Skip to main content

tidy3d-extras is an optional plugin for Tidy3D providing addtional, more advanced local functionality.

Project description

tidy3d-extras

tidy3d-extras is an optional plugin for Tidy3D providing additional, more advanced local fuctionality. This additional functionality includes a more accurate local mode solver with subpixel averaging.

Documentation

The online documentation for Tidy3D can be found here.

Installation

tidy3d-extras is a python module that can be easily installed via pip. The version must match the version of Tidy3D, so the preferred command for installation is:

pip install tidy3d[extras]

This command will install tidy3d-extras along with all of its dependencies in the current environment.

A Tidy3D API key is required to authenticate tidy3d-extras users. If you don't have one already configured, you can get a free API key and configure it with the following command:

tidy3d configure

On Windows, it is easier to use pipx to find the path to the configuration tool:

pip install pipx
pipx run tidy3d configure

More information about the installation and configuration of Tidy3D can be found here.

You can verify that the tidy3d-extras installation worked by running the following command to print the installed version:

python -c 'import tidy3d_extras as tde; print(tde.__version__)'

Third-party libraries and licenses

  • json

    MIT License

    Copyright (c) 2013-2022 Niels Lohmann

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • toml++

    MIT License

    Copyright (c) Mark Gillard mark.gillard@outlook.com.au

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • ZLIB

    Copyright (C) 1995-2024 Jean-loup Gailly and Mark Adler

    This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

    Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

    1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
    2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
    3. This notice may not be removed or altered from any source distribution.

    Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu

  • CDT

    Mozilla Public License

    Version 2.0

    1. Definitions

    1.1. “Contributor”

    means each individual or legal entity that creates, contributes to the creation of, or owns Covered Software.

    1.2. “Contributor Version”

    means the combination of the Contributions of others (if any) used by a Contributor and that particular Contributor’s Contribution.

    1.3. “Contribution”

    means Covered Software of a particular Contributor.

    1.4. “Covered Software”

    means Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such Source Code Form, and Modifications of such Source Code Form, in each case including portions thereof.

    1.5. “Incompatible With Secondary Licenses”

    means

    that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or

    that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License.

    1.6. “Executable Form”

    means any form of the work other than Source Code Form.

    1.7. “Larger Work”

    means a work that combines Covered Software with other material, in a separate file or files, that is not Covered Software.

    1.8. “License”

    means this document.

    1.9. “Licensable”

    means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently, any and all of the rights conveyed by this License.

    1.10. “Modifications”

    means any of the following:

    any file in Source Code Form that results from an addition to, deletion from, or modification of the contents of Covered Software; or

    any new file in Source Code Form that contains any Covered Software.

    1.11. “Patent Claims” of a Contributor

    means any patent claim(s), including without limitation, method, process, and apparatus claims, in any patent Licensable by such Contributor that would be infringed, but for the grant of the License, by the making, using, selling, offering for sale, having made, import, or transfer of either its Contributions or its Contributor Version.

    1.12. “Secondary License”

    means either the GNU General Public License, Version 2.0, the GNU Lesser General Public License, Version 2.1, the GNU Affero General Public License, Version 3.0, or any later versions of those licenses.

    1.13. “Source Code Form”

    means the form of the work preferred for making modifications.

    1.14. “You” (or “Your”)

    means an individual or a legal entity exercising rights under this License. For legal entities, “You” includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, “control” means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

    1. License Grants and Conditions

    2.1. Grants

    Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

    under intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make available, modify, display, perform, distribute, and otherwise exploit its Contributions, either on an unmodified basis, with Modifications, or as part of a Larger Work; and

    under Patent Claims of such Contributor to make, use, sell, offer for sale, have made, import, and otherwise transfer either its Contributions or its Contributor Version.

    2.2. Effective Date

    The licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date the Contributor first distributes such Contribution.

    2.3. Limitations on Grant Scope

    The licenses granted in this Section 2 are the only rights granted under this License. No additional rights or licenses will be implied from the distribution or licensing of Covered Software under this License. Notwithstanding Section 2.1(b) above, no patent license is granted by a Contributor:

    for any code that a Contributor has removed from Covered Software; or

    for infringements caused by: (i) Your and any other third party’s modifications of Covered Software, or (ii) the combination of its Contributions with other software (except as part of its Contributor Version); or

    under Patent Claims infringed by Covered Software in the absence of its Contributions.

