Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package perl-Authen-Passphrase for 
openSUSE:Factory checked in at 2026-05-18 17:57:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-Authen-Passphrase (Old)
 and      /work/SRC/openSUSE:Factory/.perl-Authen-Passphrase.new.1966 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "perl-Authen-Passphrase"

Mon May 18 17:57:58 2026 rev:3 rq:1353849 version:0.9.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/perl-Authen-Passphrase/perl-Authen-Passphrase.changes
    2025-06-03 19:11:12.771098300 +0200
+++ 
/work/SRC/openSUSE:Factory/.perl-Authen-Passphrase.new.1966/perl-Authen-Passphrase.changes
  2026-05-18 17:57:59.741077039 +0200
@@ -1,0 +2,11 @@
+Thu Apr 16 07:04:24 UTC 2026 - Tina Müller <[email protected]>
+
+- updated to 0.9.0 (0.009)
+   see /usr/share/doc/packages/perl-Authen-Passphrase/Changes
+
+  version 0.009; 2026-04-15
+    * Mark module as deprecated
+    * Switch from Data::Entropy to Crypt::SysRandom
+    * Fix various documentation issues.
+
+-------------------------------------------------------------------

Old:
----
  Authen-Passphrase-0.008.tar.gz

New:
----
  Authen-Passphrase-0.009.tar.gz
  README.md
  _scmsync.obsinfo
  build.specials.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-Authen-Passphrase.spec ++++++
--- /var/tmp/diff_new_pack.JXj5Cl/_old  2026-05-18 17:58:00.689116294 +0200
+++ /var/tmp/diff_new_pack.JXj5Cl/_new  2026-05-18 17:58:00.689116294 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package perl-Authen-Passphrase
 #
-# Copyright (c) 2025 SUSE LLC
+# Copyright (c) 2026 SUSE LLC and contributors
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,14 +18,15 @@
 
 %define cpan_name Authen-Passphrase
 Name:           perl-Authen-Passphrase
-Version:        0.8.0
+Version:        0.9.0
 Release:        0
-# 0.008 -> normalize -> 0.8.0
-%define cpan_version 0.008
+# 0.009 -> normalize -> 0.9.0
+%define cpan_version 0.009
 License:        Artistic-1.0 OR GPL-1.0-or-later
 Summary:        Hashed passwords/passphrases as objects
 URL:            https://metacpan.org/release/%{cpan_name}
-Source0:        
https://cpan.metacpan.org/authors/id/Z/ZE/ZEFRAM/%{cpan_name}-%{cpan_version}.tar.gz
+Source0:        
https://cpan.metacpan.org/authors/id/L/LE/LEONT/%{cpan_name}-%{cpan_version}.tar.gz
+Source100:      README.md
 BuildArch:      noarch
 BuildRequires:  perl
 BuildRequires:  perl-macros
@@ -34,9 +35,9 @@
 BuildRequires:  perl(Crypt::Eksblowfish::Bcrypt) >= 0.8
 BuildRequires:  perl(Crypt::Eksblowfish::Uklblowfish) >= 0.8
 BuildRequires:  perl(Crypt::MySQL) >= 0.30
-BuildRequires:  perl(Crypt::PasswdMD5) >= 1.0.0
+BuildRequires:  perl(Crypt::PasswdMD5) >= 1.0
+BuildRequires:  perl(Crypt::SysRandom)
 BuildRequires:  perl(Crypt::UnixCrypt_XS) >= 0.80
-BuildRequires:  perl(Data::Entropy::Algorithms)
 BuildRequires:  perl(Digest::MD4) >= 1.200
 BuildRequires:  perl(Digest::SHA)
 BuildRequires:  perl(Module::Build)
@@ -48,9 +49,9 @@
 Requires:       perl(Crypt::Eksblowfish::Bcrypt) >= 0.8
 Requires:       perl(Crypt::Eksblowfish::Uklblowfish) >= 0.8
 Requires:       perl(Crypt::MySQL) >= 0.30
-Requires:       perl(Crypt::PasswdMD5) >= 1.0.0
+Requires:       perl(Crypt::PasswdMD5) >= 1.0
+Requires:       perl(Crypt::SysRandom)
 Requires:       perl(Crypt::UnixCrypt_XS) >= 0.80
-Requires:       perl(Data::Entropy::Algorithms)
 Requires:       perl(Digest::MD4) >= 1.200
 Requires:       perl(Digest::SHA)
 Requires:       perl(Module::Runtime) >= 0.11
@@ -79,6 +80,10 @@
 %{perl_requires}
 
 %description
+*THIS MODULE IS DEPRECATED*. For a module that's more extensible, and less
+held-back by legacy algorithms, you may want to use Crypt::Passphrase
+instead.
+
 This is the base class for a system of objects that encapsulate
 passphrases. An object of this type is a passphrase recogniser: its job is
 to recognise whether an offered passphrase is the right one. For security,

