Skip to main content

tidy3d-extras is an optional plugin for Tidy3D providing addtional, more advanced local functionality.

Project description

tidy3d-extras

tidy3d-extras is an optional plugin for Tidy3D providing additional, more advanced local fuctionality. This additional functionality includes a more accurate local mode solver with subpixel averaging.

Documentation

The online documentation for Tidy3D can be found here.

Installation

tidy3d-extras is a python module that can be easily installed via pip. The version must match the version of Tidy3D, so the preferred command for installation is:

pip install tidy3d[extras]

This command will install tidy3d-extras along with all of its dependencies in the current environment.

A Tidy3D API key is required to authenticate tidy3d-extras users. If you don't have one already configured, you can get a free API key and configure it with the following command:

tidy3d configure

On Windows, it is easier to use pipx to find the path to the configuration tool:

pip install pipx
pipx run tidy3d configure

More information about the installation and configuration of Tidy3D can be found here.

You can verify that the tidy3d-extras installation worked by running the following command to print the installed version:

python -c 'import tidy3d_extras as tde; print(tde.__version__)'

Third-party libraries and licenses

  • json

    MIT License

    Copyright (c) 2013-2022 Niels Lohmann

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • toml++

    MIT License

    Copyright (c) Mark Gillard mark.gillard@outlook.com.au

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • ZLIB

    Copyright (C) 1995-2024 Jean-loup Gailly and Mark Adler

    This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

    Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

    1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
    2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
    3. This notice may not be removed or altered from any source distribution.

    Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu

  • CDT

    Mozilla Public License

    Version 2.0

    1. Definitions

    1.1. “Contributor”

    means each individual or legal entity that creates, contributes to the creation of, or owns Covered Software.

    1.2. “Contributor Version”

    means the combination of the Contributions of others (if any) used by a Contributor and that particular Contributor’s Contribution.

    1.3. “Contribution”

    means Covered Software of a particular Contributor.

    1.4. “Covered Software”

    means Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such Source Code Form, and Modifications of such Source Code Form, in each case including portions thereof.

    1.5. “Incompatible With Secondary Licenses”

    means

    that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or

    that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License.

    1.6. “Executable Form”

    means any form of the work other than Source Code Form.

    1.7. “Larger Work”

    means a work that combines Covered Software with other material, in a separate file or files, that is not Covered Software.

    1.8. “License”

    means this document.

    1.9. “Licensable”

    means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently, any and all of the rights conveyed by this License.

    1.10. “Modifications”

    means any of the following:

    any file in Source Code Form that results from an addition to, deletion from, or modification of the contents of Covered Software; or

    any new file in Source Code Form that contains any Covered Software.

    1.11. “Patent Claims” of a Contributor

    means any patent claim(s), including without limitation, method, process, and apparatus claims, in any patent Licensable by such Contributor that would be infringed, but for the grant of the License, by the making, using, selling, offering for sale, having made, import, or transfer of either its Contributions or its Contributor Version.

    1.12. “Secondary License”

    means either the GNU General Public License, Version 2.0, the GNU Lesser General Public License, Version 2.1, the GNU Affero General Public License, Version 3.0, or any later versions of those licenses.

    1.13. “Source Code Form”

    means the form of the work preferred for making modifications.

    1.14. “You” (or “Your”)

    means an individual or a legal entity exercising rights under this License. For legal entities, “You” includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, “control” means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

    1. License Grants and Conditions

    2.1. Grants

    Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

    under intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make available, modify, display, perform, distribute, and otherwise exploit its Contributions, either on an unmodified basis, with Modifications, or as part of a Larger Work; and

    under Patent Claims of such Contributor to make, use, sell, offer for sale, have made, import, and otherwise transfer either its Contributions or its Contributor Version.

    2.2. Effective Date

    The licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date the Contributor first distributes such Contribution.

    2.3. Limitations on Grant Scope

    The licenses granted in this Section 2 are the only rights granted under this License. No additional rights or licenses will be implied from the distribution or licensing of Covered Software under this License. Notwithstanding Section 2.1(b) above, no patent license is granted by a Contributor:

    for any code that a Contributor has removed from Covered Software; or

    for infringements caused by: (i) Your and any other third party’s modifications of Covered Software, or (ii) the combination of its Contributions with other software (except as part of its Contributor Version); or

    under Patent Claims infringed by Covered Software in the absence of its Contributions.