    This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).

    2.4. Subsequent Licenses

    No Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent version of this License (see Section 10.2) or under the terms of a Secondary License (if permitted under the terms of Section 3.3).

    2.5. Representation

    Each Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights to grant the rights to its Contributions conveyed by this License.

    2.6. Fair Use

    This License is not intended to limit any rights You have under applicable copyright doctrines of fair use, fair dealing, or other equivalents.

    2.7. Conditions

    Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1.

    1. Responsibilities

    3.1. Distribution of Source Form

    All distribution of Covered Software in Source Code Form, including any Modifications that You create or to which You contribute, must be under the terms of this License. You must inform recipients that the Source Code Form of the Covered Software is governed by the terms of this License, and how they can obtain a copy of this License. You may not attempt to alter or restrict the recipients’ rights in the Source Code Form.

    3.2. Distribution of Executable Form

    If You distribute Covered Software in Executable Form then:

    such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient; and

    You may distribute such Executable Form under the terms of this License, or sublicense it under different terms, provided that the license for the Executable Form does not attempt to limit or alter the recipients’ rights in the Source Code Form under this License.

    3.3. Distribution of a Larger Work

    You may create and distribute a Larger Work under terms of Your choice, provided that You also comply with the requirements of this License for the Covered Software. If the Larger Work is a combination of Covered Software with a work governed by one or more Secondary Licenses, and the Covered Software is not Incompatible With Secondary Licenses, this License permits You to additionally distribute such Covered Software under the terms of such Secondary License(s), so that the recipient of the Larger Work may, at their option, further distribute the Covered Software under the terms of either this License or such Secondary License(s).

    3.4. Notices

    You may not remove or alter the substance of any license notices (including copyright notices, patent notices, disclaimers of warranty, or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may alter any license notices to the extent required to remedy known factual inaccuracies.

    3.5. Application of Additional Terms

    You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, You may do so only on Your own behalf, and not on behalf of any Contributor. You must make it absolutely clear that any such warranty, support, indemnity, or liability obligation is offered by You alone, and You hereby agree to indemnify every Contributor for any liability incurred by such Contributor as a result of warranty, support, indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability specific to any jurisdiction.

    1. Inability to Comply Due to Statute or Regulation

    If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be placed in a text file included with all distributions of the Covered Software under this License. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.

    1. Termination

    5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its terms. However, if You become compliant, then the rights granted under this License from a particular Contributor are reinstated (a) provisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if such Contributor fails to notify You of the non-compliance by some reasonable means prior to 60 days after You have come back into compliance. Moreover, Your grants from a particular Contributor are reinstated on an ongoing basis if such Contributor notifies You of the non-compliance by some reasonable means, this is the first time You have received notice of non-compliance with this License from such Contributor, and You become compliant prior to 30 days after Your receipt of the notice.

    5.2. If You initiate litigation against any entity by asserting a patent infringement claim (excluding declaratory judgment actions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any patent, then the rights granted to You by any and all Contributors for the Covered Software under Section 2.1 of this License shall terminate.

    5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or Your distributors under this License prior to termination shall survive termination.

    1. Disclaimer of Warranty

    Covered Software is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the Covered Software is free of defects, merchantable, fit for a particular purpose or non-infringing. The entire risk as to the quality and performance of the Covered Software is with You. Should any Covered Software prove defective in any respect, You (not any Contributor) assume the cost of any necessary servicing, repair, or correction. This disclaimer of warranty constitutes an essential part of this License. No use of any Covered Software is authorized under this License except under this disclaimer.

    1. Limitation of Liability

    Under no circumstances and under no legal theory, whether tort (including negligence), contract, or otherwise, shall any Contributor, or anyone who distributes Covered Software as permitted above, be liable to You for any direct, indirect, special, incidental, or consequential damages of any character including, without limitation, damages for lost profits, loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses, even if such party shall have been informed of the possibility of such damages. This limitation of liability shall not apply to liability for death or personal injury resulting from such party’s negligence to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so this exclusion and limitation may not apply to You.

    1. Litigation

    Any litigation relating to this License may be brought only in the courts of a jurisdiction where the defendant maintains its principal place of business and such litigation shall be governed by laws of that jurisdiction, without reference to its conflict-of-law provisions. Nothing in this Section shall prevent a party’s ability to bring cross-claims or counter-claims.