++++++ Authen-Passphrase-0.008.tar.gz -> Authen-Passphrase-0.009.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/Build.PL 
new/Authen-Passphrase-0.009/Build.PL
--- old/Authen-Passphrase-0.008/Build.PL        2012-02-04 15:06:54.000000000 
+0100
+++ new/Authen-Passphrase-0.009/Build.PL        2026-04-15 21:16:50.000000000 
+0200
@@ -1,4 +1,4 @@
-{ use 5.006; }
+use 5.006;
 use warnings;
 use strict;
 
@@ -29,8 +29,8 @@
                "Crypt::Eksblowfish::Uklblowfish" => "0.008",
                "Crypt::MySQL" => "0.03",
                "Crypt::PasswdMD5" => "1.0",
+               "Crypt::SysRandom" => 0,
                "Crypt::UnixCrypt_XS" => "0.08",
-               "Data::Entropy::Algorithms" => 0,
                "Digest" => "1.00",
                "Digest::MD4" => "1.2",
                "Digest::MD5" => "1.9953",
@@ -44,9 +44,18 @@
                "warnings" => 0,
        },
        dynamic_config => 0,
-       meta_add => { distribution_type => "module" },
-       create_makefile_pl => "passthrough",
-       sign => 1,
+       meta_merge => {
+               x_deprecated => 1,
+               "meta-spec" => {
+                       "version" => 2,
+               },
+               resources => {
+                       repository => {
+                               type => "git",
+                               web => 
"https://github.com/Leont/authen-passphrase";,
+                       },
+               },
+       },
 )->create_build_script;
 
 1;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/Changes 
new/Authen-Passphrase-0.009/Changes
--- old/Authen-Passphrase-0.008/Changes 2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/Changes 2026-04-15 21:16:50.000000000 +0200
@@ -1,3 +1,11 @@
+version 0.009; 2026-04-15
+
+  * Mark module as deprecated
+
+  * Switch from Data::Entropy to Crypt::SysRandom
+
+  * Fix various documentation issues.
+
 version 0.008; 2012-02-04
 
