unless $value == int($value) && $value >= 0;
- $self->{salt} = rand_bits($value * 8);
+ $self->{salt} = random_bytes($value);
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/VMSPurdy.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/VMSPurdy.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/VMSPurdy.pm
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/VMSPurdy.pm
2026-04-15 21:16:50.000000000 +0200
@@ -81,9 +81,9 @@
use Authen::DecHpwd 2.003 qw(lgi_hpwd UAI_C_PURDY UAI_C_PURDY_V UAI_C_PURDY_S);
use Authen::Passphrase 0.003;
use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
-our $VERSION = "0.008";
+our $VERSION = "0.009";
use parent "Authen::Passphrase";
@@ -124,8 +124,7 @@
=item B<salt_random>
Causes salt to be generated randomly. The value given for this attribute
-is ignored. The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+is ignored.
=item B<hash>
@@ -181,7 +180,7 @@
} elsif($attr eq "salt_random") {
croak "salt specified redundantly"
if exists $self->{salt};
- $self->{salt} = rand_int(65536);
+ $self->{salt} = unpack "S", random_bytes(2);
} elsif($attr eq "hash") {
croak "hash specified redundantly"
if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Authen-Passphrase-0.008/lib/Authen/Passphrase.pm
new/Authen-Passphrase-0.009/lib/Authen/Passphrase.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase.pm 2012-02-04
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase.pm 2026-04-15
21:16:50.000000000 +0200
@@ -18,6 +18,10 @@
=head1 DESCRIPTION
+B<THIS MODULE IS DEPRECATED>. For a module that's more extensible, and
+less held-back by legacy algorithms, you may want to use
+L<Crypt::Passphrase|Crypt::Passphrase> instead.
+
This is the base class for a system of objects that encapsulate
passphrases. An object of this type is a passphrase recogniser: its
job is to recognise whether an offered passphrase is the right one.
@@ -139,7 +143,7 @@
use MIME::Base64 2.21 qw(decode_base64);
use Module::Runtime 0.011 qw(use_module);
-our $VERSION = "0.008";
+our $VERSION = "0.009";
=head1 CONSTRUCTORS
@@ -478,6 +482,8 @@
Checks whether the supplied passphrase is correct. Returns a truth value.
+The passphrase is expected to be octets, not characters.
+
=item $ppr->passphrase
If a matching passphrase can be easily determined by the passphrase
++++++ README.md ++++++
## Build Results
Current state of perl in openSUSE:Factory is

The current state of perl in the devel project build (devel:languages:perl)

++++++ _scmsync.obsinfo ++++++
mtime: 1776323065
commit: 49c7f639fa78677d782c1852fd29b48d121e3a524be899a6a30d6c5df7360aa3
url: https://src.opensuse.org/perl/perl-Authen-Passphrase
revision: 49c7f639fa78677d782c1852fd29b48d121e3a524be899a6a30d6c5df7360aa3
projectscmsync: https://src.opensuse.org/perl/_ObsPrj
++++++ build.specials.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/.gitignore new/.gitignore
--- old/.gitignore 1970-01-01 01:00:00.000000000 +0100
+++ new/.gitignore 2026-04-16 09:04:25.000000000 +0200
@@ -0,0 +1 @@
+.osc