Result for A442E26A216B077C25C832B0FB9AEB4062231D2F

Query result

Key Value
CRC320650CA96
FileNamesnap-hashlookup-import/lib/python2.7/site-packages/backports/ssl_match_hostname/__init__.py
FileSize3650
MD5D57811924F72843F982EBE6A53A3F740
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
ProductCode{'ApplicationType': 'Operating System', 'Language': 'English', 'MfgCode': '80648', 'OpSystemCode': '51', 'ProductCode': '183361', 'ProductName': 'Scientific Linux DVD 2', 'ProductVersion': '6.9-i386'}
SHA-1A442E26A216B077C25C832B0FB9AEB4062231D2F
SHA-256B8C2332DB4C90CF9663D094E684CDDD47D345D07A8E72D3CE1B6ECC02F7717A0
SHA-51271843C727C6085D4C90FE99CE0468F9F4CFBF264A048DEC3069FF787928A47D088CE08B81936EA9010BDFC1608C355136FE77DE965127799CD414F3F53699631
SSDEEP96:qz+FzJdMzyowVZn0QWI+PGHXAlup3YpAup1ywpdL:4AzHVrB0QWIPHQluWpAu+4t
SpecialCode
TLSHT10C71163FA5962E7DD3020428186FD0816B1D6A1701511979BCEDE5AC6F40F79C178DED
dbnsrl_modern_rds
insert-timestamp1727113121.7044284
mimetypetext/plain
sourcesnap:SkP2rF7JG0iystP8UR0v5sqQizUaZC9V_1
tar:gnamewheel
tar:unameroot
hashlookup:parent-total53
hashlookup:trust100

Network graph view

Parents (Total: 53)