   * bugfix: avoid passing magic variables $1 et al into functions where
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/MANIFEST 
new/Authen-Passphrase-0.009/MANIFEST
--- old/Authen-Passphrase-0.008/MANIFEST        2012-02-04 15:06:54.000000000 
+0100
+++ new/Authen-Passphrase-0.009/MANIFEST        2026-04-15 21:16:50.000000000 
+0200
@@ -49,4 +49,3 @@
 t/ssha.t
 t/traddescrypt.t
 t/vmspurdy.t
-SIGNATURE    Added here by Module::Build
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/META.json 
new/Authen-Passphrase-0.009/META.json
--- old/Authen-Passphrase-0.008/META.json       2012-02-04 15:06:54.000000000 
+0100
+++ new/Authen-Passphrase-0.009/META.json       2026-04-15 21:16:50.000000000 
+0200
@@ -4,142 +4,148 @@
       "Andrew Main (Zefram) <[email protected]>"
    ],
    "dynamic_config" : 0,
-   "generated_by" : "Module::Build version 0.38, CPAN::Meta::Converter version 
2.112621",
+   "generated_by" : "Module::Build version 0.4234",
    "license" : [
       "perl_5"
    ],
    "meta-spec" : {
       "url" : "http://search.cpan.org/perldoc?CPAN::Meta::Spec";,
-      "version" : "2"
+      "version" : 2
    },
    "name" : "Authen-Passphrase",
    "prereqs" : {
       "build" : {
          "requires" : {
             "MIME::Base64" : "2.21",
-            "Module::Build" : 0,
-            "Test::More" : 0,
+            "Module::Build" : "0",
+            "Test::More" : "0",
             "perl" : "5.006",
-            "strict" : 0,
-            "warnings" : 0
+            "strict" : "0",
+            "warnings" : "0"
          }
       },
       "configure" : {
          "requires" : {
-            "Module::Build" : 0,
+            "Module::Build" : "0",
             "perl" : "5.006",
-            "strict" : 0,
-            "warnings" : 0
+            "strict" : "0",
+            "warnings" : "0"
          }
       },
       "runtime" : {
          "requires" : {
             "Authen::DecHpwd" : "2.003",
-            "Carp" : 0,
-            "Crypt::DES" : 0,
+            "Carp" : "0",
+            "Crypt::DES" : "0",
             "Crypt::Eksblowfish::Bcrypt" : "0.008",
             "Crypt::Eksblowfish::Uklblowfish" : "0.008",
             "Crypt::MySQL" : "0.03",
             "Crypt::PasswdMD5" : "1.0",
+            "Crypt::SysRandom" : "0",
             "Crypt::UnixCrypt_XS" : "0.08",
-            "Data::Entropy::Algorithms" : 0,
             "Digest" : "1.00",
             "Digest::MD4" : "1.2",
             "Digest::MD5" : "1.9953",
-            "Digest::SHA" : 0,
+            "Digest::SHA" : "0",
             "MIME::Base64" : "2.21",
             "Module::Runtime" : "0.011",
-            "Params::Classify" : 0,
-            "parent" : 0,
+            "Params::Classify" : "0",
+            "parent" : "0",
             "perl" : "5.006",
-            "strict" : 0,
-            "warnings" : 0
+            "strict" : "0",
+            "warnings" : "0"
          }
       }
    },
    "provides" : {
       "Authen::Passphrase" : {
          "file" : "lib/Authen/Passphrase.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::AcceptAll" : {
          "file" : "lib/Authen/Passphrase/AcceptAll.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::BigCrypt" : {
          "file" : "lib/Authen/Passphrase/BigCrypt.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::BlowfishCrypt" : {
          "file" : "lib/Authen/Passphrase/BlowfishCrypt.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::Clear" : {
          "file" : "lib/Authen/Passphrase/Clear.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::Crypt16" : {
          "file" : "lib/Authen/Passphrase/Crypt16.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::DESCrypt" : {
          "file" : "lib/Authen/Passphrase/DESCrypt.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::EggdropBlowfish" : {
          "file" : "lib/Authen/Passphrase/EggdropBlowfish.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::LANManager" : {
          "file" : "lib/Authen/Passphrase/LANManager.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::LANManagerHalf" : {
          "file" : "lib/Authen/Passphrase/LANManagerHalf.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::MD5Crypt" : {
          "file" : "lib/Authen/Passphrase/MD5Crypt.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::MySQL323" : {
          "file" : "lib/Authen/Passphrase/MySQL323.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::MySQL41" : {
          "file" : "lib/Authen/Passphrase/MySQL41.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::NTHash" : {
          "file" : "lib/Authen/Passphrase/NTHash.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::NetscapeMail" : {
          "file" : "lib/Authen/Passphrase/NetscapeMail.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::PHPass" : {
          "file" : "lib/Authen/Passphrase/PHPass.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::RejectAll" : {
          "file" : "lib/Authen/Passphrase/RejectAll.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::SaltedDigest" : {
          "file" : "lib/Authen/Passphrase/SaltedDigest.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       },
