Result for 6CE2C16A60CF3061358ACD8B48D33D461459B1BD

Query result

Key Value
FileName./usr/lib/python3/dist-packages/python_yubico-1.3.3.egg-info/PKG-INFO
FileSize651
MD56A774B27B730CFDABE2EB3F9DA1AFFBB
SHA-16CE2C16A60CF3061358ACD8B48D33D461459B1BD
SHA-256C44ED618C96DCF120ED02A9279F787831BFF86C561C18678B0D24B9AD889BB4E
SSDEEP12:DptaWcOF2Ls5v6wImZKueXBQStPQI84/GZZjgjR5P2dj5R:DfjcORvpImreX+oQIFnPI
TLSHT1C4F09E4039C0A8FDBF96CC8D16D1D3A74E3916019D8C645CB4F95214D9A2956927E12D
hashlookup:parent-total36
hashlookup:trust100

Network graph view

Parents (Total: 36)

The searched file hash is included in 36 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD58B3603F70C717EA950696C8EEE93DBD6
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.7.2
PackageVersion1.3.3
SHA-1016AE93020BED68F12140FF920147D4956A15EBD
SHA-25636224D756F8935EAC9AC7F1D2E0157B342F04ADC06D4A032E2FE3BD2FD1D6F04
Key Value
MD5D47B4EBEA734F8D1845A2C43C472945F
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp150.2.1
PackageVersion1.3.3
SHA-1065EFC2A89D524E13B53079FF0A0DBB9850FAA7A
SHA-2568E52DB231B402B36646E4B9CBE695C6293045A15BAC49D9C7798BB4D07149070
Key Value
MD54341336CD3EACF852982F6F55C497EE8
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp152.7.3
PackageVersion1.3.3
SHA-106BC2BD19ECEB39E6C5707EA78010C94545D92D4
SHA-256B96F4E22D016FB291489CAB2C310CE8F41363CD2E6FEDD68FB4031A437B1912C
Key Value
MD5DB78FBAC9BF87E871BC41A892279AD3D
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.3.1
PackageVersion1.3.3
SHA-106EBC24B0D2E791F15F3016B4B230BA9FF9F5BBD
SHA-256041D159A0BB17710674490CC46DC509675431EC7387E0BEB0B10311422CF8D2D
Key Value
MD5B55542953D70B9AC4662BEFC16ADF6DA
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageRelease7.3
PackageVersion1.3.3
SHA-10A36B3ACE119605BA41DA11843F95F55D8BEDA49
SHA-256A602BB237D6915A7AE06E0F98141E57E94C0A632B33AB20DABFDC1ED3B8D1AA9
Key Value
MD521335601BC0C2B4AF87963770BF3F727
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.3.3
PackageVersion1.3.3
SHA-10FDDAAB208B089A87377945E492401C4700B871B
SHA-2566B9FCCBB8D7BC1ED3DE83E7F3BE40B53A766992529010F99FD64CB56A47ED15C
Key Value
MD541BD9B6F1BD5FCFA2AE254E1F18AFCEA
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageRelease3.2
PackageVersion1.3.3
SHA-120C9BF030825C27EAD4221E7283A7D8F81CD575D
SHA-25617EE95D1CB5D52C5C892362D4BDBE980B1A3741BA789D71C2D14556EB4015985
Key Value
MD5FDC2F92DC7D66BDFE798560F9D8246DB
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython2-python-yubico
PackageReleaselp153.7.4
PackageVersion1.3.3
SHA-122F2E7CD02AC868DEB35B0B334871E8FDF75A446
SHA-256BDEFC156A4FCD77A65EA07C4CDB7C5EEB63888E7357D26A604C051C7BAE3FC74
Key Value
MD5D622AEE83411273554252EC81BA6A087
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython38-python-yubico
PackageRelease2.1
PackageVersion1.3.3
SHA-12B734912178E3575B19F585D38E207EFBB04E1FF
SHA-2565271EB0678382BB29CB0E773ADE6443A9DC96163F1A51984404B7CE3F2741564
Key Value
MD509626FDEB499216D3EFF04BF3FE6665C
PackageArchnoarch
PackageDescriptionThe YubiKey is a hardware token for authentication. The main mode of the YubiKey is entering a one time password (or a strong static password) by acting as a USB HID device, but there are things one can do with bi-directional communication: 1. Configuration. The yubikey_config class should be a feature-wise complete implementation of everything that can be configured on YubiKeys version 1.3 to 3.x (besides deprecated functions in YubiKey 1.x). See examples/configure_nist_test_key for an example. 2. Challenge-response. YubiKey 2.2 and later supports HMAC-SHA1 or Yubico challenge-response operations. See examples/nist_challenge_response for an example.
PackageNamepython39-python-yubico
PackageRelease2.1
PackageVersion1.3.3
SHA-1322EA458682437C751DE08945618198FC8379E8A
SHA-256AC946E0CB7290540F61142CD20AA0E1C9DA1794D70A002A231EE9754DFE9E8EB