    This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).

    2.4. Subsequent Licenses

    No Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent version of this License (see Section 10.2) or under the terms of a Secondary License (if permitted under the terms of Section 3.3).

    2.5. Representation

    Each Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights to grant the rights to its Contributions conveyed by this License.

    2.6. Fair Use

    This License is not intended to limit any rights You have under applicable copyright doctrines of fair use, fair dealing, or other equivalents.

    2.7. Conditions

    Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1.

    1. Responsibilities

    3.1. Distribution of Source Form

    All distribution of Covered Software in Source Code Form, including any Modifications that You create or to which You contribute, must be under the terms of this License. You must inform recipients that the Source Code Form of the Covered Software is governed by the terms of this License, and how they can obtain a copy of this License. You may not attempt to alter or restrict the recipients’ rights in the Source Code Form.

    3.2. Distribution of Executable Form

    If You distribute Covered Software in Executable Form then:

    such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient; and

    You may distribute such Executable Form under the terms of this License, or sublicense it under different terms, provided that the license for the Executable Form does not attempt to limit or alter the recipients’ rights in the Source Code Form under this License.

    3.3. Distribution of a Larger Work

    You may create and distribute a Larger Work under terms of Your choice, provided that You also comply with the requirements of this License for the Covered Software. If the Larger Work is a combination of Covered Software with a work governed by one or more Secondary Licenses, and the Covered Software is not Incompatible With Secondary Licenses, this License permits You to additionally distribute such Covered Software under the terms of such Secondary License(s), so that the recipient of the Larger Work may, at their option, further distribute the Covered Software under the terms of either this License or such Secondary License(s).

    3.4. Notices

    You may not remove or alter the substance of any license notices (including copyright notices, patent notices, disclaimers of warranty, or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may alter any license notices to the extent required to remedy known factual inaccuracies.

    3.5. Application of Additional Terms

    You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, You may do so only on Your own behalf, and not on behalf of any Contributor. You must make it absolutely clear that any such warranty, support, indemnity, or liability obligation is offered by You alone, and You hereby agree to indemnify every Contributor for any liability incurred by such Contributor as a result of warranty, support, indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability specific to any jurisdiction.

    1. Inability to Comply Due to Statute or Regulation

    If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be placed in a text file included with all distributions of the Covered Software under this License. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.

    1. Termination

    5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its terms. However, if You become compliant, then the rights granted under this License from a particular Contributor are reinstated (a) provisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if such Contributor fails to notify You of the non-compliance by some reasonable means prior to 60 days after You have come back into compliance. Moreover, Your grants from a particular Contributor are reinstated on an ongoing basis if such Contributor notifies You of the non-compliance by some reasonable means, this is the first time You have received notice of non-compliance with this License from such Contributor, and You become compliant prior to 30 days after Your receipt of the notice.

    5.2. If You initiate litigation against any entity by asserting a patent infringement claim (excluding declaratory judgment actions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any patent, then the rights granted to You by any and all Contributors for the Covered Software under Section 2.1 of this License shall terminate.

    5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or Your distributors under this License prior to termination shall survive termination.

    1. Disclaimer of Warranty

    Covered Software is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the Covered Software is free of defects, merchantable, fit for a particular purpose or non-infringing. The entire risk as to the quality and performance of the Covered Software is with You. Should any Covered Software prove defective in any respect, You (not any Contributor) assume the cost of any necessary servicing, repair, or correction. This disclaimer of warranty constitutes an essential part of this License. No use of any Covered Software is authorized under this License except under this disclaimer.

    1. Limitation of Liability

    Under no circumstances and under no legal theory, whether tort (including negligence), contract, or otherwise, shall any Contributor, or anyone who distributes Covered Software as permitted above, be liable to You for any direct, indirect, special, incidental, or consequential damages of any character including, without limitation, damages for lost profits, loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses, even if such party shall have been informed of the possibility of such damages. This limitation of liability shall not apply to liability for death or personal injury resulting from such party’s negligence to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so this exclusion and limitation may not apply to You.

