Result for 6F51FE3E9D8631150B5DFD8855C056AF0C4E4436

Query result

Key Value
FileName./usr/lib/python2.7/site-packages/backports/__init__.pyc
FileSize243
MD54C05FFA49881A37C44737AF51005516F
SHA-16F51FE3E9D8631150B5DFD8855C056AF0C4E4436
SHA-25607DEC63D71F3F61CCF2ADDE180BE33CFE3AB0EF5DFE677C8D890A3349FA01A6B
SSDEEP6:vIS2lBqnhDGswIbfk+fG/Dh+Xem9Y3xmDrx3iRaGE:QSC6DaWs+fGd+XemfZygGE
TLSHT100D097C572BD03DFD96A8538E02001278688E0332A0022823100121D28D83C50035E46
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5D2066BC0239343C23B00975C611E4D19
PackageArchnoarch
PackageDescriptionThe Secure Sockets layer is only actually *secure* if you check the hostname in the certificate returned by the server to which you are connecting, and verify that it matches to hostname that you are trying to reach. But the matching logic, defined in `RFC2818`_, can be a bit tricky to implement on your own. So the ``ssl`` package in the Standard Library of Python 3.2 and greater now includes a ``match_hostname()`` function for performing this check instead of requiring every application to implement the check separately. This backport brings ``match_hostname()`` to users of earlier versions of Python. Simply make this distribution a dependency of your package, and then use it like this:: from backports.ssl_match_hostname import match_hostname, CertificateError ... sslsock = ssl.wrap_socket(sock, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_REQUIRED, ca_certs=...) try: match_hostname(sslsock.getpeercert(), hostname) except CertificateError, ce: ...
PackageNamepython-backports.ssl_match_hostname
PackageRelease1.6
PackageVersion3.4.0.2
SHA-1225B1B893B21BDE2C5D7C36ABE0DD8B9D3766305
SHA-256A1C69F69FBD17D74D13EFA15F7AA4F3C4D165E57AC700D0B332908BA5D330333