view release on metacpan or search on metacpan
src/tccgen.c view on Meta::CPAN
pstrcat(buf, buf_size, varstr);
}
no_var: ;
}
/* verify type compatibility to store vtop in 'dt' type, and generate
casts if needed. */
static void gen_assign_cast(CType *dt)
{
CType *st, *type1, *type2, tmp_type1, tmp_type2;
char buf1[256], buf2[256];
view all matches for this distribution
view release on metacpan or search on metacpan
inc/inc_Module-Build/Module/Build.pm view on Meta::CPAN
[version 0.2806]
This is just like the C<test> action, but doesn't actually build the
distribution first, and doesn't add F<blib/> to the load path, and
therefore will test against a I<previously> installed version of the
distribution. This can be used to verify that a certain installed
distribution still works, or to see whether newer versions of a
distribution still pass the old regression tests, and so on.
=item skipcheck
view all matches for this distribution
view release on metacpan or search on metacpan
share/docs/data-218318ee90d3522428760e464306d0ed.js view on Meta::CPAN
If you are unsure which license is appropriate for your use, please contact the sales department
at http://www.sencha.com/contact.
Build date: 2013-04-03 15:07:25
*/
Docs = {"data":{"localStorageDb":"ext-3","guides":[],"search":[{"meta":{},"icon":"icon-class","fullName":"Ext.CompositeElement","sort":1,"name":"CompositeElement","url":"#!/api/Ext.CompositeElement"},{"meta":{},"icon":"icon-method","fullName":"Ext.Co...
view all matches for this distribution
view release on metacpan or search on metacpan
my $command = 'xgboost' . $Config{'_exe'};
probe sub {
my ($library) = FFI::CheckLib::find_lib_or_die(
lib => $name,
verify => sub {
my ( $name, $libpath ) = @_;
my $platypus = FFI::Platypus->new;
$platypus->lib($libpath);
my $f =
view all matches for this distribution
view release on metacpan or search on metacpan
builder/Alien/Xmake/Builder.pm view on Meta::CPAN
my $dest_str = "$dest";
# Try HTTP::Tiny + IO::Socket::SSL
if ( eval { require IO::Socket::SSL; 1 } ) {
say 'Downloading with HTTP::Tiny...';
my $http = HTTP::Tiny->new( verify_SSL => 1 );
my $res = $http->mirror( $url, $dest_str );
if ( $res->{success} ) {
return 1;
}
say "HTTP::Tiny failed: $res->{status} $res->{reason}";
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.87.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
include/boost/config/compiler/clang.hpp view on Meta::CPAN
// This issue also affects C++11 mode, but C++11 constexpr requires return stmt.
// Therefore we don't care such case.
//
// Note that we can't check Clang version directly as the numbering system changes depending who's
// creating the Clang release (see https://github.com/boostorg/config/pull/39#issuecomment-59927873)
// so instead verify that we have a feature that was introduced at the same time as working C++14
// constexpr (generic lambda's in this case):
//
#if !__has_feature(__cxx_generic_lambdas__) || !__has_feature(__cxx_relaxed_constexpr__)
# define BOOST_NO_CXX14_CONSTEXPR
#endif
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Alien/bz2/Installer.pm view on Meta::CPAN
=over 4
=item test
Specifies the test type that should be used to verify the integrity
of the system bz2. Generally this should be
set according to the needs of your module. Should be one of:
=over 4
=item compile
use L<test_compile_run|Alien::bz2::Installer#test_compile_run> to verify.
This is the default.
=item ffi
use L<test_ffi|Alien::bz2::Installer#test_ffi> to verify
=item both
use both
L<test_compile_run|Alien::bz2::Installer#test_compile_run>
and
L<test_ffi|Alien::bz2::Installer#test_ffi>
to verify
=back
=item alien
lib/Alien/bz2/Installer.pm view on Meta::CPAN
Empty directory to be used to extract the bz2
source and to build from.
=item test
Specifies the test type that should be used to verify the integrity
of the build after it has been installed. Generally this should be
set according to the needs of your module. Should be one of:
=over 4
=item compile
use L<test_compile_run|Alien::bz2::Installer#test_compile_run> to verify.
This is the default.