    1. Litigation

    Any litigation relating to this License may be brought only in the courts of a jurisdiction where the defendant maintains its principal place of business and such litigation shall be governed by laws of that jurisdiction, without reference to its conflict-of-law provisions. Nothing in this Section shall prevent a party’s ability to bring cross-claims or counter-claims.

    1. Miscellaneous

    This License represents the complete agreement concerning the subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor.

    1. Versions of the License

    10.1. New Versions

    Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the right to modify or publish new versions of this License. Each version will be given a distinguishing version number.

    10.2. Effect of New Versions

    You may distribute the Covered Software under the terms of the version of the License under which You originally received the Covered Software, or under the terms of any subsequent version published by the license steward.

    10.3. Modified Versions

    If you create software not governed by this License, and you want to create a new license for such software, you may create and use a modified version of this License if you rename the license and remove any references to the name of the license steward (except to note that such modified license differs from this License).

    10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses

    If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version of the License, the notice described in Exhibit B of this License must be attached.

    Exhibit A - Source Code Form License Notice This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at https://mozilla.org/MPL/2.0/.

    If it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a LICENSE file in a relevant directory) where a recipient would be likely to look for such a notice.

    You may add additional accurate notices of copyright ownership.

    Exhibit B - “Incompatible With Secondary Licenses” Notice

    This Source Code Form is “Incompatible With Secondary Licenses”, as defined by the Mozilla Public License, v. 2.0.

  • OpenSSL

                              Apache License
                        Version 2.0, January 2004
                     https://www.apache.org/licenses/
    

    TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

    1. Definitions.

      "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

      "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

      "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

      "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

      "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

      "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

      "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

      "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

      "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

      "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

    2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

    3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

    4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

      (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

      (b) You must cause any modified files to carry prominent notices stating that You changed the files; and

      (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

      (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

      You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

    5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

    6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

    7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

    8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

    9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

    END OF TERMS AND CONDITIONS

  • gl3w

    This is free and unencumbered software released into the public domain.

    Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means.

    In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • HDF5

    Copyright Notice and License Terms for HDF5 (Hierarchical Data Format 5) Software Library and Utilities

    HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 2006 by The HDF Group.

    NCSA HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 1998-2006 by The Board of Trustees of the University of Illinois.

    All rights reserved.

    This software library and utilities is covered by the 3-clause BSD License.

    Redistribution and use in source and binary forms, with or without modification, are permitted for any purpose (including commercial purposes) provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer.

    2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or materials provided with the distribution.

    3. Neither the name of The HDF Group, the name of the University, nor the name of any Contributor may be used to endorse or promote products derived from this software without specific prior written permission from The HDF Group, the University, or the Contributor, respectively.

    DISCLAIMER: THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

    For further details, please refer to the full license text available at https://opensource.org/licenses/bsd-3-clause

    You are under no obligation whatsoever to provide any bug fixes, patches, or upgrades to the features, functionality or performance of the source code ("Enhancements") to anyone; however, if you choose to make your Enhancements available either publicly, or directly to The HDF Group, without imposing a separate written license agreement for such Enhancements, then you hereby grant the following license: a non-exclusive, royalty-free perpetual license to install, use, modify, prepare derivative works, incorporate into other computer software, distribute, and sublicense such enhancements or derivative works thereof, in binary and source code form.



    Contributors: National Center for Supercomputing Applications (NCSA) at the University of Illinois, Fortner Software, Unidata Program Center (netCDF), The Independent JPEG Group (JPEG), Jean-loup Gailly and Mark Adler (gzip), and Digital Equipment Corporation (DEC).


    Portions of HDF5 were developed with support from the Lawrence Berkeley National Laboratory (LBNL) and the United States Department of Energy under Prime Contract No. DE-AC02-05CH11231.


    Portions of HDF5 were developed with support from Lawrence Livermore National Laboratory and the United States Department of Energy under Prime Contract No. DE-AC52-07NA27344.


