Skip to main content

tidy3d-extras is an optional plugin for Tidy3D providing addtional, more advanced local functionality.

Project description

tidy3d-extras

tidy3d-extras is an optional plugin for Tidy3D providing additional, more advanced local fuctionality. This additional functionality includes a more accurate local mode solver with subpixel averaging.

Documentation

The online documentation for Tidy3D can be found here.

Installation

tidy3d-extras is a python module that can be easily installed via pip. The version must match the version of Tidy3D, so the preferred command for installation is:

pip install tidy3d[extras]

This command will install tidy3d-extras along with all of its dependencies in the current environment.

A Tidy3D API key is required to authenticate tidy3d-extras users. If you don't have one already configured, you can get a free API key and configure it with the following command:

tidy3d configure

On Windows, it is easier to use pipx to find the path to the configuration tool:

pip install pipx
pipx run tidy3d configure

More information about the installation and configuration of Tidy3D can be found here.

You can verify that the tidy3d-extras installation worked by running the following command to print the installed version:

python -c 'import tidy3d_extras as tde; print(tde.__version__)'

Third-party libraries and licenses

  • json

    MIT License

    Copyright (c) 2013-2022 Niels Lohmann

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • toml++

    MIT License

    Copyright (c) Mark Gillard mark.gillard@outlook.com.au

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • ZLIB

    Copyright (C) 1995-2024 Jean-loup Gailly and Mark Adler

    This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

    Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

    1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
    2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
    3. This notice may not be removed or altered from any source distribution.

    Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu

  • CDT

    Mozilla Public License

    Version 2.0

    1. Definitions

    1.1. “Contributor”

    means each individual or legal entity that creates, contributes to the creation of, or owns Covered Software.

    1.2. “Contributor Version”

    means the combination of the Contributions of others (if any) used by a Contributor and that particular Contributor’s Contribution.

    1.3. “Contribution”

    means Covered Software of a particular Contributor.

    1.4. “Covered Software”

    means Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such Source Code Form, and Modifications of such Source Code Form, in each case including portions thereof.

    1.5. “Incompatible With Secondary Licenses”

    means

    that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or

    that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License.

    1.6. “Executable Form”

    means any form of the work other than Source Code Form.

    1.7. “Larger Work”

    means a work that combines Covered Software with other material, in a separate file or files, that is not Covered Software.

    1.8. “License”

    means this document.

    1.9. “Licensable”

    means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently, any and all of the rights conveyed by this License.

    1.10. “Modifications”

    means any of the following:

    any file in Source Code Form that results from an addition to, deletion from, or modification of the contents of Covered Software; or

    any new file in Source Code Form that contains any Covered Software.

    1.11. “Patent Claims” of a Contributor

    means any patent claim(s), including without limitation, method, process, and apparatus claims, in any patent Licensable by such Contributor that would be infringed, but for the grant of the License, by the making, using, selling, offering for sale, having made, import, or transfer of either its Contributions or its Contributor Version.

    1.12. “Secondary License”

    means either the GNU General Public License, Version 2.0, the GNU Lesser General Public License, Version 2.1, the GNU Affero General Public License, Version 3.0, or any later versions of those licenses.

    1.13. “Source Code Form”

    means the form of the work preferred for making modifications.

    1.14. “You” (or “Your”)

    means an individual or a legal entity exercising rights under this License. For legal entities, “You” includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, “control” means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

    1. License Grants and Conditions

    2.1. Grants

    Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

    under intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make available, modify, display, perform, distribute, and otherwise exploit its Contributions, either on an unmodified basis, with Modifications, or as part of a Larger Work; and

    under Patent Claims of such Contributor to make, use, sell, offer for sale, have made, import, and otherwise transfer either its Contributions or its Contributor Version.

    2.2. Effective Date

    The licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date the Contributor first distributes such Contribution.

    2.3. Limitations on Grant Scope

    The licenses granted in this Section 2 are the only rights granted under this License. No additional rights or licenses will be implied from the distribution or licensing of Covered Software under this License. Notwithstanding Section 2.1(b) above, no patent license is granted by a Contributor:

    for any code that a Contributor has removed from Covered Software; or

    for infringements caused by: (i) Your and any other third party’s modifications of Covered Software, or (ii) the combination of its Contributions with other software (except as part of its Contributor Version); or

    under Patent Claims infringed by Covered Software in the absence of its Contributions.

    This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).