=item ffi
use L<test_ffi|Alien::bz2::Installer#test_ffi> to verify
=item both
use both
L<test_compile_run|Alien::bz2::Installer#test_compile_run>
and
L<test_ffi|Alien::bz2::Installer#test_ffi>
to verify
=back
=back
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.79.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
libcares/CHANGES.0 view on Meta::CPAN
- James Bursa reported a major memory problem when resolving multi-IP names
and I found and fixed the problem. It was added by Ashish Sharma's patch
two days ago.
When I then tried to verify multiple entries in /etc/hosts after my fix, I
got another segfault and decided this code was not ripe for inclusion and I
reverted the patch.
* June 2 2007
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.88.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.87.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
patch/flex-2.6.4.diff view on Meta::CPAN
/* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
/* PURPOSE. */
-#include "flexdef.h"
#include "parse.h"
extern bool tablesverify, tablesext;
extern int trlcontxt; /* Set in parse.y for each rule. */
@@ -433,6 +438,8 @@ M4QEND "]""]"
yyset_extra ACTION_M4_IFDEF("M4""_YY_NO_SET_EXTRA", ! option_sense);
yyget_leng ACTION_M4_IFDEF("M4""_YY_NO_GET_LENG", ! option_sense);
yyget_text ACTION_M4_IFDEF("M4""_YY_NO_GET_TEXT", ! option_sense);
patch/flex-2.6.4.diff view on Meta::CPAN
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -DTEST_IS_REENTRANT -c -o $@ $<
@@ -492,16 +492,16 @@ VER_LOG_COMPILER = $(SHELL) $(srcdir)/testwrapper.sh
AM_VER_LOG_FLAGS = -d $(builddir) -i $(srcdir)/tableopts.txt -r -t
tableopts_ver_nr%.c: tableopts.l4 $(FLEX)
- $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) --tables-file="tableopts_ver_nr$*.ver.tables" --tables-verify $* -o $@ $<
+ $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) --tables-file="tableopts_ver_nr$*.ver.tables" --tables-verify $(subst _F,F,$*) -o $@ $<
-tableopts_ver_nr%.$(OBJEXT): tableopts_ver_nr%.c
+tableopts_ver_nr%.$(OBJEXT): tableopts_ver_nr%.c
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -c -o $@ $<
tableopts_ver_nr%.ver$(EXEEXT): tableopts_ver_nr%.$(OBJEXT)
$(AM_V_CCLD)$(LINK) -o $@ $^
tableopts_ver_r%.c: tableopts.l4 $(FLEX)
- $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) -R --tables-file="tableopts_ver_r$*.ver.tables" --tables-verify $* -o $@ $<
+ $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) -R --tables-file="tableopts_ver_r$*.ver.tables" --tables-verify $(subst _F,F,$*) -o $@ $<
-tableopts_ver_r%.$(OBJEXT): tableopts_ver_r%.c
+tableopts_ver_r%.$(OBJEXT): tableopts_ver_r%.c
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -DTEST_IS_REENTRANT -c -o $@ $<
diff --git a/tests/Makefile.in b/tests/Makefile.in
patch/flex-2.6.4.diff view on Meta::CPAN
tableopts_ser_r%.$(OBJEXT): tableopts_ser_r%.c
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -DTEST_IS_REENTRANT -c -o $@ $<
tableopts_ver_nr%.c: tableopts.l4 $(FLEX)
- $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) --tables-file="tableopts_ver_nr$*.ver.tables" --tables-verify $* -o $@ $<
+ $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) --tables-file="tableopts_ver_nr$*.ver.tables" --tables-verify $(subst _F,F,$*) -o $@ $<
-tableopts_ver_nr%.$(OBJEXT): tableopts_ver_nr%.c
+tableopts_ver_nr%.$(OBJEXT): tableopts_ver_nr%.c
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -c -o $@ $<
tableopts_ver_nr%.ver$(EXEEXT): tableopts_ver_nr%.$(OBJEXT)
$(AM_V_CCLD)$(LINK) -o $@ $^
tableopts_ver_r%.c: tableopts.l4 $(FLEX)
- $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) -R --tables-file="tableopts_ver_r$*.ver.tables" --tables-verify $* -o $@ $<
+ $(AM_V_LEX)$(FLEX) --unsafe-no-m4-sect3-escape -P $(subst -,_,$(basename $(*F))) -R --tables-file="tableopts_ver_r$*.ver.tables" --tables-verify $(subst _F,F,$*) -o $@ $<
-tableopts_ver_r%.$(OBJEXT): tableopts_ver_r%.c
+tableopts_ver_r%.$(OBJEXT): tableopts_ver_r%.c
$(AM_V_CC)$(COMPILE) -DTEST_HAS_TABLES_EXTERNAL -DTEST_IS_REENTRANT -c -o $@ $<