    Portions of HDF5 were developed with support from the University of California, Lawrence Livermore National Laboratory (UC LLNL). The following statement applies to those portions of the product and must be retained in any redistribution of source code, binaries, documentation, and/or accompanying materials:

    This work was partially produced at the University of California, Lawrence Livermore National Laboratory (UC LLNL) under contract no. W-7405-ENG-48 (Contract 48) between the U.S. Department of Energy (DOE) and The Regents of the University of California (University) for the operation of UC LLNL.

    DISCLAIMER: THIS WORK WAS PREPARED AS AN ACCOUNT OF WORK SPONSORED BY AN AGENCY OF THE UNITED STATES GOVERNMENT. NEITHER THE UNITED STATES GOVERNMENT NOR THE UNIVERSITY OF CALIFORNIA NOR ANY OF THEIR EMPLOYEES, MAKES ANY WARRANTY, EXPRESS OR IMPLIED, OR ASSUMES ANY LIABILITY OR RESPONSIBILITY FOR THE ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION, APPARATUS, PRODUCT, OR PROCESS DISCLOSED, OR REPRESENTS THAT ITS USE WOULD NOT INFRINGE PRIVATELY- OWNED RIGHTS. REFERENCE HEREIN TO ANY SPECIFIC COMMERCIAL PRODUCTS, PROCESS, OR SERVICE BY TRADE NAME, TRADEMARK, MANUFACTURER, OR OTHERWISE, DOES NOT NECESSARILY CONSTITUTE OR IMPLY ITS ENDORSEMENT, RECOMMENDATION, OR FAVORING BY THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA. THE VIEWS AND OPINIONS OF AUTHORS EXPRESSED HEREIN DO NOT NECESSARILY STATE OR REFLECT THOSE OF THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA, AND SHALL NOT BE USED FOR ADVERTISING OR PRODUCT ENDORSEMENT PURPOSES.


  • GCC Runtime Libraries

    This product includes portions of the GNU Compiler Collection (GCC) runtime libraries:

    • GNU C++ Standard Library (libstdc++)
    • GNU Compiler Support Library (libgcc_s)
    • GNU OpenMP Runtime (libgomp)

    These libraries are licensed under the GNU General Public License, version 3 (GPLv3) with the GCC Runtime Library Exception.

    The GCC Runtime Library Exception permits linking these libraries with independent modules to produce an executable, without requiring the executable itself to be licensed under the GPL. As a result, you may use and redistribute this product without disclosing your own source code, provided you retain this notice and comply with the licenses of the included libraries.

    License References:

    Source Code:
    The original source code for these libraries is available from the GCC project.

    These runtime libraries have been included in binary form as permitted by their licenses. No modifications have been made.

  • LLVM Runtime Libraries

    This product includes the following runtime libraries from the LLVM project:

    • libc++ (C++ Standard Library)
    • compiler-rt (Low-level compiler support, e.g., builtins)
    • libomp (OpenMP Runtime Library)

    These libraries are licensed under the Apache License, Version 2.0 with the LLVM Exceptions.

    The LLVM Exception to the Apache 2.0 License permits static or dynamic linking of these libraries into proprietary applications without imposing the license on the proprietary portions of the application.

    License References:

    Source Code:
    The original source code is available from the LLVM project.

    These libraries are included in binary form with no modifications.

  • jwt-cpp

    Copyright (c) 2018 Dominik Thalhammer

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

tidy3d_extras-2.10.1-cp313-cp313-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.13Windows x86-64

tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ i686

tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.13macOS 15.0+ x86-64

tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.13macOS 15.0+ ARM64

tidy3d_extras-2.10.1-cp312-cp312-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.12Windows x86-64

tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ i686

tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.12macOS 15.0+ x86-64

tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.12macOS 15.0+ ARM64

tidy3d_extras-2.10.1-cp311-cp311-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.11Windows x86-64

tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ i686

tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.11macOS 15.0+ x86-64

tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.11macOS 15.0+ ARM64

tidy3d_extras-2.10.1-cp310-cp310-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.10Windows x86-64

tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ i686

tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.10macOS 15.0+ x86-64

tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.10macOS 15.0+ ARM64

tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ i686

tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.1-cp39-cp39-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.9macOS 15.0+ x86-64