    1. Miscellaneous

    This License represents the complete agreement concerning the subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor.

    1. Versions of the License

    10.1. New Versions

    Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the right to modify or publish new versions of this License. Each version will be given a distinguishing version number.

    10.2. Effect of New Versions

    You may distribute the Covered Software under the terms of the version of the License under which You originally received the Covered Software, or under the terms of any subsequent version published by the license steward.

    10.3. Modified Versions

    If you create software not governed by this License, and you want to create a new license for such software, you may create and use a modified version of this License if you rename the license and remove any references to the name of the license steward (except to note that such modified license differs from this License).

    10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses

    If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version of the License, the notice described in Exhibit B of this License must be attached.

    Exhibit A - Source Code Form License Notice This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at https://mozilla.org/MPL/2.0/.

    If it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a LICENSE file in a relevant directory) where a recipient would be likely to look for such a notice.

    You may add additional accurate notices of copyright ownership.

    Exhibit B - “Incompatible With Secondary Licenses” Notice

    This Source Code Form is “Incompatible With Secondary Licenses”, as defined by the Mozilla Public License, v. 2.0.

  • OpenSSL

                              Apache License
                        Version 2.0, January 2004
                     https://www.apache.org/licenses/
    

    TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

    1. Definitions.

      "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

      "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

      "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

      "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

      "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

      "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

      "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

      "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

      "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

      "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

    2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

    3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

    4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

      (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

      (b) You must cause any modified files to carry prominent notices stating that You changed the files; and

      (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

      (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

      You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

    5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

    6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

    7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

    8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

    9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

    END OF TERMS AND CONDITIONS

  • gl3w

    This is free and unencumbered software released into the public domain.

    Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means.

    In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • HDF5

    Copyright Notice and License Terms for HDF5 (Hierarchical Data Format 5) Software Library and Utilities

    HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 2006 by The HDF Group.

    NCSA HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 1998-2006 by The Board of Trustees of the University of Illinois.

    All rights reserved.

    This software library and utilities is covered by the 3-clause BSD License.

    Redistribution and use in source and binary forms, with or without modification, are permitted for any purpose (including commercial purposes) provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer.

    2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or materials provided with the distribution.

    3. Neither the name of The HDF Group, the name of the University, nor the name of any Contributor may be used to endorse or promote products derived from this software without specific prior written permission from The HDF Group, the University, or the Contributor, respectively.

    DISCLAIMER: THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

    For further details, please refer to the full license text available at https://opensource.org/licenses/bsd-3-clause

    You are under no obligation whatsoever to provide any bug fixes, patches, or upgrades to the features, functionality or performance of the source code ("Enhancements") to anyone; however, if you choose to make your Enhancements available either publicly, or directly to The HDF Group, without imposing a separate written license agreement for such Enhancements, then you hereby grant the following license: a non-exclusive, royalty-free perpetual license to install, use, modify, prepare derivative works, incorporate into other computer software, distribute, and sublicense such enhancements or derivative works thereof, in binary and source code form.



    Contributors: National Center for Supercomputing Applications (NCSA) at the University of Illinois, Fortner Software, Unidata Program Center (netCDF), The Independent JPEG Group (JPEG), Jean-loup Gailly and Mark Adler (gzip), and Digital Equipment Corporation (DEC).


    Portions of HDF5 were developed with support from the Lawrence Berkeley National Laboratory (LBNL) and the United States Department of Energy under Prime Contract No. DE-AC02-05CH11231.


    Portions of HDF5 were developed with support from Lawrence Livermore National Laboratory and the United States Department of Energy under Prime Contract No. DE-AC52-07NA27344.


    Portions of HDF5 were developed with support from the University of California, Lawrence Livermore National Laboratory (UC LLNL). The following statement applies to those portions of the product and must be retained in any redistribution of source code, binaries, documentation, and/or accompanying materials:

    This work was partially produced at the University of California, Lawrence Livermore National Laboratory (UC LLNL) under contract no. W-7405-ENG-48 (Contract 48) between the U.S. Department of Energy (DOE) and The Regents of the University of California (University) for the operation of UC LLNL.