    2.4. Subsequent Licenses

    No Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent version of this License (see Section 10.2) or under the terms of a Secondary License (if permitted under the terms of Section 3.3).

    2.5. Representation

    Each Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights to grant the rights to its Contributions conveyed by this License.

    2.6. Fair Use

    This License is not intended to limit any rights You have under applicable copyright doctrines of fair use, fair dealing, or other equivalents.

    2.7. Conditions

    Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1.

    1. Responsibilities

    3.1. Distribution of Source Form

    All distribution of Covered Software in Source Code Form, including any Modifications that You create or to which You contribute, must be under the terms of this License. You must inform recipients that the Source Code Form of the Covered Software is governed by the terms of this License, and how they can obtain a copy of this License. You may not attempt to alter or restrict the recipients’ rights in the Source Code Form.

    3.2. Distribution of Executable Form

    If You distribute Covered Software in Executable Form then:

    such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient; and

    You may distribute such Executable Form under the terms of this License, or sublicense it under different terms, provided that the license for the Executable Form does not attempt to limit or alter the recipients’ rights in the Source Code Form under this License.

    3.3. Distribution of a Larger Work

    You may create and distribute a Larger Work under terms of Your choice, provided that You also comply with the requirements of this License for the Covered Software. If the Larger Work is a combination of Covered Software with a work governed by one or more Secondary Licenses, and the Covered Software is not Incompatible With Secondary Licenses, this License permits You to additionally distribute such Covered Software under the terms of such Secondary License(s), so that the recipient of the Larger Work may, at their option, further distribute the Covered Software under the terms of either this License or such Secondary License(s).

    3.4. Notices

    You may not remove or alter the substance of any license notices (including copyright notices, patent notices, disclaimers of warranty, or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may alter any license notices to the extent required to remedy known factual inaccuracies.

    3.5. Application of Additional Terms

    You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, You may do so only on Your own behalf, and not on behalf of any Contributor. You must make it absolutely clear that any such warranty, support, indemnity, or liability obligation is offered by You alone, and You hereby agree to indemnify every Contributor for any liability incurred by such Contributor as a result of warranty, support, indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability specific to any jurisdiction.

    1. Inability to Comply Due to Statute or Regulation

    If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be placed in a text file included with all distributions of the Covered Software under this License. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.

    1. Termination

    5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its terms. However, if You become compliant, then the rights granted under this License from a particular Contributor are reinstated (a) provisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if such Contributor fails to notify You of the non-compliance by some reasonable means prior to 60 days after You have come back into compliance. Moreover, Your grants from a particular Contributor are reinstated on an ongoing basis if such Contributor notifies You of the non-compliance by some reasonable means, this is the first time You have received notice of non-compliance with this License from such Contributor, and You become compliant prior to 30 days after Your receipt of the notice.

    5.2. If You initiate litigation against any entity by asserting a patent infringement claim (excluding declaratory judgment actions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any patent, then the rights granted to You by any and all Contributors for the Covered Software under Section 2.1 of this License shall terminate.

    5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or Your distributors under this License prior to termination shall survive termination.

    1. Disclaimer of Warranty

    Covered Software is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the Covered Software is free of defects, merchantable, fit for a particular purpose or non-infringing. The entire risk as to the quality and performance of the Covered Software is with You. Should any Covered Software prove defective in any respect, You (not any Contributor) assume the cost of any necessary servicing, repair, or correction. This disclaimer of warranty constitutes an essential part of this License. No use of any Covered Software is authorized under this License except under this disclaimer.

    1. Limitation of Liability

    Under no circumstances and under no legal theory, whether tort (including negligence), contract, or otherwise, shall any Contributor, or anyone who distributes Covered Software as permitted above, be liable to You for any direct, indirect, special, incidental, or consequential damages of any character including, without limitation, damages for lost profits, loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses, even if such party shall have been informed of the possibility of such damages. This limitation of liability shall not apply to liability for death or personal injury resulting from such party’s negligence to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so this exclusion and limitation may not apply to You.

    1. Litigation

    Any litigation relating to this License may be brought only in the courts of a jurisdiction where the defendant maintains its principal place of business and such litigation shall be governed by laws of that jurisdiction, without reference to its conflict-of-law provisions. Nothing in this Section shall prevent a party’s ability to bring cross-claims or counter-claims.

    1. Miscellaneous

    This License represents the complete agreement concerning the subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor.