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-win_amd64.whl
Algorithm Hash digest
SHA256 f433eb0fff58dd4b3bd64e44a050e927bba42584292abb87e337d9a4cf0a0830
MD5 b9916b67f3406c2bff3d3703dbe5ee27
BLAKE2b-256 13a7e453aab774a87f9180847d9fce21101a7e52fa8d5480ee178bfe5a145257

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 db836275f30a1330657590d75e8b915b7e5204ec24d118ceefd6d4fa3462c066
MD5 309ae855a97a1e995080d9014e796463
BLAKE2b-256 a08d25e13e71fcf58fac964ab1948c506b9590f939d4d9b5ed9a779bbaa6d6a7

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 027e3da081effef7c3642aa4eecaa76bf138e1299e03e50814d4fac1b1f4b0da
MD5 fbd848dc06e1b5efa7fa29d8694c0d12
BLAKE2b-256 bfa176b8a3a11b99bf80d2a6790c6c12784b3a3b19030edcb49e5d793d85c041

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 72f306a65b0f3f095fc41c6c112ca74e6c115d08f0ed7e61ef59249627ef4cf3
MD5 2347241bb5f293b2777d3ad31c6c3be3
BLAKE2b-256 d320d0423ed457e695c759490c7425bb0daf1d18244975e6202caf613300b016

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 923b1c275dc51a613609de22c4efd701ee06f1f5c09d34b85bb955916e4e7cd8
MD5 b230d9d85c731c5aa968a615a044047b
BLAKE2b-256 72ee6ccd543e53802d617754de93d6483c9fe7d98129945b7451c137c307714b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 a316ac0fbd05a1fbdaf35ef956cd3dff15d8fa7bd17680d2335960fc090b7653
MD5 d617f4b942f3b0f8ab185f5cba77f13f
BLAKE2b-256 7cc4a26a7fb1373ee8fc2bc8d9ac9098061f868b8a070c86f0125c6e08755615

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 0f3ea1356c99aaf5c40f747232f8528220f8f73ecab5f718a7ea28432b01aa9c
MD5 d30d302f7be84bb63fe32705afa4b267
BLAKE2b-256 7533e8249ff86ddc081faf75f04805b0c3ff5bddef4084733cc8fb2717929fa2

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 971539fa7cba087185b0c21295fc89ce1e2f4b3fa13938a5c2ca73c8eedb5520
MD5 cc1d75d0f40dce55bdbb34163be20fe6
BLAKE2b-256 eda52ea42d252acac61d5ee76c8871ace4437a2b718490cef730cf24060d257b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 22a32ce0cb84757c5a93ee352b1475348fde0b42155d3136f29e093d2c9faa91
MD5 4ffd792d16919eb22b485f7bd37c4437
BLAKE2b-256 c0e7287a2039a98cae2f2802ca0ae214962fa6794fdfc3d6ba51958d3b2a838d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 e2e301275339c7653dab3e38d4a9f9fb3f6d305770bf7e1343889397bafddfc0
MD5 d6452695093218fbc3b0e7d4275d4c01
BLAKE2b-256 a5431d8ebe028343b06a8f178954c3da1bace27599c55cdcab6dd2f44954c235

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp313-cp313-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 5313abf3146f99dcd1f83027e991766095e42438743c584a30a1904c222e9b20
MD5 7447195f21b92b46a8ff6aa2306f1ef4
BLAKE2b-256 4c79931e768fb4d152afe15321fd45b7a59bf939eea31354d46b3a6f867cd73c

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-win_amd64.whl
Algorithm Hash digest
SHA256 ccb1e1578f99d240f5d3f050c84a3ac120b57157e73c3ff3f7fbd6c2a94b4cfc
MD5 5589df78cc878943b053cc0c6e9005ed
BLAKE2b-256 a648a060df455db156791a011420b3fd6b861afad1c6180f4d4a4caec747da67

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 11dbb3b91d79fcad259f682e7585b87e4063d4f3764b17cfb317f42ed494b335
MD5 c638ab5462e0684e3ea4d49aa9797b92
BLAKE2b-256 1ce8415eb5812a9693b93e7077da9782b8ada33b8451dff4fcac31a847055b7f

