Key | Value |
---|---|
FileName | ./usr/lib/python3.9/site-packages/wormhole/__pycache__/_order.cpython-39.pyc |
FileSize | 3143 |
MD5 | E789B2CD866D70C61E0B70624F9119DD |
SHA-1 | 05116E048759A36DDD491CD79702EB6219BEE380 |
SHA-256 | 24368E33F0673DF8A1DAF64214C9706C95EB495095F9705DC5034ECDB3E6AC5B |
SSDEEP | 96:6rT7JOS0xWjk4l2b22eoO2E2E+Ml+qATEyJ1:6bR0a2J1LE+8LATh |
TLSH | T16E5122C4EA434D5BFE77F6F8A55E27605292837663C820B60A10904F7D0B2E43A705DB |
hashlookup:parent-total | 2 |
hashlookup:trust | 60 |
The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | 4C5A9056C65925EA050DD87EA901FA9D |
PackageArch | noarch |
PackageDescription | Get things from one computer to another, safely. This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized. |
PackageMaintainer | Fedora Project |
PackageName | python3-magic-wormhole |
PackageRelease | 3.fc33 |
PackageVersion | 0.12.0 |
SHA-1 | AD2850913CA768AAADC876CDCB942EA18CD9D8F5 |
SHA-256 | CEFBB14E493DED8D2DD6916E816B449435202A0A568F5C7D60B1F4CBA6280DBF |
Key | Value |
---|---|
MD5 | 7F170AA7983A53E1D2259605BD7F1222 |
PackageArch | noarch |
PackageDescription | Get things from one computer to another, safely. This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized. |
PackageMaintainer | Fedora Project |
PackageName | python3-magic-wormhole |
PackageRelease | 4.fc34 |
PackageVersion | 0.12.0 |
SHA-1 | 1CF9C56F7E4B4F5DCF13CA9B6A2FC749FA2FAABD |
SHA-256 | 92CC49250C4AA80DB28D866AAAFF83D70B912628DD7DD96E690CDC6CF2E9CC9A |