The searched file hash is included in 53 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
SHA-10309F81FAB15C5F1638CE37651D64BC1F903DAD3
snap-authoritycanonical
snap-filenameSkP2rF7JG0iystP8UR0v5sqQizUaZC9V_1.snap
snap-idSkP2rF7JG0iystP8UR0v5sqQizUaZC9V_1
snap-namensot-server
snap-publisher-id8MkHt2UzoqevQWBcNlUeCzhymoWhVIJS
snap-signkeyBWDEoaqyr25nF5SNCvEv2v7QnM9QsfCc0PBMYD_i2NGSQ32EF2d4D0hqUel3m8ul
snap-timestamp2017-03-04T00:25:27.094091Z
source-urlhttps://api.snapcraft.io/api/v1/snaps/download/SkP2rF7JG0iystP8UR0v5sqQizUaZC9V_1.snap
Key Value
MD5211602A4ECF802610471BDFF9428F9AC
PackageArchnoarch
PackageDescriptionThe Secure Sockets layer is only actually secure if you check the hostname in the certificate returned by the server to which you are connecting, and verify that it matches to hostname that you are trying to reach. But the matching logic, defined in RFC2818, can be a bit tricky to implement on your own. So the ssl package in the Standard Library of Python 3.2 now includes a match_hostname() function for performing this check instead of requiring every application to implement the check separately. This backport brings match_hostname() to users of earlier versions of Python. The actual code inside comes verbatim from Python 3.2.
PackageMaintainerFedora Project
PackageNamepython-backports-ssl_match_hostname
PackageRelease1.fc20
PackageVersion3.4.0.2
SHA-108B4685734154D0995DEFFEC4987C89D5EA3D99D
SHA-256A57A4B8E4548CAA41DFF16F109A72AD2F4DF4EE05AE5371AF0CFD4084834B4CF
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.9/packages//hppa//py-backports-ssl-match-hostname-3.4.0.2p0.tgz
MD5E6D8B18DDD28E33AEA9D1E7727BBA446
SHA-11115812A8A464656DF962771329EF62034E03DA2
SHA-256C192556F08E5C128F9C9266D1A57949319DA0FBE35EF436DB7B461EF5E967E67
SSDEEP192:ie4lQo28Pq5avw++Vw1qQL2C0M9SLQ2qEeAOiClE:ifQo28S5aoSZl0HJClE
TLSHT16BE18E7C01035A5E40F5E93C9DD7A4ED80C24B764B5C2BFB7B7D111F0A6F14888A5B95
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.6/packages//i386//py-backports-ssl-match-hostname-3.4.0.2.tgz
MD58B10913C13F00417AB6E1668C1B8A84C
SHA-1122D014497F745721FA1B58A477A29BBF7A31765
SHA-25624840F6BD5A6982917807E3144E698C50EABF25189D4CB5BAD6C6A06C95498B0
SSDEEP192:p5xRKq5PGyOTKBIg/jqurK2UxZ9vArl8ICrFoPY:NMg3USv/3/v8ICr6Y
TLSHT11DE1AF9B6001D6269058B8757F39EEBBD84D9E8174FC1168E86F04E147B1E2FE0DD066
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.8/packages//alpha//py-backports-ssl-match-hostname-3.4.0.2.tgz
MD59FDF09B0F511D04A591BAD1E7497849A
SHA-1122EDF5215489A68B7EA3CF6B085C3386D524501
SHA-256E6A08D30F46F599C2572E4A5011CF67CAFD0BE92DA541456CD84956DE04B4E43
SSDEEP192:60WxPoS6xDLeVj6mwfx6GbpKtOMNuZDTkO3SJjpJ:QoSP6mwx2xuZDTkqEjX
TLSHT156E1AE0EA2137CBEEDE3283B3DCA550E85698B822F6216C16A40F06A73B4C3A77D1451
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.7/packages//sparc//py-backports-ssl-match-hostname-3.4.0.2.tgz
MD5806BB78410F3DE9E66D4941A134DBFC3
SHA-115C338CD6D61AAEA5E4E046649918C2ADC15740D
SHA-2561F6165601CE4A0A7591CC88805575FB4E0A84D6C612AF6B120E3647CA94F2CD3
SSDEEP192:yXllDqXchYivAHWU2OY8zRnipYqFWWPYD/I:y10X4YiAWxjSRnipvWWPY0
TLSHT115E1AD9CE5002EF5FE1219324B290B9CD427777191931ABF902BB98CD78466AC6C4CFC
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.8/packages//mips64el//py-backports-ssl-match-hostname-3.4.0.2.tgz
MD551E778E3FD540C39C2CCD9E0EC3A1897
SHA-117EF39FB3F2295547E353345A3B9C787984DED31
SHA-256548DF87C03320E28BE993D32C305681C67F6F7675690BF2F73AD1548A2FA8B3A
SSDEEP192:baNyX0k0YjmCTjpfVesAtOWqYo4cFs5WMsNfhcnM/SF:mskVePCsAtkr4isQBNunMC
TLSHT146E19F75C303D5ED0AB4C99A91DDD8949BC3EF24E7D1977B5C17A06FC22C00664839A3
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.9/packages//mips64el//py-backports-ssl-match-hostname-3.4.0.2p0.tgz
MD53939614D6923F5C786942C8F4E19CCCE
SHA-121405B5D745A76D872699C82BF57C8E349B14DAB
SHA-256C869ED3C1DC3A0849D591638A1B8449A2400B1C1D970E5FB4AF28D6A011EC2E0
SSDEEP192:FEvI3Emm5qBYYaN/uZHe8hpoxGI68L4GOp7cxqi:F+I3Ez5qBYTNIHe0poxM8eiqi
TLSHT131E19FA0315467FDBB3953304975CE0BA456E19C978E8FB3A4DE271E86162734358BA0
Key Value
MD5D2066BC0239343C23B00975C611E4D19
PackageArchnoarch
PackageDescriptionThe Secure Sockets layer is only actually *secure* if you check the hostname in the certificate returned by the server to which you are connecting, and verify that it matches to hostname that you are trying to reach. But the matching logic, defined in `RFC2818`_, can be a bit tricky to implement on your own. So the ``ssl`` package in the Standard Library of Python 3.2 and greater now includes a ``match_hostname()`` function for performing this check instead of requiring every application to implement the check separately. This backport brings ``match_hostname()`` to users of earlier versions of Python. Simply make this distribution a dependency of your package, and then use it like this:: from backports.ssl_match_hostname import match_hostname, CertificateError ... sslsock = ssl.wrap_socket(sock, ssl_version=ssl.PROTOCOL_SSLv3, cert_reqs=ssl.CERT_REQUIRED, ca_certs=...) try: match_hostname(sslsock.getpeercert(), hostname) except CertificateError, ce: ...
PackageNamepython-backports.ssl_match_hostname
PackageRelease1.6
PackageVersion3.4.0.2
SHA-1225B1B893B21BDE2C5D7C36ABE0DD8B9D3766305
SHA-256A1C69F69FBD17D74D13EFA15F7AA4F3C4D165E57AC700D0B332908BA5D330333
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/5.6/packages//powerpc//py-backports-ssl-match-hostname-3.4.0.2.tgz
MD5BDAB0801628AE353275713287C2546BA
SHA-122E4078AF0B86AAF52392D8BF2D05FA274795C17
SHA-2564452227AC916E9B8575DDB99C69565D6338E97EE30A4C60E4FD680158FBCF647
SSDEEP192:30WmBo/NG4XLdXy+HqO2QpFP9p+DVlh2/5g3agWA5Fv:kEXLs+VFlpKVlhXmyN
TLSHT14EE1AF1C67B09795E1E3AC482C87E39EFCE09C3903A05681DB52ED6E1742F5D84C90AB