    1. Versions of the License

    10.1. New Versions

    Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the right to modify or publish new versions of this License. Each version will be given a distinguishing version number.

    10.2. Effect of New Versions

    You may distribute the Covered Software under the terms of the version of the License under which You originally received the Covered Software, or under the terms of any subsequent version published by the license steward.

    10.3. Modified Versions

    If you create software not governed by this License, and you want to create a new license for such software, you may create and use a modified version of this License if you rename the license and remove any references to the name of the license steward (except to note that such modified license differs from this License).

    10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses

    If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version of the License, the notice described in Exhibit B of this License must be attached.

    Exhibit A - Source Code Form License Notice This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at https://mozilla.org/MPL/2.0/.

    If it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a LICENSE file in a relevant directory) where a recipient would be likely to look for such a notice.

    You may add additional accurate notices of copyright ownership.

    Exhibit B - “Incompatible With Secondary Licenses” Notice

    This Source Code Form is “Incompatible With Secondary Licenses”, as defined by the Mozilla Public License, v. 2.0.

  • OpenSSL

                              Apache License
                        Version 2.0, January 2004
                     https://www.apache.org/licenses/
    

    TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

    1. Definitions.

      "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

      "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

      "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

      "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

      "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

      "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

      "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

      "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

      "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

      "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

    2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

    3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

    4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

      (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

      (b) You must cause any modified files to carry prominent notices stating that You changed the files; and

      (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

      (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

      You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

    5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

    6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

    7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

    8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

    9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

    END OF TERMS AND CONDITIONS

  • gl3w

    This is free and unencumbered software released into the public domain.

    Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means.

    In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

  • HDF5

    Copyright Notice and License Terms for HDF5 (Hierarchical Data Format 5) Software Library and Utilities

    HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 2006 by The HDF Group.

    NCSA HDF5 (Hierarchical Data Format 5) Software Library and Utilities Copyright 1998-2006 by The Board of Trustees of the University of Illinois.

    All rights reserved.

    This software library and utilities is covered by the 3-clause BSD License.

    Redistribution and use in source and binary forms, with or without modification, are permitted for any purpose (including commercial purposes) provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer.

    2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or materials provided with the distribution.

    3. Neither the name of The HDF Group, the name of the University, nor the name of any Contributor may be used to endorse or promote products derived from this software without specific prior written permission from The HDF Group, the University, or the Contributor, respectively.

    DISCLAIMER: THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

    For further details, please refer to the full license text available at https://opensource.org/licenses/bsd-3-clause

    You are under no obligation whatsoever to provide any bug fixes, patches, or upgrades to the features, functionality or performance of the source code ("Enhancements") to anyone; however, if you choose to make your Enhancements available either publicly, or directly to The HDF Group, without imposing a separate written license agreement for such Enhancements, then you hereby grant the following license: a non-exclusive, royalty-free perpetual license to install, use, modify, prepare derivative works, incorporate into other computer software, distribute, and sublicense such enhancements or derivative works thereof, in binary and source code form.



    Contributors: National Center for Supercomputing Applications (NCSA) at the University of Illinois, Fortner Software, Unidata Program Center (netCDF), The Independent JPEG Group (JPEG), Jean-loup Gailly and Mark Adler (gzip), and Digital Equipment Corporation (DEC).


    Portions of HDF5 were developed with support from the Lawrence Berkeley National Laboratory (LBNL) and the United States Department of Energy under Prime Contract No. DE-AC02-05CH11231.


    Portions of HDF5 were developed with support from Lawrence Livermore National Laboratory and the United States Department of Energy under Prime Contract No. DE-AC52-07NA27344.


    Portions of HDF5 were developed with support from the University of California, Lawrence Livermore National Laboratory (UC LLNL). The following statement applies to those portions of the product and must be retained in any redistribution of source code, binaries, documentation, and/or accompanying materials:

    This work was partially produced at the University of California, Lawrence Livermore National Laboratory (UC LLNL) under contract no. W-7405-ENG-48 (Contract 48) between the U.S. Department of Energy (DOE) and The Regents of the University of California (University) for the operation of UC LLNL.

