Result for 355E6DB7C0B7CF4108014AAD4259BBADFB34A220

Query result

Key Value
FileName./usr/lib/python3.6/site-packages/python_yubico-1.3.3-py3.6.egg-info/PKG-INFO
FileSize662
MD57E0F92449D96445F07CC31E68B4F698D
SHA-1355E6DB7C0B7CF4108014AAD4259BBADFB34A220
SHA-25611C00CE69D0101532CB0EEED37359282C685F065D771C6F7235F0FFBFD754FC0
SSDEEP12:DVtaWcOF2Ls5v6wImZKuyQStPQI84/GZZjgjR5P2dj5xU3n:DLjcORvpImrhoQIFnPD3
TLSHT19101FE4039C09CFDBF96CC8D16D083A70E290A018D8C389CB0F86214D872562D2BE16D
hashlookup:parent-total34
hashlookup:trust100

Network graph view

Parents (Total: 34)

The searched file hash is included in 34 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD56B8718B93F191E01E2E9DDDB052D9333
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython38-python-yubico
PackageRelease7.14
PackageVersion1.3.3
SHA-10E120A65B52F27266078DAF48ABC876AEBFCBA5A
SHA-2561150ECC39D6C8238D6CC69F8D86FDF8752BA88088FF101A664A261795EE343BC
Key Value
MD541E597B25F1A12FCD89243DFAB5E4278
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease3.2
PackageVersion1.3.3
SHA-10E60C1A28EE30DF1F0B36C757E2B94A046CA8EB4
SHA-25670D2EC9F72FDBCEDE7D9055C4A87A11481CE4BD9A656E82CF0F416127F243CDF
Key Value
MD554223A936BE728814B8256B997E0ED4E
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython39-python-yubico
PackageRelease7.24
PackageVersion1.3.3
SHA-113B95C69D87262FDE53545F899BC2705DF8EBA4D
SHA-2566B3B695383756409467496FFA1EF01727BE4BD2B5E64E565795FC11E089D64C2
Key Value
MD5220D21ABDAC57F8CF3345E0C01999676
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp152.3.2
PackageVersion1.3.3
SHA-11B0B4E608D91087709EF1A78102420E669B3778D
SHA-256738930298706725F6B784052BDF5460FE3555D9E8C36226A89133AA28DFF0697
Key Value
MD5B6C53A467F5E1CDB1D92D80B5AE1A21B
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython310-python-yubico
PackageRelease7.24
PackageVersion1.3.3
SHA-123008C27318FF3D71FE3C432CBEC0EB0DFD8D8A1
SHA-256F9CBF69AC0CD4611D15AFCF0DDCD3B2FB79C894CCA23C44A64A46A144D15620F
Key Value
MD5DC6925A216707D5AE78FCFC1B3335324
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease3.2
PackageVersion1.3.3
SHA-136F652397D73D53A40D50A91EBE93F2F8E417414
SHA-25602902898E5F3B5EFFEC6CEC4C6C52E13243D3877C14B40ABD8E959730A325F52
Key Value
MD5646C38C2024A749975C701FF6F16AFAD
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython36-python-yubico
PackageRelease7.9
PackageVersion1.3.3
SHA-13A6336E8256A11773AD3E7D830464CC2EBE32AC6
SHA-2561DAE8F36534313372EE5F72AA4A5DCBC401E46674DDD9DC4DDB0C84644D3362F
Key Value
MD52CF0C1709F6EFBEABDC9DD7F7284B315
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageRelease7.4
PackageVersion1.3.3
SHA-13BC29BBF38096128CDA581F801B368577BEBB9D5
SHA-25647564405D3C93815601FEF18A9557A3562EDA8CB85A0B5FD9346069C73246A36
Key Value
MD57C86B50715FDE4BBE86C5ED0CF1C22C7
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp153.7.4
PackageVersion1.3.3
SHA-13DB4674DE245FAA1540EAC6A7E18B4F1A97FB26E
SHA-256AE6FC1E77494227B2AE945652806370D9EA147EE013023D3C57D58011896B47F
Key Value
MD59B5CB9C8E5E3787DA3EC7E5A219D03EB
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython3-python-yubico
PackageReleaselp153.3.1
PackageVersion1.3.3
SHA-147AE29198D735542DCC8214F8B5E83CF1DB53889
SHA-256BF97AC45F4F0DBA26480DD2C3FF0236CC2E5581F1F5C078912590239E8440FE2