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 9138ec49d63ae8349ee8dde07fd0ecba4e675a66d10376b508e44a005c3c61ad
MD5 9ae33ebd0d0ddc9988dc60eddb0bb10d
BLAKE2b-256 c67fdb2b8f8d04667f2933ed1634b7f510e54ace63efcd3fd2146a61c1560e47

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 14dc06675f7a3caf08714249833971a8c54a6d43752af106fd73245511d8c2fe
MD5 15a282052183dc52d9c5be67e6a6d63d
BLAKE2b-256 95d4590879f556a29bd91da38bed9b82c307d6ee3b2e099ed82a7d507dfc99f9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 4254a51e24d93cd7899d8e26fd217f59ac851d71e9a651a1bc4962f11ea2e6e7
MD5 b95154eaca778ca8df4d4a6865a0ba09
BLAKE2b-256 fd4bfc29fb7f6555f5d053aa3f4dfc127721e8526a18ca6ac4a2f0cb34c47bb7

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 53dd66c97034b49a6ae5ca656cdf41cc5ea73ce361c53cada35d8ad47a5c42c2
MD5 696a8aac10914f44381b6ffd70720e67
BLAKE2b-256 48c214510ed317ad11d693f78b98c32241f573af03cc3acbca7e211a92f681ec

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 9ffe35fcd02eca6cdb45c670bc67b7da94dd8dd3ed1988193c8996007247e31f
MD5 90c56b0ea83f3cb1375072c2a9a8db13
BLAKE2b-256 ca59512a78d995b1c680541ea737cb4a01ae13acad9246d2947846175690ec14

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 f79469174f2c4086fdca7b59975fe1cc17c7849147c60e3040b81d314ff58956
MD5 c4b451c4bcb3f4d26b9f7f488cedc3ec
BLAKE2b-256 25926bb898384caa03514f6ef17d295564ddc426bd832d9fac3862bd2b9cafb6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 87925c2240601102c0fd51423cb895ab70ca69088f50c3faa4f5120937299a33
MD5 0d0657e50ce48d37d0edad37a4551588
BLAKE2b-256 62a20b7ab709ed5ae39113d7f270cee3eb28a4133fb16f20fee78023004486ef

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 0ffd4a48e9a1581ec77e53568999b3dc451adc3088e6e09fa1c98624b174762b
MD5 fe7ec70ca50359f26e2424614402ef1a
BLAKE2b-256 9e0d5a2839a2b542c72973dda02bd9c1024cc2c41be0cbc15299085eed2a01e0

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp312-cp312-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 4b48345ad45a2788a7826e9ba782aa41cf18f14d6f2c285aae3e5a79bacc07d8
MD5 c6dae1039c6cdc9f1108f4ea490815ec
BLAKE2b-256 7148052aa3696bd70c2b2a86559874cfc048987115c8f6c1f13d25cc5b24ad10

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-win_amd64.whl
Algorithm Hash digest
SHA256 6e3b94cf91f9376bdf07813510d084f3e23e9797e6b28cd6f1ab8546a165c9fe
MD5 9128c1caea32fae7594792746ceefd00
BLAKE2b-256 3560e72ae8ac751961812a6fa97e8e903fb99bcae84ffcea52033a803207e936

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 b3bb4000b17f20375d12f067f1860636c29a3c8ce65a91c57c2d52015fc31bd3
MD5 e0bd06076cbc98c83508c76d360708cf
BLAKE2b-256 80cb727ab9bd2abb5daf7757838ed35744c7d782364a08f61ae08d6dbcc3b78b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 f9a0f7bc1ee0f1ee209c4ae6d6f743d722493893222a069bb263c6268cc0874c
MD5 25cca699cccc1389c202934b4831f241
BLAKE2b-256 e549ebcfa6e382ce518efcb614eaf2bd42026d5f998f90b79f703c3e3778d14a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 ccd1dcded97f8052cf16f264fd395940e061a84d16cb14bdb1b2db2c26749a10
MD5 79761a2aae26d921f88d8407a01c9683
BLAKE2b-256 d66e2a8f5d8409caf60976a3c10651a49c4276aec71be28b86e7aee4805a8901

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 a89b8da93d297e60864e37b07ead6ed23d6a1b45c0eecc9b3c4ef5062cc15e89
MD5 edde8d9c58a6af19bd6ee1e4974b2237
BLAKE2b-256 ef35e29b74a05ce66a55863a1dcf463167252530d7425ecc11b4748410e2fcea