       "Authen::Passphrase::VMSPurdy" : {
          "file" : "lib/Authen/Passphrase/VMSPurdy.pm",
-         "version" : "0.008"
+         "version" : "0.009"
       }
    },
    "release_status" : "stable",
    "resources" : {
       "license" : [
          "http://dev.perl.org/licenses/";
-      ]
+      ],
+      "repository" : {
+         "type" : "git",
+         "web" : "https://github.com/Leont/authen-passphrase";
+      }
    },
-   "version" : "0.008"
+   "version" : "0.009",
+   "x_deprecated" : 1,
+   "x_serialization_backend" : "JSON::PP version 4.16"
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/META.yml 
new/Authen-Passphrase-0.009/META.yml
--- old/Authen-Passphrase-0.008/META.yml        2012-02-04 15:06:54.000000000 
+0100
+++ new/Authen-Passphrase-0.009/META.yml        2026-04-15 21:16:50.000000000 
+0200
@@ -3,103 +3,106 @@
 author:
   - 'Andrew Main (Zefram) <[email protected]>'
 build_requires:
-  MIME::Base64: 2.21
-  Module::Build: 0
-  Test::More: 0
-  perl: 5.006
-  strict: 0
-  warnings: 0
+  MIME::Base64: '2.21'
+  Module::Build: '0'
+  Test::More: '0'
+  perl: '5.006'
+  strict: '0'
+  warnings: '0'
 configure_requires:
-  Module::Build: 0
-  perl: 5.006
-  strict: 0
-  warnings: 0
+  Module::Build: '0'
+  perl: '5.006'
+  strict: '0'
+  warnings: '0'
 dynamic_config: 0
-generated_by: 'Module::Build version 0.38, CPAN::Meta::Converter version 
2.112621'
+generated_by: 'Module::Build version 0.4234, CPAN::Meta::Converter version 
2.150010'
 license: perl
 meta-spec:
   url: http://module-build.sourceforge.net/META-spec-v1.4.html
-  version: 1.4
+  version: '1.4'
 name: Authen-Passphrase
 provides:
   Authen::Passphrase:
     file: lib/Authen/Passphrase.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::AcceptAll:
     file: lib/Authen/Passphrase/AcceptAll.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::BigCrypt:
     file: lib/Authen/Passphrase/BigCrypt.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::BlowfishCrypt:
     file: lib/Authen/Passphrase/BlowfishCrypt.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::Clear:
     file: lib/Authen/Passphrase/Clear.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::Crypt16:
     file: lib/Authen/Passphrase/Crypt16.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::DESCrypt:
     file: lib/Authen/Passphrase/DESCrypt.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::EggdropBlowfish:
     file: lib/Authen/Passphrase/EggdropBlowfish.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::LANManager:
     file: lib/Authen/Passphrase/LANManager.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::LANManagerHalf:
     file: lib/Authen/Passphrase/LANManagerHalf.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::MD5Crypt:
     file: lib/Authen/Passphrase/MD5Crypt.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::MySQL323:
     file: lib/Authen/Passphrase/MySQL323.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::MySQL41:
     file: lib/Authen/Passphrase/MySQL41.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::NTHash:
     file: lib/Authen/Passphrase/NTHash.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::NetscapeMail:
     file: lib/Authen/Passphrase/NetscapeMail.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::PHPass:
     file: lib/Authen/Passphrase/PHPass.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::RejectAll:
     file: lib/Authen/Passphrase/RejectAll.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::SaltedDigest:
     file: lib/Authen/Passphrase/SaltedDigest.pm
-    version: 0.008
+    version: '0.009'
   Authen::Passphrase::VMSPurdy:
     file: lib/Authen/Passphrase/VMSPurdy.pm
-    version: 0.008
+    version: '0.009'
 requires:
-  Authen::DecHpwd: 2.003
-  Carp: 0
-  Crypt::DES: 0
-  Crypt::Eksblowfish::Bcrypt: 0.008
-  Crypt::Eksblowfish::Uklblowfish: 0.008
-  Crypt::MySQL: 0.03
-  Crypt::PasswdMD5: 1.0
-  Crypt::UnixCrypt_XS: 0.08
-  Data::Entropy::Algorithms: 0
-  Digest: 1.00
-  Digest::MD4: 1.2
-  Digest::MD5: 1.9953
-  Digest::SHA: 0
-  MIME::Base64: 2.21
-  Module::Runtime: 0.011
-  Params::Classify: 0
-  parent: 0
-  perl: 5.006
-  strict: 0
-  warnings: 0
+  Authen::DecHpwd: '2.003'
+  Carp: '0'
+  Crypt::DES: '0'
+  Crypt::Eksblowfish::Bcrypt: '0.008'
+  Crypt::Eksblowfish::Uklblowfish: '0.008'
+  Crypt::MySQL: '0.03'
+  Crypt::PasswdMD5: '1.0'
+  Crypt::SysRandom: '0'
+  Crypt::UnixCrypt_XS: '0.08'
+  Digest: '1.00'
+  Digest::MD4: '1.2'
+  Digest::MD5: '1.9953'
+  Digest::SHA: '0'
+  MIME::Base64: '2.21'
+  Module::Runtime: '0.011'
+  Params::Classify: '0'
+  parent: '0'
+  perl: '5.006'
+  strict: '0'
+  warnings: '0'
 resources:
   license: http://dev.perl.org/licenses/
-version: 0.008
+  repository: https://github.com/Leont/authen-passphrase
+version: '0.009'
+x_deprecated: 1
+x_serialization_backend: 'CPAN::Meta::YAML version 0.020'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/SIGNATURE 
new/Authen-Passphrase-0.009/SIGNATURE
--- old/Authen-Passphrase-0.008/SIGNATURE       2012-02-04 15:06:58.000000000 
+0100