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.87.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.87.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
libsecp256k1/build/src/CMakeFiles/exhaustive_tests.dir/compiler_depend.ts
libsecp256k1/build/src/CMakeFiles/exhaustive_tests.dir/depend.make
libsecp256k1/build/src/CMakeFiles/exhaustive_tests.dir/flags.make
libsecp256k1/build/src/CMakeFiles/exhaustive_tests.dir/link.txt
libsecp256k1/build/src/CMakeFiles/exhaustive_tests.dir/progress.make
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/DependInfo.cmake
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/build.make
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/cmake_clean.cmake
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/compiler_depend.make
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/compiler_depend.ts
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/depend.make
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/flags.make
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/link.txt
libsecp256k1/build/src/CMakeFiles/noverify_tests.dir/progress.make
libsecp256k1/build/src/CMakeFiles/progress.marks
libsecp256k1/build/src/CMakeFiles/secp256k1.dir/DependInfo.cmake
libsecp256k1/build/src/CMakeFiles/secp256k1.dir/build.make
libsecp256k1/build/src/CMakeFiles/secp256k1.dir/cmake_clean.cmake
libsecp256k1/build/src/CMakeFiles/secp256k1.dir/compiler_depend.make
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Alien/libvas.pm view on Meta::CPAN
=head1 PLATFORMS
libvas claims compatiblity with WinAPI's ReadProcessMemory/WriteProcessMeory, macOS/GNU Hurd Mach API, Linux procfs /proc/pid/mem, ptrace (2), and process_vm_readv/process_vm_writev, SunOS procfs /proc/pid/as and finally BSD with ptrace (2) or procfs...
I don't have all these systems to verify this. So please report bugs you might run into, preferably on Github. :-)
=cut
1;
view all matches for this distribution
view release on metacpan or search on metacpan
libuv/ChangeLog view on Meta::CPAN
2015.08.20, Version 1.7.1 (Stable), 44f4b6bd82d8ae4583ccc4768a83af778ef69f85
Changes since version 1.7.0:
* doc: document the procedure for verifying releases (Saúl Ibarra Corretgé)
* doc: add note about Windows binaries to the README (Saúl Ibarra Corretgé)
* doc: use long GPG IDs in MAINTAINERS.md (Saúl Ibarra Corretgé)
libuv/ChangeLog view on Meta::CPAN
* darwin: use uv_fs_sendfile() use the sendfile api correctly (Wynn Wilkes)
* windows: call idle handles on every loop iteration, something the unix
implementation already did (Bert Belder)
* test: update the idle-starvation test to verify that idle handles are called
in every loop iteration (Bert Belder)
* unix, windows: ensure that uv_run() in RUN_ONCE mode calls timers that expire
after blocking (Ben Noordhuis)
view all matches for this distribution
view release on metacpan or search on metacpan
inc/inc_Module-Load-Conditional/Module/Load/Conditional.pm view on Meta::CPAN
=head1 Methods
=head1 $href = check_install( module => NAME [, version => VERSION, verbose => BOOL ] );
C<check_install> allows you to verify if a certain module is installed
or not. You may call it with the following arguments:
=over 4
=item module
The name of the module you wish to verify -- this is a required key
=item version
The version this module needs to be -- this is optional
inc/inc_Module-Load-Conditional/Module/Load/Conditional.pm view on Meta::CPAN
A boolean value indicating whether or not the module was found to be
at least the version you specified. If you did not specify a version,
uptodate will always be true if the module was found.
If no parsable version was found in the module, uptodate will also be
true, since C<check_install> had no way to verify clearly.
=back
=cut
view all matches for this distribution
view release on metacpan or search on metacpan
t/01-signature.t view on Meta::CPAN
"Set the environment variable TEST_SIGNATURE to enable this test.";
}
elsif (!eval { require Module::Signature; 1 }) {
plan skip_all =>
"Next time around, consider installing Module::Signature, ".