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 703b6460d852c8f539ef57359b19b2dd981bc8eb4fd5556237a2b17e590181f7
MD5 1295335d4f054525a4c85e5e17e2662d
BLAKE2b-256 5ce499cb58f6f1a87e8cde7dd37cb9d7d16d2488c28534be6e130b6e1bcd6925

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 499c69f398ef17b91daa601ec6407ff251c4524253f61f57736c699ac99fa55e
MD5 5c0f0d85965c4157542061da91d1c809
BLAKE2b-256 bf4d3712f06b4ed093cf6b641e7b8ab6748801c2c8ac1c965e9e1de547d15bef

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 8c1cb25b29ede65c94a75dc663a94f0ad6ceba63442e43ec73c8a69cb78b7089
MD5 7a36aae5721cd2cd84813864538f4316
BLAKE2b-256 d42649f70b22b20b672cf897ec29332712d7bf806b6095c10c854f9495ec8deb

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 86a0429b1a974871a23bc4e7e55e743cd2c74648b677221d2d7e850db3938c22
MD5 730eadc9c630a6ad59ef8163f28b0fcf
BLAKE2b-256 861ccbac08720296c110810a8ffb6b6d20f9c8870956f8585c6c54e7a1fd7c1f

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 73a830cbddbe2079c1cfc19fa9e1cfbb4d89459e637e3089f8fe2216e8bceb04
MD5 8b3a9790dba22475b6be850d3a7226ba
BLAKE2b-256 fa741409aa49b9833fdf233f2e6b15e3eba679db0e6dca5fb9fdc7f910ba7fa3

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp311-cp311-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 93a7ed71d6d81fe847f44ce22e01bc838cf4c984711fb440852591eced207477
MD5 02713d9cb933ad66d0f7cb0e68268adf
BLAKE2b-256 8d42061f1c64e626f8f9af819bfd04e6c0820e7c83f36a11dc6c14d5a017f692

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-win_amd64.whl
Algorithm Hash digest
SHA256 ce4a176c09896fc12790e811074d203b153adc5722991948f82b24724be960a0
MD5 60390c6284c586ff8d8bd6d692728773
BLAKE2b-256 1d505c4a74b5b35dc4753b0e9a21d013d0702e65514c5ff6bfdcc684a12e64b6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 d1093a400ff8d13bb2945c25447eb6e5527e63ac12c4f0af7dc1e62ed6f4cba5
MD5 64ffcbc1da7dc9fd9781ed633c10a8e2
BLAKE2b-256 a9ba1581fa271733e5f4048d47ff4f854c88ea824a844c572361009b85356cf1

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 374db174b6600980b696c5ed9a58cffafed0a336e20a1baaa024553d28fc603b
MD5 e7c9dd58c091caffa0433c0f8acc1862
BLAKE2b-256 2c3b6e910cf79067796cdb60b5dff5d8a3d10d3f1556d0b4f491720088d4e903

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 34683b738568a6d624d28d06361342ae6d3078afa7397c82b546583f3155c772
MD5 62e67a2a6f08888f24b3a78298584268
BLAKE2b-256 e7c6700fd15aa959e1db4a391aed5320c73cdd6de44d9cac9737c23d116aeb69

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 f8063a450936fc435e3a3e4bdb2cb2b65bbd27467edf7831cbcba52f5d69a154
MD5 b8433881c2147e3865c1353bab422969
BLAKE2b-256 4e186186feb88260c55f45ef91674d51334124f3ed9ce07baeb6e8a04bde535a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 e355dcc8ba2252292cd287c8c23e8b70bfff8022b9b6a89969fb112cb4d00721
MD5 7a21bc7f13578c4eaabfae863c178605
BLAKE2b-256 d8fcd5b9eaa2714b6558ff15fb61afab15311f42e29fe4564d9ea4885e72d782