+++ new/Authen-Passphrase-0.009/SIGNATURE       1970-01-01 01:00:00.000000000 
+0100
@@ -1,74 +0,0 @@
-This file contains message digests of all files listed in MANIFEST,
-signed via the Module::Signature module, version 0.68.
-
-To verify the content in this distribution, first make sure you have
-Module::Signature installed, then type:
-
-    % cpansign -v
-
-It will check each file's integrity, as well as the signature's
-validity.  If "==> Signature verified OK! <==" is not displayed,
-the distribution may already have been compromised, and you should
-not run its Makefile.PL or Build.PL.
-
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA1
-
-SHA1 4ff607a9628b3a53d1d5f493d07f80c62e05a1cc .gitignore
-SHA1 35ad1741a2e8227aa927f65735bc60253412a468 Build.PL
-SHA1 66892da20c7745991fd39ca7b1d3760d532a3a97 Changes
-SHA1 b3dbe8d80575d887abec73ceb39d52596e510571 MANIFEST
-SHA1 61126660bd129b1f4b1dc9cf2477ffa1049dc93a META.json
-SHA1 683a1207e98036d1af45f84afa1f32c68db5c7da META.yml
-SHA1 a4df8e97ccd390a42212af5a9f4d0986c85e7a5f Makefile.PL
-SHA1 4ce3500e0561cedc483673a918e6da960b169bda README
-SHA1 9e0c16edc63873594d30d569537d469ca7b21bf7 lib/Authen/Passphrase.pm
-SHA1 a023195088f0aae1a528fbb2911a606041b05b48 
lib/Authen/Passphrase/AcceptAll.pm
-SHA1 46869a335237a2710ee4766fcd457b8b51b56a85 lib/Authen/Passphrase/BigCrypt.pm
-SHA1 c258c203f227b3edefeb20add41a9c3d2d5a45da 
lib/Authen/Passphrase/BlowfishCrypt.pm
-SHA1 8ef489ef2319e2d32208ccfc161def8692fa2fbb lib/Authen/Passphrase/Clear.pm
-SHA1 d221e22b9248ad5d25ee2b1b2a298083ab1fcbca lib/Authen/Passphrase/Crypt16.pm
-SHA1 336e4289f8dabb81dabfee444d0d0e082d2098f3 lib/Authen/Passphrase/DESCrypt.pm
-SHA1 c8115f18ecf9311fab5eaccd02692fd7fdd7be6d 
lib/Authen/Passphrase/EggdropBlowfish.pm
-SHA1 a02b462c3c62a34df09e3f36e2779dfc7823a50d 
lib/Authen/Passphrase/LANManager.pm
-SHA1 3709df52ff5709859ef14995810b1a450102f7ad 
lib/Authen/Passphrase/LANManagerHalf.pm
-SHA1 3ef6611b31b3c9f7f3df0720dc3366fe5f4c3f7a lib/Authen/Passphrase/MD5Crypt.pm
-SHA1 b55f6385b2a72a3c54c3a02fe80a5fadcbedff91 lib/Authen/Passphrase/MySQL323.pm
-SHA1 4e54f5b1745ddf18b353917f849c96606187d843 lib/Authen/Passphrase/MySQL41.pm
-SHA1 67c654ee5ccd3fb9e9c81bf1ce62cd76ea68631a lib/Authen/Passphrase/NTHash.pm
-SHA1 c945e262da2dbaaa560c62ec96452b87da03b6cf 
lib/Authen/Passphrase/NetscapeMail.pm
-SHA1 5ebc6d58d440440b0649b5eeb32c06cb9640bdf6 lib/Authen/Passphrase/PHPass.pm
-SHA1 e9435e9f46ed4b168746f2ee4a2a7770c5f391cc 
lib/Authen/Passphrase/RejectAll.pm
-SHA1 c681e467e3ad1dceb49ad85845ab6a0b4f4b4b35 
lib/Authen/Passphrase/SaltedDigest.pm
-SHA1 c899b1dd540b115ac8274649c0ac1ed76eea72c0 lib/Authen/Passphrase/VMSPurdy.pm
-SHA1 701b95f420406bb412f27ce12bbabd4e2c388284 t/acceptall.t
-SHA1 c3888dbc795188d78a5498fed6167143d9aaed8f t/bigcrypt.t
-SHA1 a62299eeccc77e682893549122cba19558b6f5b9 t/blowfishcrypt.t
-SHA1 63691c2ef336fddaa8f9a131d8bc32539c5395b5 t/clear.t
-SHA1 022e065813caf9d462df1a52c7c48ad04feafbb0 t/crypt16.t
-SHA1 006723ca9e3d56b57444f55e4cd5c9da76f26410 t/eggdropblowfish.t
-SHA1 eb7784180618d43171420d6c72f7d64210c4c6bf t/extdescrypt.t
-SHA1 e625976a80c74e79718278ce36f50dfa40c72cad t/gendescrypt.t
-SHA1 2fd7ec5f8a364a541d161249bb8132e78846ded7 t/intdescrypt.t
-SHA1 4168299f662fa8c10f2924790fb6a7887c9c3e9d t/lanman.t
-SHA1 b45c94717b50731f513a60a3b8b792d0610c85da t/lanmanhalf.t
-SHA1 b5b993f5a8141fd3562893f69af313b70bc0a074 t/md5crypt.t
-SHA1 183801ccda7843e9a07746395618a9b4e9a5f94b t/mysql323.t
-SHA1 7b4dedc232b78764aa493216818ec5d62944d5cb t/mysql41.t
-SHA1 957e5eb52221c1ccb139984757e00774dc49a398 t/netscapemail.t
-SHA1 0334ae266aa54c7b03019b95bf156afac05ac288 t/nthash.t
-SHA1 1f09f3f17eb280eec2791d2dffdfc3936fabe173 t/phpass.t
-SHA1 904d9a4f76525e2303e4b0c168c68230f223c8de t/pod_cvg.t
-SHA1 65c75abdef6f01a5d1588a307f2ddfe2333dc961 t/pod_syn.t
-SHA1 e3962e176588f0498b58b16c989fa1a674ee861f t/rejectall.t
-SHA1 3a48f131cf21940c853f01690ccf19c18f6a0eac t/smd5.t
-SHA1 dec2ee0c0b163930850cf1942485877a855fe45d t/ssha.t
-SHA1 c9ef4b2237f83808e82f864775684a42c1a4f43c t/traddescrypt.t
-SHA1 66c4083e0684fdc049a1fdcff3e93f0cdf80e120 t/vmspurdy.t
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v1.4.10 (GNU/Linux)
-
-iEYEARECAAYFAk8tO34ACgkQOV9mt2VyAVHkAACeMgXakr7kFcTJWZdRKkMigwe0
-kc0AmgM9GAbozkMGecF0mB2/066nzQyy
-=k1za
------END PGP SIGNATURE-----
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/AcceptAll.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/AcceptAll.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/AcceptAll.pm      
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/AcceptAll.pm      
2026-04-15 21:16:50.000000000 +0200
@@ -43,7 +43,7 @@
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BigCrypt.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BigCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BigCrypt.pm       
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BigCrypt.pm       
2026-04-15 21:16:50.000000000 +0200
@@ -73,9 +73,9 @@
 use Authen::Passphrase::DESCrypt;
 use Carp qw(croak);
 use Crypt::UnixCrypt_XS 0.08 qw(base64_to_block base64_to_int12);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -102,8 +102,7 @@
 