"so you can verify the integrity of this distribution.";
}
elsif ( !-e 'SIGNATURE' ) {
plan skip_all => "SIGNATURE not found";
}
elsif ( -s 'SIGNATURE' == 0 ) {
t/01-signature.t view on Meta::CPAN
}
else {
plan tests => 1;
}
my $ret = Module::Signature::verify();
SKIP: {
skip "Module::Signature cannot verify", 1
if $ret eq Module::Signature::CANNOT_VERIFY();
cmp_ok $ret, '==', Module::Signature::SIGNATURE_OK(), "Valid signature";
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AlignAid.pm view on Meta::CPAN
croak "$arg{queue} is not a supported queue type";
}
$arg{program} = defined( $arg{program} ) ? $arg{program} : 'blastn';
$arg{chunk} = defined( $arg{chunk} ) ? $arg{chunk} : 1;
# verify all paths are absolute paths
$arg{db} = File::Spec->rel2abs( $arg{db} );
$arg{dir} = File::Spec->rel2abs( $arg{dir} );
$arg{fasta} = File::Spec->rel2abs( $arg{fasta} );
$arg{prog_name} = $arg{program};
$arg{program} = `which $arg{program}`;
lib/AlignAid.pm view on Meta::CPAN
);
# actually start job (it's been holding up til now)
$pp->start();
# verify job made it onto the queue
if ( $pp->is_in_queue(1) ) {
push @jobs, $pp;
}
else {
$ret_val = 0;
lib/AlignAid.pm view on Meta::CPAN
q => 'long',
e => $error_file,
o => $out_file,
);
# verify job made it onto the queue
if ( $pp->is_in_queue(1) ) {
push @jobs, $pp;
}
else {
warn "job didn't get submitted!";
view all matches for this distribution
view release on metacpan or search on metacpan
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warner_nocontext|||vn
view all matches for this distribution
view release on metacpan or search on metacpan
- the actual 'patch' input;
- a data section for 'applypatch'.
* When applied through 'applypatch', the patch kit will be
extensively verified for integrity. Heuristics are applied to the
current directory to verify that it is indeed the expected source
directory. This directory is prepared for the patching, i.e. new
files and directories are created if required. Next, the patch data
is passed to the 'patch' program for the actual patching. Finally
file modes and timestamps are adjusted.
view all matches for this distribution
view release on metacpan or search on metacpan
Crypt::OpenSSL::PKCS12 pkcs12
char *pwd
CODE:
if (!(PKCS12_verify_mac(pkcs12, pwd, strlen(pwd)))) {
croak("PKCS12_verify_mac: \n%s", ssl_error(aTHX));
}
RETVAL = (PKCS12_verify_mac(pkcs12, pwd, strlen(pwd))) ? &PL_sv_yes : &PL_sv_no;
OUTPUT:
RETVAL
SV*
#else
tmaciter = pkcs12->mac->iter;
BIO_printf(bio, "MAC Iteration %ld\n",
tmaciter != NULL ? ASN1_INTEGER_get(tmaciter) : 1L);
/* If we enter empty password try no password first */
if (!PKCS12_verify_mac(pkcs12, pwd, -1)) {
BIO_printf(bio, "Mac verify error: invalid password?\n");
ERR_print_errors(bio);
goto end;
}
BIO_printf(bio, "MAC verified OK\n");
end:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Alt/Crypt/RSA/BigInt.pm view on Meta::CPAN
=head1 PERFORMANCE
Performance using GMP is 3-10 times faster than Crypt::RSA 1.99.
Using Math::BigInt::Pari, it is about half the speed at signing, and
on par when verifying.
If neither GMP nor Pari are available, performance is very slow, from
10x to 200x slower. However this is an environment where the original
code could not run.
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.88.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
t/04unique_sieves.t view on Meta::CPAN
use Test::More;
use Math::Prime::FastSieve qw( primes );
# A test in Inline::CPP v0.33_009 looked like one object instance might be
# binding to another object instance's data. This test is to verify that's
# not happening here.
note('Testing that multiple sieve objects bind properly.');
# Build a list of sieve sizes and number of primes in a given sieve.
view all matches for this distribution
view release on metacpan or search on metacpan
t/newrelic_agent_ffi__live.t view on Meta::CPAN
# this is the default, and verifies that the NR agent class
# at least won't CRASH when you instrument your application
# with it.
# - LIVE - if you set NEWRELIC_AGENT_FFI_TEST it will send metrics to NR
# using the key as specified in that environment variable.
# You can then login to your NR account and verify that stuff works.
my $license_key = 'xxxx-xxxx';
my $nr;
my $end_transaction_code = $license_key ? 0 : -65537;
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.73.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warner_nocontext|||vn
view all matches for this distribution