    DISCLAIMER: THIS WORK WAS PREPARED AS AN ACCOUNT OF WORK SPONSORED BY AN AGENCY OF THE UNITED STATES GOVERNMENT. NEITHER THE UNITED STATES GOVERNMENT NOR THE UNIVERSITY OF CALIFORNIA NOR ANY OF THEIR EMPLOYEES, MAKES ANY WARRANTY, EXPRESS OR IMPLIED, OR ASSUMES ANY LIABILITY OR RESPONSIBILITY FOR THE ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION, APPARATUS, PRODUCT, OR PROCESS DISCLOSED, OR REPRESENTS THAT ITS USE WOULD NOT INFRINGE PRIVATELY- OWNED RIGHTS. REFERENCE HEREIN TO ANY SPECIFIC COMMERCIAL PRODUCTS, PROCESS, OR SERVICE BY TRADE NAME, TRADEMARK, MANUFACTURER, OR OTHERWISE, DOES NOT NECESSARILY CONSTITUTE OR IMPLY ITS ENDORSEMENT, RECOMMENDATION, OR FAVORING BY THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA. THE VIEWS AND OPINIONS OF AUTHORS EXPRESSED HEREIN DO NOT NECESSARILY STATE OR REFLECT THOSE OF THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA, AND SHALL NOT BE USED FOR ADVERTISING OR PRODUCT ENDORSEMENT PURPOSES.


  • GCC Runtime Libraries

    This product includes portions of the GNU Compiler Collection (GCC) runtime libraries:

    • GNU C++ Standard Library (libstdc++)
    • GNU Compiler Support Library (libgcc_s)
    • GNU OpenMP Runtime (libgomp)

    These libraries are licensed under the GNU General Public License, version 3 (GPLv3) with the GCC Runtime Library Exception.

    The GCC Runtime Library Exception permits linking these libraries with independent modules to produce an executable, without requiring the executable itself to be licensed under the GPL. As a result, you may use and redistribute this product without disclosing your own source code, provided you retain this notice and comply with the licenses of the included libraries.

    License References:

    Source Code:
    The original source code for these libraries is available from the GCC project.

    These runtime libraries have been included in binary form as permitted by their licenses. No modifications have been made.

  • LLVM Runtime Libraries

    This product includes the following runtime libraries from the LLVM project:

    • libc++ (C++ Standard Library)
    • compiler-rt (Low-level compiler support, e.g., builtins)
    • libomp (OpenMP Runtime Library)

    These libraries are licensed under the Apache License, Version 2.0 with the LLVM Exceptions.

    The LLVM Exception to the Apache 2.0 License permits static or dynamic linking of these libraries into proprietary applications without imposing the license on the proprietary portions of the application.

    License References:

    Source Code:
    The original source code is available from the LLVM project.

    These libraries are included in binary form with no modifications.

  • jwt-cpp

    Copyright (c) 2018 Dominik Thalhammer

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

tidy3d_extras-2.10.0rc3-cp313-cp313-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.13Windows x86-64

tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ i686

tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_11_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.13macOS 11.0+ ARM64

tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_10_15_x86_64.whl (3.5 MB view details)

Uploaded CPython 3.13macOS 10.15+ x86-64

tidy3d_extras-2.10.0rc3-cp312-cp312-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.12Windows x86-64

tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ i686

tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_11_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.12macOS 11.0+ ARM64

tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_10_15_x86_64.whl (3.5 MB view details)

Uploaded CPython 3.12macOS 10.15+ x86-64

tidy3d_extras-2.10.0rc3-cp311-cp311-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.11Windows x86-64

tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ i686

tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_11_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.11macOS 11.0+ ARM64

tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_10_15_x86_64.whl (3.5 MB view details)

Uploaded CPython 3.11macOS 10.15+ x86-64

tidy3d_extras-2.10.0rc3-cp310-cp310-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.10Windows x86-64

tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ i686

tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_11_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.10macOS 11.0+ ARM64

tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_10_15_x86_64.whl (3.5 MB view details)

Uploaded CPython 3.10macOS 10.15+ x86-64

tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ i686

tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.0rc3-cp39-cp39-macosx_10_15_x86_64.whl (3.5 MB view details)