 Causes salt for the first section to be generated randomly.  The value
 given for this attribute must be 12, indicating generation of 12 bits
-of salt.  The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+of salt.
 
 =item B<hash>
 
@@ -150,7 +149,7 @@
                                if defined $salt;
                        croak "\"$value\" is not a valid salt size"
                                unless $value == 12;
-                       $salt = rand_int(1 << $value);
+                       $salt = unpack("S", random_bytes(2)) % 4096;
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if @hashes || defined($passphrase);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BlowfishCrypt.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BlowfishCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/BlowfishCrypt.pm  
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/BlowfishCrypt.pm  
2026-04-15 21:16:50.000000000 +0200
@@ -8,12 +8,12 @@
        use Authen::Passphrase::BlowfishCrypt;
 
        $ppr = Authen::Passphrase::BlowfishCrypt->new(
-               cost => 8,
+               cost => 14,
                salt => "sodium__chloride",
                hash_base64 => "BPZijhMHLvPeNMHd6XwZyNamOXVBTPi");
 
        $ppr = Authen::Passphrase::BlowfishCrypt->new(
-               cost => 8, salt_random => 1,
+               cost => 14, salt_random => 1,
                passphrase => "passphrase");
 
        $ppr = Authen::Passphrase::BlowfishCrypt->from_crypt(
@@ -98,9 +98,9 @@
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
 use Crypt::Eksblowfish::Bcrypt 0.008 qw(bcrypt_hash en_base64 de_base64);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -141,8 +141,7 @@
 =item B<salt_random>
 
 Causes salt to be generated randomly.  The value given for this attribute
-is ignored.  The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+is ignored.
 
 =item B<hash>
 
@@ -194,7 +193,7 @@
                } elsif($attr eq "salt_random") {
                        croak "salt specified redundantly"
                                if exists $self->{salt};
-                       $self->{salt} = rand_bits(128);
+                       $self->{salt} = random_bytes(16);
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Clear.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Clear.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Clear.pm  2012-02-04 
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Clear.pm  2026-04-15 
21:16:50.000000000 +0200
@@ -37,7 +37,7 @@
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Crypt16.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Crypt16.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/Crypt16.pm        
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/Crypt16.pm        
2026-04-15 21:16:50.000000000 +0200
@@ -70,9 +70,9 @@
 use Authen::Passphrase::DESCrypt;
 use Carp qw(croak);
 use Crypt::UnixCrypt_XS 0.08 qw(base64_to_block base64_to_int12);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -99,8 +99,6 @@
 
 Causes salt to be generated randomly.  The value given for this
 attribute must be 12, indicating generation of 12 bits of salt.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash>
 
@@ -147,7 +145,7 @@
                                if defined $salt;
                        croak "\"$value\" is not a valid salt size"
                                unless $value == 12;
-                       $salt = rand_int(1 << $value);
+                       $salt = unpack("S", random_bytes(2)) % 4096;
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if defined($hash) || defined($passphrase);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/DESCrypt.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/DESCrypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/DESCrypt.pm       
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/DESCrypt.pm       
2026-04-15 21:16:50.000000000 +0200
@@ -127,9 +127,9 @@
        base64_to_int24 int24_to_base64
        base64_to_int12 int12_to_base64
 );
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -182,8 +182,6 @@
 
 Causes salt to be generated randomly.  The value given for this attribute
 must be either 12 or 24, giving the number of bits of salt to generate.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash>
 
