Result for 27F42BD0288CBC0F8E4658056BE3370C24784897

Query result

Key Value
FileName./usr/lib/python3.6/site-packages/yubico/__pycache__/yubikey_usb_hid.cpython-36.opt-1.pyc
FileSize19767
MD57BF5482110A6DEB83413522276540562
SHA-127F42BD0288CBC0F8E4658056BE3370C24784897
SHA-256ACD64CEEEAB702BCDA7077093D7E0523BB00460E767CD7A14A3606420A9088BC
SSDEEP384:pnWRlZ6Oa5/6UlHEATg3YAcs1N5CkqN0s/R0PpuAQILFE:sl8/BlE3h1jTs/uxuAzLFE
TLSHT10D92818AD6035D3BFD17F7F1281946A09FA482B78B0C919E701D600A0F889D35EBD9F9
hashlookup:parent-total28
hashlookup:trust100

Network graph view

Parents (Total: 28)

The searched file hash is included in 28 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD541E597B25F1A12FCD89243DFAB5E4278
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease3.2
PackageVersion1.3.3
SHA-10E60C1A28EE30DF1F0B36C757E2B94A046CA8EB4
SHA-25670D2EC9F72FDBCEDE7D9055C4A87A11481CE4BD9A656E82CF0F416127F243CDF
Key Value
MD5220D21ABDAC57F8CF3345E0C01999676
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp152.3.2
PackageVersion1.3.3
SHA-11B0B4E608D91087709EF1A78102420E669B3778D
SHA-256738930298706725F6B784052BDF5460FE3555D9E8C36226A89133AA28DFF0697
Key Value
MD5DC6925A216707D5AE78FCFC1B3335324
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease3.2
PackageVersion1.3.3
SHA-136F652397D73D53A40D50A91EBE93F2F8E417414
SHA-25602902898E5F3B5EFFEC6CEC4C6C52E13243D3877C14B40ABD8E959730A325F52
Key Value
MD5646C38C2024A749975C701FF6F16AFAD
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython36-python-yubico
PackageRelease7.9
PackageVersion1.3.3
SHA-13A6336E8256A11773AD3E7D830464CC2EBE32AC6
SHA-2561DAE8F36534313372EE5F72AA4A5DCBC401E46674DDD9DC4DDB0C84644D3362F
Key Value
MD52CF0C1709F6EFBEABDC9DD7F7284B315
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease7.4
PackageVersion1.3.3
SHA-13BC29BBF38096128CDA581F801B368577BEBB9D5
SHA-25647564405D3C93815601FEF18A9557A3562EDA8CB85A0B5FD9346069C73246A36
Key Value
MD57C86B50715FDE4BBE86C5ED0CF1C22C7
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp153.7.4
PackageVersion1.3.3
SHA-13DB4674DE245FAA1540EAC6A7E18B4F1A97FB26E
SHA-256AE6FC1E77494227B2AE945652806370D9EA147EE013023D3C57D58011896B47F
Key Value
MD59B5CB9C8E5E3787DA3EC7E5A219D03EB
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp153.3.1
PackageVersion1.3.3
SHA-147AE29198D735542DCC8214F8B5E83CF1DB53889
SHA-256BF97AC45F4F0DBA26480DD2C3FF0236CC2E5581F1F5C078912590239E8440FE2
Key Value
MD5AE446A0AE523F296AAC499599DEFC0A2
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp151.4.2
PackageVersion1.3.3
SHA-1522431322578D55865A5D253FA5BE8D47BCC22D3
SHA-256E4B6C954916024B9CCA6EDB3611EF4A1141BCF3C05A53FD4AE5038BDDC7A7912
Key Value
MD5C1EB325C514BE752B3B74B287F8217E8
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp153.3.3
PackageVersion1.3.3
SHA-1592A1CC25744050C47998E4FF9FDCE259353EC0B
SHA-25609EA2EC4763DF5CFA74D2E28FED82CC28F60DC91049CBAB843B481E9355F1184
Key Value
MD51AD0737FBDB1A4BFEA767D1E8D79CA84
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp152.3.2
PackageVersion1.3.3
SHA-161E81458F8862977AD1FBA5551C2DE52CF405EBA
SHA-256ADF991C54A054B26207F63126B618EE63509705BBDDE8214D571ED96EE605046