Uploaded CPython 3.9macOS 10.15+ x86-64

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-win_amd64.whl
Algorithm Hash digest
SHA256 530530c66e5559f1739d74f3d6497c73c5f65746bef5fa062bd32ac13f91b7da
MD5 1f4c3264e2203d01682f7cf422b8dbd9
BLAKE2b-256 6caf69ed1c0d19a7f5143389caeedd3ca6836c1ead24ec0880b8d1f0b6e8f49e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 6b37f32055eb2a8c082db344dbd3558f56dca8bcffbe0a7ffd55dfbc44abc83f
MD5 4bf56fc4026125890fc7bda783979022
BLAKE2b-256 128ce005779e31b4e35a15fc56414fc591c9af14d7e7d348c86e646e31c57fc8

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 2e9c7babc5e7859744b1703ba5ee5a8ff8ea08477f62fbccb077c6d5b3186857
MD5 e4d6279b32d05fa7989c105b1e3f846b
BLAKE2b-256 21dc4c4f47a24385c2b750934e5c11b55d44fa7ee73483e800e986445858c27e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 4d092685bdd0b7c9474ae43353db9c94d9e578d0ebb1f3e0fa3589f1f9e12d55
MD5 1f56566907cd11932017b717ce58d5cc
BLAKE2b-256 912b300209d75f403e4f2832f327ebc66cf97f88333e4588c3917c73979a3077

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 16806b251ed3d51610f3fd8a4cc5d65af4c67ad528b8c530cebd0c15d03a873b
MD5 5c5c6252e8ac45bb0f1b9b57d386d8a0
BLAKE2b-256 0de21150a9cdd3e6fffb259141fab38305193fe63c2f02c895ecdbe9735134bb

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 850480cc0ed0070a8d9932c52a354ea502895190b9757ad9743ebc525ed835ae
MD5 55b45759c5fa25efb64d4d73697d299c
BLAKE2b-256 5d241c14759d489a8be9f50db1962a3fdb0a932cd41d7f8575484d98b8eff231

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 c5fdae1110cf55257c88d613fdd57c529ef0bc379e0a119918d10f6bb9df7d53
MD5 53e8d5bdf71acebcc0a88e63e3a818e6
BLAKE2b-256 ada46b5feca8811cb8eb95c29eff251361d02e7c18cd75a8f16cb14f21a86d66

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 ccab696dc846beaa77440783371c215765f7834313c0209181fa976773ac40d6
MD5 08f9627601fc42bc8b380be18f5f9cb4
BLAKE2b-256 115f0ae7098418752ce51e71a77cdbb2ae28a86f1d7af261475a6f50bc164385

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 55eee3fc897a935eff096e135d6dfff550efd8c99043f4e50de22168f06c4c91
MD5 a9026a136f6841a3f07d67a84dfa7aba
BLAKE2b-256 12d117b4cf6de45051122725107074eca2bf72abe70908dfb7c54f3cc84efdb2

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 f5332048344fa540ab282905740f0f09871768ffa97cff27523ff5c6d46a53ac
MD5 fedf54c0530c297abd7c8a48c4cd5155
BLAKE2b-256 ba6119a7f86d7cf8da46032f75fb3a6069820e9839ddfdc43f1463a4d592de79

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_10_15_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp313-cp313-macosx_10_15_x86_64.whl
Algorithm Hash digest
SHA256 8b27689f2dc87ba86389fa6849793ea05c5f00917396d168d4d37692c4ace26b
MD5 d1fdd509f892ffcdfd97eff6a2ed504f
BLAKE2b-256 885987864e4d747b9832d075ee46557345937c056db0afb52e412faa82d8d4b5

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-win_amd64.whl
Algorithm Hash digest
SHA256 67787bf1bf36891551864ba831056c6e0faeee7e0896fc4b3a6d494259b5619e
MD5 4c23c138f667451673dd6c299a77424b
BLAKE2b-256 2af6fdf0edd8e8d43ca8904a1e08c110ddfdfbadf1e1a92d5eb71adfb8e6ec8e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 59716621b4aefc8c0b9ef21aee59c61fd01445d711e72e10cf5313811391fe52
MD5 50ea54501a9c5a74c287360adb6293c1
BLAKE2b-256 93a288f11c1721217f8b47c4d1ba246b8602345660bb8d2641ddae2e231ca56a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 2b44a26e9452afd8df333a6976d875e8df06d69793da58c43b9a0fffcb61f086
MD5 24fe10d2c46f4ef5b1d2632d237c0630
BLAKE2b-256 4a1e524535ff2190b98c991cdd050ed9234da6a3415b03b149b21914d007bb36