@@ -260,7 +258,7 @@
                                if exists $self->{salt};
                        croak "\"$value\" is not a valid salt size"
                                unless $value == 12 || $value == 24;
-                       $self->{salt} = rand_int(1 << $value);
+                       $self->{salt} = unpack("I", random_bytes(4)) % (1 << 
$value);
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/EggdropBlowfish.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/EggdropBlowfish.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/EggdropBlowfish.pm        
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/EggdropBlowfish.pm        
2026-04-15 21:16:50.000000000 +0200
@@ -54,7 +54,7 @@
 use Carp qw(croak);
 use Crypt::Eksblowfish::Uklblowfish 0.008;
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManager.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManager.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManager.pm     
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManager.pm     
2026-04-15 21:16:50.000000000 +0200
@@ -59,7 +59,7 @@
 use Authen::Passphrase::LANManagerHalf;
 use Carp qw(croak);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManagerHalf.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManagerHalf.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/LANManagerHalf.pm 
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/LANManagerHalf.pm 
2026-04-15 21:16:50.000000000 +0200
@@ -62,7 +62,7 @@
 use Carp qw(croak);
 use Crypt::DES;
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MD5Crypt.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MD5Crypt.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MD5Crypt.pm       
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MD5Crypt.pm       
2026-04-15 21:16:50.000000000 +0200
@@ -85,9 +85,10 @@
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
 use Crypt::PasswdMD5 1.0 qw(unix_md5_crypt);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
+use MIME::Base64 'encode_base64';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -111,8 +112,6 @@
 
 Causes salt to be generated randomly.  The value given for this
 attribute is ignored.  The salt will be a string of eight base 64 digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash_base64>
 
@@ -145,11 +144,8 @@
                } elsif($attr eq "salt_random") {
                        croak "salt specified redundantly"
                                if exists $self->{salt};
-                       $self->{salt} = "";
-                       for(my $i = 8; $i--; ) {
-                               $self->{salt} .= chr(rand_int(64));
-                       }
-                       $self->{salt} =~ tr#\x00-\x3f#./0-9A-Za-z#;
+                       $self->{salt} = encode_base64(random_bytes(6), '');
+                       $self->{salt} =~ tr{A-Za-z0-9+/=}{./0-9A-Za-z}d;
                } elsif($attr eq "hash_base64") {
                        croak "hash specified redundantly"
                                if exists($self->{hash_base64}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL323.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL323.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL323.pm       
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL323.pm       
2026-04-15 21:16:50.000000000 +0200
@@ -48,7 +48,7 @@
 use Carp qw(croak);
 use Crypt::MySQL 0.03 qw(password);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL41.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL41.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/MySQL41.pm        
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/MySQL41.pm        
2026-04-15 21:16:50.000000000 +0200
@@ -48,7 +48,7 @@
 use Carp qw(croak);
 use Digest::SHA qw(sha1);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NTHash.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NTHash.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NTHash.pm 2012-02-04 
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NTHash.pm 2026-04-15 
21:16:50.000000000 +0200
@@ -52,7 +52,7 @@
 use Carp qw(croak);
 use Digest::MD4 1.2 qw(md4);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NetscapeMail.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NetscapeMail.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/NetscapeMail.pm   
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/NetscapeMail.pm   
2026-04-15 21:16:50.000000000 +0200
@@ -52,10 +52,10 @@
 
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
 use Digest::MD5 1.99_53 ();
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -79,8 +79,6 @@
 
 Causes salt to be generated randomly.  The value given for this attribute
 is ignored.  The salt will be a string of 32 lowercase hexadecimal digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash>
 
@@ -116,7 +114,7 @@
                } elsif($attr eq "salt_random") {
                        croak "salt specified redundantly"
                                if exists $self->{salt};
-                       $self->{salt} = unpack("H*", rand_bits(128));
+                       $self->{salt} = unpack("H*", random_bytes(16));
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/PHPass.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/PHPass.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/PHPass.pm 2012-02-04 
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/PHPass.pm 2026-04-15 
21:16:50.000000000 +0200
@@ -66,10 +66,10 @@
 
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
 use Digest::MD5 1.99_53 ();
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -150,8 +150,6 @@
 
 Causes salt to be generated randomly.  The value given for this
 attribute is ignored.  The salt will be a string of eight base 64 digits.
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash>
 
@@ -201,7 +199,7 @@
                } elsif($attr eq "salt_random") {
                        croak "salt specified redundantly"
                                if exists $self->{salt};
-                       $self->{salt} = _en_base64(rand_bits(48));
+                       $self->{salt} = _en_base64(random_bytes(6));
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/RejectAll.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/RejectAll.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/RejectAll.pm      
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/RejectAll.pm      
2026-04-15 21:16:50.000000000 +0200
@@ -21,7 +21,7 @@
 
 =head1 DESCRIPTION
 
-An object of this class is a passphrase recogniser that accepts any
+An object of this class is a passphrase recogniser that accepts no
 passphrase whatsoever.  This is a subclass of L<Authen::Passphrase>, and
 this document assumes that the reader is familiar with the documentation
 for that class.
@@ -42,7 +42,7 @@
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/SaltedDigest.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/SaltedDigest.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/SaltedDigest.pm   
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/SaltedDigest.pm   
2026-04-15 21:16:50.000000000 +0200
@@ -75,13 +75,13 @@
 
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_bits);
+use Crypt::SysRandom 'random_bytes';
 use Digest 1.00;
 use MIME::Base64 2.21 qw(encode_base64 decode_base64);
 use Module::Runtime 0.011 qw(is_valid_module_name use_module);
 use Params::Classify 0.000 qw(is_string is_blessed);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -137,8 +137,6 @@
 Causes salt to be generated randomly.  The value given for this
 attribute must be a non-negative integer, giving the number of bytes
 of salt to generate.  (The same length as the hash is recommended.)
-The source of randomness may be controlled by the facility described
-in L<Data::Entropy>.
 
