Result for 18E7D0E7D00E0D9C4627D5FD7F72ACCADC520E90

Query result

Key Value
CRC32528EA15F
FileName./usr/lib/python3/dist-packages/python_yubico-1.3.3.egg-info/top_level.txt
FileSize7
MD57CD6C3DE73D64878342F07E0D7744947
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
ProductCode{'ApplicationType': 'Operating System', 'Language': 'English', 'MfgCode': '2194', 'OpSystemCode': '51', 'ProductCode': '17393', 'ProductName': 'Fedora 23 Server 32-bit', 'ProductVersion': '2015'}
SHA-118E7D0E7D00E0D9C4627D5FD7F72ACCADC520E90
SHA-2566C72F71FBDDCA2F5D23353D3253A7D20DBCAAFB5D1A92669085F6BC08B2ED863
SSDEEP3:hsG0n:90n
SpecialCode
TLSH
dbnsrl_modern_rds
insert-timestamp1646987596.2909267
sourceNSRL
hashlookup:parent-total113
hashlookup:trust100

Network graph view

Parents (Total: 113)

The searched file hash is included in 113 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD58B3603F70C717EA950696C8EEE93DBD6
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.7.2
PackageVersion1.3.3
SHA-1016AE93020BED68F12140FF920147D4956A15EBD
SHA-25636224D756F8935EAC9AC7F1D2E0157B342F04ADC06D4A032E2FE3BD2FD1D6F04
Key Value
MD5DE7FACE8E4EF5ED2A72C95F63D2ADF82
PackageArchnoarch
PackageDescriptionPure-python library for interacting with Yubikeys. For Python 3.
PackageMaintainerAlmaLinux Packaging Team <packager@almalinux.org>
PackageNamepython3-yubico
PackageRelease9.module_el8.3.0+2037+0bba7131
PackageVersion1.3.2
SHA-1017EBF3A4584E9B4F68A185E3170DC90C24BDEDC
SHA-256B7293CA1A7988E8085AA4FFC5E53A663423B7F533CE22A64BA9BC1BB02E17EF6
Key Value
MD59184584654381F15C3C01CE876F5A1F8
PackageArchnoarch
PackageDescriptionPure-python library for interacting with Yubikeys
PackageMaintainerFedora Project
PackageNamepython-yubico
PackageRelease6.fc24
PackageVersion1.2.3
SHA-101FE070DA302F1D6429CD258B2F1524258CA5BF2
SHA-25662F7A5EC52D6C4D8301FF2B10F3C44FD19E28222021DBF75A395E0C40444C0A0
Key Value
MD569F563A78E8E56C6A246187F50B7A756
PackageArchnoarch
PackageDescriptionPure-python library for interacting with Yubikeys
PackageMaintainerFedora Project
PackageNamepython-yubico
PackageRelease3.fc21
PackageVersion1.2.1
SHA-1039B9BC26592832927E426447730F7A54E768CE3
SHA-256AB96B3378120E5AC5A0903EEA27AFA4F4CB22360B20DDC4D7D453BFAC4E29257
Key Value
MD5D47B4EBEA734F8D1845A2C43C472945F
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp150.2.1
PackageVersion1.3.3
SHA-1065EFC2A89D524E13B53079FF0A0DBB9850FAA7A
SHA-2568E52DB231B402B36646E4B9CBE695C6293045A15BAC49D9C7798BB4D07149070
Key Value
MD54341336CD3EACF852982F6F55C497EE8
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp152.7.3
PackageVersion1.3.3
SHA-106BC2BD19ECEB39E6C5707EA78010C94545D92D4
SHA-256B96F4E22D016FB291489CAB2C310CE8F41363CD2E6FEDD68FB4031A437B1912C
Key Value
MD5DB78FBAC9BF87E871BC41A892279AD3D
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.3.1
PackageVersion1.3.3
SHA-106EBC24B0D2E791F15F3016B4B230BA9FF9F5BBD
SHA-256041D159A0BB17710674490CC46DC509675431EC7387E0BEB0B10311422CF8D2D
Key Value
MD54F3A7B5CA91299CDB1E19EA27EC0162A
PackageArchnoarch
PackageDescriptionPure-python library for interacting with Yubikeys
PackageMaintainerFedora Project
PackageNamepython-yubico
PackageRelease6.fc24
PackageVersion1.2.3
SHA-108C2016169E947EDC58E526196ED87E59E9126F8
SHA-2568C654D452A88E1CC30D3B6CE04DE8FB8BE382EF0F479987BF1E257DD025FB5FA
Key Value
MD5B55542953D70B9AC4662BEFC16ADF6DA
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageRelease7.3
PackageVersion1.3.3
SHA-10A36B3ACE119605BA41DA11843F95F55D8BEDA49
SHA-256A602BB237D6915A7AE06E0F98141E57E94C0A632B33AB20DABFDC1ED3B8D1AA9
Key Value
MD56B8718B93F191E01E2E9DDDB052D9333
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython38-python-yubico
PackageRelease7.14
PackageVersion1.3.3
SHA-10E120A65B52F27266078DAF48ABC876AEBFCBA5A
SHA-2561150ECC39D6C8238D6CC69F8D86FDF8752BA88088FF101A664A261795EE343BC