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 320e1790cc9e0b85c40d5b1ef6262b3d63f24af84b01722efe5831b6c423a3bc
MD5 8a26d2755e90ff008e99e3f5ffe89df2
BLAKE2b-256 11de4fbf130ea1abad09951f06238f4f3736ee6c8c3c12841606024d83fcb5ca

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 177da70ce1408f45add80fd099f92797b9ceb3269b921594b4be7faa05450de3
MD5 ad6dd0217381ddc33ae7110a8f49a333
BLAKE2b-256 2b44a5b61f84a2d8b4600f8eef97ee2474f994015efa222e29c798c5012d20ea

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 5a47d4a04974158e45d61489299de130f5153f1dc99717d27b44ae284a0855e2
MD5 c5a4081deaf1d6afc17400081bae0041
BLAKE2b-256 a50808b21a8960d1d82210c67de4d048ac009cc40f8b23297feb725f9816d70e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 8258756929fa284ba69e8ee4cbc1f6a7a86f45894ecbaeb1931b347f728d523b
MD5 0b6952741a229f43f3cf4a32dd4dbfdc
BLAKE2b-256 62b2b3d9ba9c6e91db4f064d793343bc0a218c19c531d21c9404354f3189503d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 d150e5721bbfb4ff5d28b0a90f459f9dc68e1ae9298accd61ab15847ae9ac10e
MD5 1505ebee122d1085b2e332832c4150c8
BLAKE2b-256 6b714bb43f8f7de1feb900d0a4fcc424005a2d93cc4a339a96a3f4a684b26462

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 dd9591ad751ee788515728ce70eef14d40b9d1334d7d02a69fb705dbb57b2245
MD5 934f11778a535041e580f2f3b6953857
BLAKE2b-256 12e4cc75834cda709af8336b73db6296cc49a22fb00c757eb594f5de5553216d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 13beadacba18a4bcdcb88c439b562578ec3d69f706de2158e713f3d9d35a3464
MD5 d56bda082dd63e224a69c90b968a4a78
BLAKE2b-256 b09aaf1311600a324ef89ac5381c4f3e826504620b8ff9735073f4351d204dd7

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_10_15_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp312-cp312-macosx_10_15_x86_64.whl
Algorithm Hash digest
SHA256 da785641f42d9ba758f37d2a6ef5260ef14df3924e4df499d0c2bf94382c0a2e
MD5 e71bc2582390b2e54d58548d03b7bf92
BLAKE2b-256 794f89b2d5c7d8278457c0e31c52b0fa9a01dc9f46bde0ac3a83b0c4ab1f72dc

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-win_amd64.whl
Algorithm Hash digest
SHA256 64ce2f00089ef73d319187cc4047290c44c6d42ce607609a14bf2801b92fe778
MD5 73e8cb35bc556d3489eaa4d02385902b
BLAKE2b-256 72b2e05a9e291885e632d9f1cc0834e3081081567f46095d8c3d44de19cb619e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 f806bb6e032b88746ec14950a1f8737f160aa84edb11ce9117f20b655e7e2221
MD5 4c0c7184717956ed4fda6f2bb1bd2c65
BLAKE2b-256 2cc0792468e3ad5f2cb5e79011723c522e9b8b469b56684508e0aa07691db11d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 f05db8740bfce1d43d0c7d5114611ec88bf2e7770f00bfda00f27caf5f82e9a2
MD5 1419d96c4f01f1b5cb5e493697f19aa6
BLAKE2b-256 47bec07f6f4e925f6ff81e652afc7d99b2e3ee68605ba6ba02fda692e755d160

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 ee73480b48ce1ee875dad7387c33b7c1fb4dba898cb91b8c2f9143edf614d352
MD5 6b22b3a80a468d97642013c24b3abf7c
BLAKE2b-256 f7cc0274c6c03c71db7018659b9f438620d745ac1ff884dc1f9cad0e112053e9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 41a51ea2eb0965e3554923588cdab04d4b2631e432c6ae9e60dc826a21656c93
MD5 d774426781c5e376c18f1141dde242b3
BLAKE2b-256 2749f789dbe2269ae6e8d96da3707b538c62c39a9205e1c30a30efbfc0afe04a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 38401abaa7822f57ccd9154846f724d10d4cd8ad95d2ad7c01b6c44bbe42b87a
MD5 8219b37ca43a565fc12c0bafc9f2514f
BLAKE2b-256 86f46419ea8a7815b6ff536f2ec888c3d67632720605749bbaaa660050d46f94

