=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm-47- # make sure we use the same function that RefHash is using for ref keys libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm:48: my $kstr = Tie::RefHash::refaddr($k); libtie-refhash-weak-perl-0.09/lib/Tie/RefHash/Weak.pm-49- my $entry = [$k, $v]; ############################################## libtie-refhash-weak-perl-0.09/t/overload.t-38-is_deeply libtie-refhash-weak-perl-0.09/t/overload.t:39: [sort(map Tie::RefHash::refaddr($_), keys %hash)], libtie-refhash-weak-perl-0.09/t/overload.t:40: [sort(map Tie::RefHash::refaddr($_), @refs )], libtie-refhash-weak-perl-0.09/t/overload.t-41- 'elements with overloaded keys can be created';