    DISCLAIMER: THIS WORK WAS PREPARED AS AN ACCOUNT OF WORK SPONSORED BY AN AGENCY OF THE UNITED STATES GOVERNMENT. NEITHER THE UNITED STATES GOVERNMENT NOR THE UNIVERSITY OF CALIFORNIA NOR ANY OF THEIR EMPLOYEES, MAKES ANY WARRANTY, EXPRESS OR IMPLIED, OR ASSUMES ANY LIABILITY OR RESPONSIBILITY FOR THE ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION, APPARATUS, PRODUCT, OR PROCESS DISCLOSED, OR REPRESENTS THAT ITS USE WOULD NOT INFRINGE PRIVATELY- OWNED RIGHTS. REFERENCE HEREIN TO ANY SPECIFIC COMMERCIAL PRODUCTS, PROCESS, OR SERVICE BY TRADE NAME, TRADEMARK, MANUFACTURER, OR OTHERWISE, DOES NOT NECESSARILY CONSTITUTE OR IMPLY ITS ENDORSEMENT, RECOMMENDATION, OR FAVORING BY THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA. THE VIEWS AND OPINIONS OF AUTHORS EXPRESSED HEREIN DO NOT NECESSARILY STATE OR REFLECT THOSE OF THE UNITED STATES GOVERNMENT OR THE UNIVERSITY OF CALIFORNIA, AND SHALL NOT BE USED FOR ADVERTISING OR PRODUCT ENDORSEMENT PURPOSES.


  • GCC Runtime Libraries

    This product includes portions of the GNU Compiler Collection (GCC) runtime libraries:

    • GNU C++ Standard Library (libstdc++)
    • GNU Compiler Support Library (libgcc_s)
    • GNU OpenMP Runtime (libgomp)

    These libraries are licensed under the GNU General Public License, version 3 (GPLv3) with the GCC Runtime Library Exception.

    The GCC Runtime Library Exception permits linking these libraries with independent modules to produce an executable, without requiring the executable itself to be licensed under the GPL. As a result, you may use and redistribute this product without disclosing your own source code, provided you retain this notice and comply with the licenses of the included libraries.

    License References:

    Source Code:
    The original source code for these libraries is available from the GCC project.

    These runtime libraries have been included in binary form as permitted by their licenses. No modifications have been made.

  • LLVM Runtime Libraries

    This product includes the following runtime libraries from the LLVM project:

    • libc++ (C++ Standard Library)
    • compiler-rt (Low-level compiler support, e.g., builtins)
    • libomp (OpenMP Runtime Library)

    These libraries are licensed under the Apache License, Version 2.0 with the LLVM Exceptions.

    The LLVM Exception to the Apache 2.0 License permits static or dynamic linking of these libraries into proprietary applications without imposing the license on the proprietary portions of the application.

    License References:

    Source Code:
    The original source code is available from the LLVM project.

    These libraries are included in binary form with no modifications.

  • jwt-cpp

    Copyright (c) 2018 Dominik Thalhammer

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

tidy3d_extras-2.10.2-cp313-cp313-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.13Windows x86-64

tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ i686

tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.13manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.13macOS 15.0+ x86-64

tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.13macOS 15.0+ ARM64

tidy3d_extras-2.10.2-cp312-cp312-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.12Windows x86-64

tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ i686

tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.12manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.12macOS 15.0+ x86-64

tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.12macOS 15.0+ ARM64

tidy3d_extras-2.10.2-cp311-cp311-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.11Windows x86-64

tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ i686

tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.11macOS 15.0+ x86-64

tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.11macOS 15.0+ ARM64

tidy3d_extras-2.10.2-cp310-cp310-win_amd64.whl (2.9 MB view details)

Uploaded CPython 3.10Windows x86-64

tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ i686

tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.10manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.10macOS 15.0+ x86-64

tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_arm64.whl (3.4 MB view details)

Uploaded CPython 3.10macOS 15.0+ ARM64

tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_x86_64.whl (4.7 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ x86-64

tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_i686.whl (4.5 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ i686

tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9musllinux: musl 1.2+ ARM64

tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_x86_64.whl (4.1 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ x86-64

tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_aarch64.whl (4.3 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.28+ ARM64

tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ x86-64

tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl (4.0 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ i686

tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (3.6 MB view details)

Uploaded CPython 3.9manylinux: glibc 2.17+ ARM64

tidy3d_extras-2.10.2-cp39-cp39-macosx_15_0_x86_64.whl (3.4 MB view details)