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 d17bd55581f3f07bac3e478c71233f8ed060d4be55c580a282cd233c8d27a69c
MD5 d41ddfa86bf60e65d342d2f23017f897
BLAKE2b-256 9d7ab07170e1e638790f8ed57bbe74a3805807541530180e18a043b0ac97f526

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 e57299c4d24b7da254185b6f9058de515c67a146edf406348d1967ac50d0d748
MD5 5da1ed80aaa3cc03396a5ff2300be09b
BLAKE2b-256 5a294b17575051b6bcb884f93f085f1bf0f858ee01b1ce3453fff9524d35896b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 0e1d81ebdebccb6649978e89a684d02a630000037ee7c6688fcd85e592aa0810
MD5 0723954b708f8b8755002bce52e09e7f
BLAKE2b-256 afb3bcdb80086a5741aae2ce4a1c5755d3e170857026f49aed42c50e77b94d46

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 5f2641cfa99b9b3d2f6f7b8835a4dca62b19ea26c52bed0b4514c88891106e07
MD5 062623262def2619e3cbff795493f6ce
BLAKE2b-256 c3e28ef61f5fdfb47c4c8890d301d4b90ab2f602ab7f96aa3cd97c2c0495ae80

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_10_15_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp311-cp311-macosx_10_15_x86_64.whl
Algorithm Hash digest
SHA256 8c75a5187a381b7038cc243bdb8af6c933fb3fe5d7f76f17276fc5b9a10877bf
MD5 e9767c0983dd6eaf03dc6d018eae5d87
BLAKE2b-256 198cfc04d13eaec330b10a31c9f15fa00c17a9501dfa28065f1cca482293a8a8

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-win_amd64.whl
Algorithm Hash digest
SHA256 d7da58050801614f097ba54432f6bcf66e5bcad56b8f944b3d8cba3774b64680
MD5 42c4d7aebe2c4c287a7095fca7dbddd5
BLAKE2b-256 54497757feb67b35a21ce16da1a1201f70c7b221cf3e8ff8dcf5681c1944fa47

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 e40537231df8ad98135f300180e34ee80607f3cf2dfcbad89cff5f0b96c8dfb6
MD5 5ae67380120f6da094cb9866399afc62
BLAKE2b-256 59e0fb91f808a6e0c55c2e52fcb777fb901f8adbac2b9bd2829f6c248044e46c

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 0468f9f85ef788db843ae2bb12b9ca0fbd09f40a4d21084ce392e8645b0089e2
MD5 e80ee5c4d8e1dce923120670889f2361
BLAKE2b-256 5af10a0278f48c90087df8b013b5b49bcda80b11f8ffb6c349df1b4d06008106

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 d2544de009c3c130f9f62456d3b3ddddd4f839af112fc2c9a25f91060675b7c0
MD5 cefa108a7a7bec6f523d0c5a8df9eb2e
BLAKE2b-256 87eb3919dc1d26f6e6c4265f66aa7c6a2cd39abe77b2d0142297992de657cfc6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 c4792aa0996e5c9714d8dd2575ebf05e8336ce33d5386d6a82cd38217580f231
MD5 4042c4d79f4be6a58e18f382e7f2765e
BLAKE2b-256 0b40d8ec79b0438777889317c3891d9baf044b48249fd95ee33b267711daa68a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 76ca1f8fa1d3477359dc1a5d3e90842fd2a85d72ef03cb3cf8e6f99875a7277d
MD5 3a753031b9c1e6a93240ac54c6ac960e
BLAKE2b-256 17fc56d860839aaa19111c4a39fd9b728ae3eb2d9ca625e3a23e90152606f981

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 6a75e8842983e21dba45c7b668c8649e5c536bff89e11855e5df34781a2a1764
MD5 5e3bab8ca2060aaed0b928d6b5664a9d
BLAKE2b-256 1db917fdc3e49a0b4385808b9a4a9c37f8d3fd2276efed1a6e87cf82e0bc94e3

