Searched +refs:text +refs:clone +refs:maintain (Results 1 - 4 of 4) sorted by relevance

/macosx-10.9.5/CPANInternal-140/Digest-SHA/
H A DSHA.pm66 sub clone { subroutine
114 my $text = -T $file;
120 unless ($portable && $text) {
207 $sha_copy = $sha->clone; # if needed, make copy of
287 portable, human-readable text describing the current state of
403 deliberate, and is done to maintain compatibility with the family of
441 =item B<clone>
500 in text files to UNIX format before calculating the digest; on the other
530 I<$sha-E<gt>clone-E<gt>digest> if it's necessary to preserve the
538 I<$sha-E<gt>clone
[all...]
/macosx-10.9.5/CPANInternal-140/Class-DBI/lib/Class/
H A DDBI.pm303 $class->__grouper(Class::DBI::ColumnGrouper->clone($class->__grouper)
1893 is a reference to a hash which holds the column name and error text for
1921 Error->throw(-text => $message, %info)
1933 includes the text of $@ and the original $@ value is available in $info{err}.
2861 Class::DBI will not maintain this lookup index, but give you a separate
/macosx-10.9.5/CPANInternal-140/Class-DBI-v3.0.17/lib/Class/
H A DDBI.pm249 $class->__grouper(Class::DBI::ColumnGrouper->clone($class->__grouper)
1040 my %hash = %{ Clone::clone($class->__meta_info || {}) };
1903 is a reference to a hash which holds the column name and error text for
1931 Error->throw(-text => $message, %info)
1943 includes the text of $@ and the original $@ value is available in $info{err}.
2929 Class::DBI will not maintain this lookup index, but give you a separate
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/libtommath/
H A Dtommath.tex69 This text has been placed in the public domain. This text corresponds to the v0.39 release of the
83 This text is formatted to the international B5 paper size of 176mm wide by 250mm tall using the \LaTeX{}
104 of kind people donating their time, resources and kind words to help support my work. Writing a text of significant
122 how he wanted the project to turn out. I have helped by proofreading the text and we have had several discussions about
133 This text is for people who stop and wonder when first examining algorithms such as RSA for the first time and asks
228 In fact the library discussed within this text has already been used to form a polynomial basis library\footnote{See \url{http://poly.libtomcrypt.org} for more details.}.
236 would truncate excess bits to maintain a fixed level of precision.
253 The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.
263 as the text woul
[all...]

Completed in 269 milliseconds