Uploaded CPython 3.9macOS 15.0+ x86-64

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-win_amd64.whl
Algorithm Hash digest
SHA256 ffe822f22f7e67f6940e4ed3c26723c1c40fd06b0dcefd15e68eaa74db8f969a
MD5 f7472f35835ebb789af89cdc138fffa2
BLAKE2b-256 d8cd1b38e8de1f2ad68d4992c5cf6f02c5f09ba40acedcd313e9b66faa679ab8

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 0a0df92532b6be8a14f1e77c50fc8fe5838ef12968fca0651c9842ae45983e2c
MD5 c7b1f83c5c2cb201fb0b07c806198f58
BLAKE2b-256 96a6e9f8cfd72e5c9d340ab60de497da1d4e1b505c194dde3dffdad21b107d45

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 345e3a7ad5e012ee0fc06e176036ada8f6de5c76a454a02d46f417cd5312708a
MD5 e79c801c001fe52116a0ccb1850df0bb
BLAKE2b-256 32bd70438cc70017d4113905b8ca3017ca0fcc6ac7d9856ceb4a6c4756e48938

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 c9e526bb7bb172b49974962c302be36303d7043c280f9e8656f349c8b4c948b0
MD5 521c41a7820b0225d67f4408eb5d9175
BLAKE2b-256 e2e91cf7c1421217960fa44b59218a1de8af48943a9e0233d9da9b37cee5b726

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 fdeff5b1ff7367555fd78821bc2c4ef09506ab318d1cc1a1617c59d63e754a22
MD5 b880c040fd148d3b2e6f234827332aae
BLAKE2b-256 6fbe3fb6602894cf7fbd32af11a02097e180ff23c02fea440dd2adc0224a00a5

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 891e39be4b1d0376c0da6608ef7db92920a3ab975a0afdf62a1c67e110520f3c
MD5 51df538cc4a99cca84bccf68c81bc131
BLAKE2b-256 1fce6dc912da3403cffb30427ffae0e8200fb719fe7fdf40af8d2408830c99d5

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 1be44419986574530df3a040aacb8aa77fb492b50e81f9ef157598bf1a1289ab
MD5 22789b5a076c0d53fa58cfcabbe9cb77
BLAKE2b-256 9019c2aaed0e25e87ee2769db689b91abe11761423548267f92fdd005b44b8c6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 2b1b988487c70b1f05f4d6b0890e9121099adb9a64d8b45674bf7e247611c8e4
MD5 f37497bbe0118eaa1a0f9c2788186944
BLAKE2b-256 7c249cd98f12b8df44740662eb56e3cf435abcd035a8061df929245cd1bbed38

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 7b0b69514130e7cd46a877971a719f8eeed5ee815d1d4da20fb5a52653f77e47
MD5 2572b8eaf300f5333ccc626fde2a8ea6
BLAKE2b-256 479578f99feaf47ac63559bb859f6412e45c3aa820cacc9cfc7dfe58af718dce

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 0e03b252627b53593167b113ce413d3b88a66cc720bd0bdad0e75a1a7dd2dd9d
MD5 cef629b750e8ebab1a1e65c01261d93e
BLAKE2b-256 88b79930d2c0e1b87e9da3e7e5d655079431bf24c37badc3875d923ab723c41c

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp313-cp313-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 b685bbab304bee38b1033ad09a3fbaee60b0ae17d4a818990fd154dc0658546b
MD5 dad7dd0146012cbc779973a2fc76573d
BLAKE2b-256 ed83067c4a86c86c39df42a363bb8407f5e9b2853317322f14aa2f8bbd889818

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-win_amd64.whl
Algorithm Hash digest
SHA256 f9800fea4d62dd27910ec37d708f54c14f4926ac79aa12c14325405e0fef03be
MD5 6df8ae52e2f1adf9e597530ecba5e365
BLAKE2b-256 c7fc4daa135c29c3fa3ce74065dd7daba0f0e76bbe131070a02f0ff80c835072

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 9e670d37c30a69fe78035134548c365b62708a763c9ae1759cd8d83e4284146a
MD5 daaf7b0f220444d152ef8dad5b056e04
BLAKE2b-256 8e302f19c8ecad9b242933f05ba4144bf58f6c304d5cf856c74cc7d35d5086c0

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 da8d1d03a52a9cbf7c665c15c1a7d9424fdb9fd60162c563815dca9a16bc577b
MD5 c5d77e44d14547cf1ec280b45599ae32
BLAKE2b-256 6a3348a7394b32c7b9e18b22fea373d8ddef2783c590f9bfa1f070d7d2c2c865