 =item B<hash>
 
@@ -186,7 +184,7 @@
                                if exists $self->{salt};
                        croak "\"$value\" is not a valid salt length"
                                unless $value == int($value) && $value >= 0;
-                       $self->{salt} = rand_bits($value * 8);
+                       $self->{salt} = random_bytes($value);
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Authen-Passphrase-0.008/lib/Authen/Passphrase/VMSPurdy.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase/VMSPurdy.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase/VMSPurdy.pm       
2012-02-04 15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase/VMSPurdy.pm       
2026-04-15 21:16:50.000000000 +0200
@@ -81,9 +81,9 @@
 use Authen::DecHpwd 2.003 qw(lgi_hpwd UAI_C_PURDY UAI_C_PURDY_V UAI_C_PURDY_S);
 use Authen::Passphrase 0.003;
 use Carp qw(croak);
-use Data::Entropy::Algorithms 0.000 qw(rand_int);
+use Crypt::SysRandom 'random_bytes';
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 use parent "Authen::Passphrase";
 
@@ -124,8 +124,7 @@
 =item B<salt_random>
 
 Causes salt to be generated randomly.  The value given for this attribute
-is ignored.  The source of randomness may be controlled by the facility
-described in L<Data::Entropy>.
+is ignored.
 
 =item B<hash>
 
@@ -181,7 +180,7 @@
                } elsif($attr eq "salt_random") {
                        croak "salt specified redundantly"
                                if exists $self->{salt};
-                       $self->{salt} = rand_int(65536);
+                       $self->{salt} = unpack "S", random_bytes(2);
                } elsif($attr eq "hash") {
                        croak "hash specified redundantly"
                                if exists($self->{hash}) ||
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Authen-Passphrase-0.008/lib/Authen/Passphrase.pm 
new/Authen-Passphrase-0.009/lib/Authen/Passphrase.pm
--- old/Authen-Passphrase-0.008/lib/Authen/Passphrase.pm        2012-02-04 
15:06:54.000000000 +0100
+++ new/Authen-Passphrase-0.009/lib/Authen/Passphrase.pm        2026-04-15 
21:16:50.000000000 +0200
@@ -18,6 +18,10 @@
 
 =head1 DESCRIPTION
 
+B<THIS MODULE IS DEPRECATED>. For a module that's more extensible, and
+less held-back by legacy algorithms, you may want to use
+L<Crypt::Passphrase|Crypt::Passphrase> instead.
+
 This is the base class for a system of objects that encapsulate
 passphrases.  An object of this type is a passphrase recogniser: its
 job is to recognise whether an offered passphrase is the right one.
@@ -139,7 +143,7 @@
 use MIME::Base64 2.21 qw(decode_base64);
 use Module::Runtime 0.011 qw(use_module);
 
-our $VERSION = "0.008";
+our $VERSION = "0.009";
 
 =head1 CONSTRUCTORS
 
@@ -478,6 +482,8 @@
 
 Checks whether the supplied passphrase is correct.  Returns a truth value.
 
+The passphrase is expected to be octets, not characters.
+
 =item $ppr->passphrase
 
 If a matching passphrase can be easily determined by the passphrase

++++++ README.md ++++++

## Build Results

Current state of perl in openSUSE:Factory is

![Factory build 
results](https://br.opensuse.org/status/openSUSE:Factory/perl-Authen-Passphrase/standard)

The current state of perl in the devel project build (devel:languages:perl)

![Devel project build 
results](https://br.opensuse.org/status/devel:languages:perl/perl-Authen-Passphrase)



++++++ _scmsync.obsinfo ++++++
mtime: 1776323065
commit: 49c7f639fa78677d782c1852fd29b48d121e3a524be899a6a30d6c5df7360aa3
url: https://src.opensuse.org/perl/perl-Authen-Passphrase
revision: 49c7f639fa78677d782c1852fd29b48d121e3a524be899a6a30d6c5df7360aa3
projectscmsync: https://src.opensuse.org/perl/_ObsPrj

++++++ build.specials.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/.gitignore new/.gitignore
--- old/.gitignore      1970-01-01 01:00:00.000000000 +0100
+++ new/.gitignore      2026-04-16 09:04:25.000000000 +0200
@@ -0,0 +1 @@
+.osc

Reply via email to