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 4b5551b67f141f6365a509171278b7f7ff3e7ef28fd5adf7fe54bb69ca29d183
MD5 6414954b918e131f6ae7dd0867ae3efd
BLAKE2b-256 4f4046cbac181cd932ed44333d350b482eb32cdbdeb64248f72782d6a284d88d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 ed4f86db0cf0669f1aef87894e562b68183a2dca030b1726cf7c2808771d87ba
MD5 d5cce6763061cc386ef73bf10993339d
BLAKE2b-256 3cb8c398822bb230292abe5dd53c00862f66f7d3cb43e1fd4b820e0ea014bf0b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 32d8ed2803885d54255b421acbdbb0b4a05f1981496cba6381344cc2f641eca8
MD5 ef124d1a2cb690d47a2e39754e2532cc
BLAKE2b-256 47a4d067b90218006340f5bce103fee98aaca13c276090f7634d5f3952a36df9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_10_15_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp310-cp310-macosx_10_15_x86_64.whl
Algorithm Hash digest
SHA256 df3796d51a2ee1a30fbc9dd2a50e9feb00eceea5ed600041837fb77da4499c01
MD5 6d6d1d94000a54b6028c54d9f5d49ff8
BLAKE2b-256 0fdd3936545ab822dce67c4360e1f8ae6a1b829b92d9f7d99301f9dfafb0a470

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 441a7adab58357cfb8fb6a6fc55b896bca149534c1fbb4d5e6b7937ea7b298f7
MD5 3a4b9e64d04eddbbefb3a2fb9997644e
BLAKE2b-256 246cb620c1747647f24d720f635974871daaf45ec69ab7f545bd6296052c954f

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 2f602165c8fac20bb4cb6311f83f629605e9c486558bcfc0106111b943918410
MD5 1c01617db95cc526440d31177049c65b
BLAKE2b-256 693bc1076afbdb364a9489cf0edb09fadbdaf8d31db4ad025ff3bd06edcf56dc

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 1b46eef8b56a990dd90813247fe71d2f79ecc20c04cea39ec934d0ad2f0d71dc
MD5 612295a9c9755e6587eb50e2b7c2fc87
BLAKE2b-256 a71098ac8d3fa36006a6e45e88890ff0e890e3c033f31de638464043d153ede1

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 7e2975100bf0b9849ae654f464fb23913389a944cebcf9d9f4ccd411041de8de
MD5 18bc0f80c5b6c0e1709233bde361c3ec
BLAKE2b-256 4b2f67d10ff9ef74c079f14fa42539c0ce37c0af9b068c8a26a27a3a05393d5c

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 9b57cca849e01a262cffc574f131f205039e6b808b5fd0b55aa8e814ac561b17
MD5 50dbcfb6c43689a214b0f2e21fe2476b
BLAKE2b-256 1f229952cba5071ae31be660c7ffc16304d7294bf1cba3ae27d9c1211f839b38

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 62d908765b27419b70f3b77529c58584ac54fe136aa306485a422341abbb5ef7
MD5 2c8e1dea1f035443e2efc64024978f57
BLAKE2b-256 2e76c8c2d8af770f63c373ab8234726693215433f891c1bb288d153a69fbdc31

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 1df94972b83e9f4710aef74e80464f3af5a42434c09e22b48048d33d5a4d5dd7
MD5 f7b438444a3ad28b87b9a5080dd9c0e0
BLAKE2b-256 bd545f30a7f85c728ff02a4c8db1a988ac4c3111a06a07f674489656ee5c83e6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 a5846ac3d968f8f04b566a59db4dd4c980725f7fddb92134ec6d6e05366c697a
MD5 896cb4dcd3d73ccf8be5833b52e26a77
BLAKE2b-256 8ef3d088ac31bbb0db9290a685523820666f9dd8f1826689b68bc84e469c9733

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.0rc3-cp39-cp39-macosx_10_15_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.0rc3-cp39-cp39-macosx_10_15_x86_64.whl
Algorithm Hash digest
SHA256 dcd58f8db3840684d433a5f5233911d45acd62fa24b83f664d38b94b53521eac
MD5 42b1458270cb445ed8c48c28e163de1c
BLAKE2b-256 d8093a670598ac61cc304d09b6db8b049a7fe6c030b8743506e03662da8e4c54

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page