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 85e1755475f84159afae4f9647feba58b3e2bb9c9fe89aeb74773c5191f3f00d
MD5 feef5204ed34586ae408809b222bd0a7
BLAKE2b-256 b6de8d7105fcd6ebf27e2fd0d9d3d7c6899c8347d806ae079c46442c1a4cd25d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 a27eb108de63d0f1ffe4646d94854f4e2b2b8704bcdac8c8cc76c959a18b11b9
MD5 deb8ab13ce5a12ed169ae425ec9bbc6f
BLAKE2b-256 bda09a71aad58ec416c088dcb52d2100e00ad5625c8d0851ad640ccf0e55127b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 2fc670e77bb2219dba729c90c7535a435b6b955c1af794e347ff932ae22b99e2
MD5 9b72239a8cbb252244c7f3d30f8be268
BLAKE2b-256 65564d50a19600b363a4d6a9b03bc8961a77fadb3a0f49982b19c4e0f7c8caa7

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 ff567b3660c51d1c0f587d95a41f4745a603a034ccd8e366b0364d35e1fce688
MD5 63f795e2a9d37801a250c3730b37c699
BLAKE2b-256 5ea4fcc2178a4b98670f15dd46fe61a00eb327439f9ce38eaff3e879da419ec3

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp310-cp310-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 c3a97a0eba0399203501c6859ade3bd09e11a16823ae7fd94f9dc40b051a82f1
MD5 f9d4015d7529658e67b7bb314245f1df
BLAKE2b-256 63440402013b73b2b59e8565eb948ab5ba5b373a463a2b953390eaf6bef9a659

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 1bc45b824f977260c83bc786e76b43fd1b0c91ab1727e12c3d76f4c8a5e24970
MD5 25a42f4e1bdbe5db14e2c3b172ba5031
BLAKE2b-256 2e79511595d4050870693099a3ee86671715a2af008cf5af198400a73d236354

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 b792d4c10dae61ce7c3a27f013fd11b6854a4dde94e13a603d6337ee67258417
MD5 8c25f138b34c751daa3d13107f6022e4
BLAKE2b-256 d44e4ce3d9307aa2ee22162c41d4a1e960243ad1ef8ed652f640b4cbf32d09da

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 ea79aad8114ce9e426482003d8aedd9bdc4ce6add8deb2323f4d416ed31dfe8b
MD5 a4778005480fada855ec5cfaaf84bb68
BLAKE2b-256 315793b65de5a314ca253b644fbeb15e9ac24ccbc8d604b9c33c8bb8ca95f47f

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 4dd03a54b3eb3a1e4dcef83ba9fc4cded58439c5dbebfe99872b069d5710d450
MD5 4cb5c8ab02f4cc0382d6340104039846
BLAKE2b-256 7ec307ec2f17ced30ae3b71c162eb60e934f25943991ba01c66893f456428d82

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 948ae21788925877a11c87da73d9017e7a629a6074bdb36ee4a37a2715ef6421
MD5 b954426167080a214efe0d93c8b2a8cc
BLAKE2b-256 a733562eea89ec13d107c7b96f091c7cc95d99b671c2de9781ef00faae28a165

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 80f9f0484e89f61ff78f5c85f9c91f5ae0ba1cacada866c1b454b5b3329275ad
MD5 5f4a4ad0041245f21fe686cd1bd1bd49
BLAKE2b-256 2132909037c0f4f5941f6c7008e3604a971255ed38034c13da3bc4f1a53cb03a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 af35187cf96ab4efd90a0ea8beeac2b94db56a4d981456cda332f3ec77a7a54a
MD5 12a115e67def75b671a3ff854f38b2ea
BLAKE2b-256 638923cd9333d9a923c7514bb77f44b9c2cb3f425a276f615e497357295a84d9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 695f987bcabe58081ebad8cd42006d4c116b34f492f8287a5cfe14706cf87667
MD5 266f4a06b216b823678487ef758409af
BLAKE2b-256 f45c2e31616fb9a3c456f807850220fd2955b216f4ddd35214a303110ab2c8ef

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.1-cp39-cp39-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.1-cp39-cp39-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 bf63d351c65b01417fd8da507952327ba770f104233a53e59e88359afeac34ce
MD5 fea73138a861f7acc6adb53a17112f8c
BLAKE2b-256 79d4f680119dc9c162f5e604883211bba6681871c4a23aae3c809a20fe10ae9b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page