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 e72af1de956553841b594cf3740a15bd9c87e8bc8e827b8fd4141e00888f3ee2
MD5 a5b04e926257f025b28e8455ee41f241
BLAKE2b-256 b1895a06a0a3b902303c3593482dfb58c83a86dac4b22ca9af96c4530c84a26d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 66dd2ada8e853eb6e66fb1ed66a3e47b23c8263c07af56e487dfd5ea222f07d1
MD5 eabbda9a5bf0845222d7a3114d68c7ab
BLAKE2b-256 8ebd5ea16750d1bed60d109dfa2aa2f9ef9f8b11729c62ff9dcd245b012ca811

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 20992d4fd2d222523ad7d53a183d08889c2dfa41170794b62564ccd80e19b837
MD5 4e1f8a5c7bb45d5af0ab66348c576bec
BLAKE2b-256 25deb6067f45828f7d12b2916544524aa837840dc976fd87abb6c3a78084c86e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 3bbcd55f0c10a9886db47045550dcaa96edb837632ad24164285eaa3506301d4
MD5 1383f18f77cabccea12a808c1bd441a2
BLAKE2b-256 6480a893d8d31ef0a0e56e84aba6db4f79fed2616d2742668670d3c36b4cc47b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 29d9edd340becfe200bf598413a1f3f996607e9ab0c623c2bfb3dda5bfa18e9b
MD5 1e68f6e58539d253cfd40813207f802c
BLAKE2b-256 8d58d5d27007fe119310c7b7f1c8e4f25a296d8a847e5f298d5e9116962e28a7

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 c5590cc7b597634b4b939549d1bc084ea5b9fdc237e59db64975f4f3926fd201
MD5 150ab966bb9745207f99a7bf9e2d3b00
BLAKE2b-256 74bde38bc56e1af83a79aeaf435e776d4f78777c2360410cd28b91965c4f982e

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 55f68050db88bebfd1af7f7703835f3751934253878369d1f8bbf31f305d418b
MD5 a25b5579459e9502d3e1c1700f3d311f
BLAKE2b-256 51f78a35c8ca7ab40c6e15f88cc8dde341a9d10e551d9b59d403ef72468a60c9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp312-cp312-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 6c286f1bf473aaa58a10dcde018751d0a6f815d98fb4a18d100a345d2bec310c
MD5 7ec60ef06c590e209503d69a5977f688
BLAKE2b-256 ba18943d363c9cb3ddfdc31fadb709dde28f73c843db78b938ad937955bdb98f

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-win_amd64.whl
Algorithm Hash digest
SHA256 3ada7692e4196eb0a26679b3add27f5bdcbb1f9e765f4fdc393d4199d3baf59f
MD5 fce02244c828643f5458188c00949081
BLAKE2b-256 91ca20533199fcffc082325f3de7078cbd0f5fd536ff60462535286d15878a65

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 36945aca0f5e4c7a2b67fc1785910a19100c724fd6ad835ea3186c832a8142bc
MD5 fead4e882b58e613e5522ce5060c9cbe
BLAKE2b-256 f1ebe1f42f5c574af6bb695aa13395ed618d54d3f83b40e2404ae8894f5778fe

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 04a04b1fc6e63cb74a2a594171f11125ba139dfea3e4228a0a19da511b7bf18e
MD5 7c5c23c8a5fc07e50eac5b9ab7d8af58
BLAKE2b-256 30645d373dfd02e557ee43814830b7d3fdde353a8cd2e71f224c1fbde1d95fc2

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 2e831ce83e4de3638128010ac04e5ea1d32995ae428e61d09016fe0d9b199882
MD5 e761d4774147649f2824df6fe5b79745
BLAKE2b-256 8c42461c8c92d75595f883f0301544e9d77ca2079dcd92847917e8bb6bb3afb4

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 ee4392bc5775d881e49fc9565e48f4b2580fbd186fc0b0b9602a3a9fe53add4f
MD5 e6d3ad6fa53fbfe4bc85185ca30cedac
BLAKE2b-256 07d9398baf02f76ff5fc465e1d7c18fd2848942d5d1ac07be730da450413910d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 694bf0634247c2fb8c68c8ad19efe94cbad12d041b7aad219aa6327ff414d1cb
MD5 18dc83ef5b0ad18455a4255ed1b122d1
BLAKE2b-256 8ce761df9f87ce25c720590a0926e1238088973c534c319d85183dc2d42fa767

