===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm-47-		# make sure we use the same function that RefHash is using for ref keys
libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm:48:		my $kstr = Tie::RefHash::refaddr($k);
libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm-49-		my $entry = [$k, $v];
##############################################
libtie-refhash-weak-perl-0.09/t/overload.t-38-is_deeply
libtie-refhash-weak-perl-0.09/t/overload.t:39:	[sort(map Tie::RefHash::refaddr($_), keys %hash)],
libtie-refhash-weak-perl-0.09/t/overload.t:40:	[sort(map Tie::RefHash::refaddr($_), @refs     )],
libtie-refhash-weak-perl-0.09/t/overload.t-41-	'elements with overloaded keys can be created';