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 5d5cb46e1b24184f5bc032601b0c0b02d77361454b067e531f5cb90fdee73cf7
MD5 0c6fd2ad4ab722e11bd378b80340a9d8
BLAKE2b-256 c818a3b31ab828266a75d46e9a24f44a90209649a53080951663ead46b23e242

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 8d346249a8500685e7766999f9860fb30378c384df6ce1a5b6ecd7ca5ec3914c
MD5 d2710c5109e535921b498eef41bfad52
BLAKE2b-256 1f03d6d6954f5e4c6550aecef77b0396222a1351795a51ae4f8ab97474a1a67a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 4d22a12c2d10e495e10e2dcadf84eea875c0864fc7db97e903ac9e56e083dc22
MD5 53b7f1d18feef79ec4294f38ed0573ad
BLAKE2b-256 f3c3c17be52b7b0075af4bac18bb5f2b30d60158d6113f9e239c15592a199cc9

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 b476111303c896b056f45bbeb4a34cc64cab6bb01ba44a961a8ed6ec643f3730
MD5 0d4704bc15fab232711eed598a0ae60b
BLAKE2b-256 3ac303316010ea45c36ca63d3a9dffac770226c80ea4fae3926d851ba5dec5b6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp311-cp311-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 5f99c2096ae883a5d7879e9bd2f06bd70821f184b1b263a8c25a446bb157d16a
MD5 dfd3f9362234fa64608f25d24b89d27c
BLAKE2b-256 0f43abe6b6becced35bf7f431de18b9c852c1bcaa77965e14ac50daeddfe533a

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-win_amd64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-win_amd64.whl
Algorithm Hash digest
SHA256 ca616767557493f51de7632bda6984d2e8ab94c5d66551429ae090528680b04f
MD5 02f2a68d8969e0898821536905bd49ac
BLAKE2b-256 64d1997366dda11825167d66f8ef2850d329595e78faedf6bacecc03b22365ce

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 74b2962ddfa0cc135f80a31870d8bbed86605d62c79231ac4a94d7060ff7f03f
MD5 9cbfd3f873a0047e7397b08f6ae300ee
BLAKE2b-256 da326a72e13e6060d09f0fca0f17b8d41be18ef323c9e01bead4e95275cda97d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 c6fd7ed58a2bf3810008f078712424300dd8c4c7ea35dbc914e43dd7e575b4c5
MD5 91434923d7b93ab336906eefbb51fd39
BLAKE2b-256 799d8e70071c5faaa93cd562dea8e68aa53d04ee5325a08f8cf40022f64a5c04

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 3638ea01d656be4d564b1cbc0e3a96cb70c9d4ae345aa56773828b27300989cf
MD5 40c33c4f700faa63ff8fb1786157a066
BLAKE2b-256 ad63238b28b4dae05f6dc52535bf28239a2d63df2634d115977f8cfce3521b0d

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 a26408cbd964a824e3ddca8bdca892e3a5db3e1c6c9b62aabe86b06e0e669bfc
MD5 2357b9d04a68a3e62ab5bbcab36aa6ac
BLAKE2b-256 b8bc20067595ada7c9d5ae171bfc7ccb6eef1586812669a9dbdfb85e18f8e533

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 f26ae072676b1ce6bf788266eea27b85dee8bdbb5e84fa32a7e9b72bfbb96e1c
MD5 1a76c1cc4e3e0296b7761d9d28f07c2b
BLAKE2b-256 bd5d9a36f0f859f21b451ce1654a4d246a79232f8c2d6e717c0ceb5654d35573

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 fe6c29f9c58b6cdb341eb599cc2486bda564baa0948710386035fec9a37fa28f
MD5 f96b339d896a7e7c3b9c95e4d30e1e71
BLAKE2b-256 6d830e53afd11b3bf76ca25fb45b0e50357e6422dc197cc8acf1df88ed2c30f1

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 36106f1c63c8bc78fd09044fe31af4b0c54ab369a77047f87d4c263af1aceb2c
MD5 185674aa53b3be2adc64a6fb96795303
BLAKE2b-256 1233632e05555e91b44c91f107291b8e3de5e503d6ff220564bb0533f446c3e6

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 01a92bcc06d7ea5fd80d5a477a7a0ccfb1908d19cbf10005ab7156591e4b4500
MD5 372ce7484767e310ca60cffcf4867f94
BLAKE2b-256 fba193873fd9cc051fd604b597fee7e5328fe35b3e7f9ef28c2da55f4ce5ae4b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 822bf4b553f2adabde9a06af03f02a67d5fa7553e1876cc1b48e433d85ea47b2
MD5 90fe7f5e7fbe9a486cb81db5e2c807e1
BLAKE2b-256 14a28291b67637be8ad5290350675a3d3ce43c2c7c32759d827a575d566540aa

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_arm64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp310-cp310-macosx_15_0_arm64.whl
Algorithm Hash digest
SHA256 2c69b85cc1bb3da26008d5e37783153a9f1d74fd75d0062f5a05fff094ab8b37
MD5 f57c5fd5248c72f2454d70a103e7617c
BLAKE2b-256 23367ac231403f7c3a5f21a69fcec6ecf0b62d542b3df16561a5a375710e5dca

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_x86_64.whl
Algorithm Hash digest
SHA256 363f314d91d3e4891c359389042c763ed91e2947d7aec10d0398637d0c60213b
MD5 3d59d5b794bbcbc3653277eee2562f38
BLAKE2b-256 72304a54689ebf6497f3227aca7ee52af5fdfad45d7fbb7363205009b1593848

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_i686.whl
Algorithm Hash digest
SHA256 8820ec563c115a13b92860796da98e6103c0a7da09f7e53c4b396f4e3c541466
MD5 5baa05a47acbd84a0c28da206ef9dfb7
BLAKE2b-256 ff0ce8a73d7932f212cbcbf249ac04cc6e3aeead3ff92a5081b4056dd43599f5

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-musllinux_1_2_aarch64.whl
Algorithm Hash digest
SHA256 11355784ef96d6c06fc4e7c6df981060c0c8440f0cc670cb571b8272886782b3
MD5 c863c6f46bb8100c0bc4dcb5e6035689
BLAKE2b-256 3493d4dae6c0425e2709521b9b724f7e7ff91490942f8e89fc784cb594a74230

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 660cd44e852bfe1e0a9a2c26aec8b96da4881cfbe49d88fb5c207b95421a66da
MD5 764e5ae4c873f1c9c1a011d8de9ba962
BLAKE2b-256 bf9765e53782665e3841d084f43ce78e652f6c7a47e57b54f4af6622f10cfa0b

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 4f855aa390666b5d0c8c373991f598a8113bb5e2cfb6e5d8a3d1e9c83ea48a1e
MD5 0ac953040b7d500a362d032d3556affc
BLAKE2b-256 d8fa6ca84a99f79188c247a47248cc46579dfc662ba0b825ddc2f36d0e5fcb01

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 cbb80b65653e7bdb93ea092d0b8e440eb22258b67310082d45bf8a944daaca92
MD5 266fdee58d6dbcdda49ad2d4632072b2
BLAKE2b-256 08b59d78c57b06f49af5ddafcb6c9d0e11d3ee1d0e6bb6d08a11f25faf98a6d1

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl
Algorithm Hash digest
SHA256 b08ef4e0d02bba498bff656ca363ff783249b8a9f087e9d437ef7f62bab9a736
MD5 30a8729e7e5a442ccd32e21eaeffc4de
BLAKE2b-256 938981662036ee2b7ea351dd3fcb53b08d32d04f35922e88d8149b6eeb06f81c

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 3fbbebdc677d0e16035a826134b26de25892cd9a1a3e3be30ca801ce3a6a96e9
MD5 a0d05054ad78b1150c75a0bb499b2927
BLAKE2b-256 00e3f9b8af6af3e5153ae297594ec1b3180b12a890143fae5a312815947c07c1

See more details on using hashes here.

File details

Details for the file tidy3d_extras-2.10.2-cp39-cp39-macosx_15_0_x86_64.whl.

File metadata

File hashes

Hashes for tidy3d_extras-2.10.2-cp39-cp39-macosx_15_0_x86_64.whl
Algorithm Hash digest
SHA256 26fd26a2bba592d48a86480acbffcfc8b4f48d91d7bcf040d866f5a91b45285e
MD5 bc1c526e64ebc3e9fa9772272e9c7cfc
BLAKE2b-256 6e0e966bab501062c7c1222b0d113a1fcb17894fef13d69846f2c1b675986ff6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page