numpy

View on PyPIReverse Dependencies (55303)

2.0.0 numpy-2.0.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
numpy-2.0.0-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
numpy-2.0.0-cp39-cp39-win_amd64.whl
numpy-2.0.0-cp39-cp39-win32.whl
numpy-2.0.0-cp39-cp39-macosx_10_9_x86_64.whl
numpy-2.0.0-cp39-cp39-musllinux_1_2_aarch64.whl
numpy-2.0.0-cp39-cp39-musllinux_1_1_x86_64.whl
numpy-2.0.0-cp39-cp39-macosx_14_0_x86_64.whl
numpy-2.0.0-cp39-cp39-macosx_14_0_arm64.whl
numpy-2.0.0-cp39-cp39-macosx_11_0_arm64.whl
numpy-2.0.0-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
numpy-2.0.0-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
numpy-2.0.0-cp312-cp312-win_amd64.whl
numpy-2.0.0-cp312-cp312-win32.whl
numpy-2.0.0-cp312-cp312-macosx_10_9_x86_64.whl
numpy-2.0.0-cp312-cp312-musllinux_1_2_aarch64.whl
numpy-2.0.0-cp312-cp312-musllinux_1_1_x86_64.whl
numpy-2.0.0-cp312-cp312-macosx_14_0_x86_64.whl
numpy-2.0.0-cp312-cp312-macosx_14_0_arm64.whl
numpy-2.0.0-cp312-cp312-macosx_11_0_arm64.whl
numpy-2.0.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
numpy-2.0.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
numpy-2.0.0-cp311-cp311-win_amd64.whl
numpy-2.0.0-cp311-cp311-win32.whl
numpy-2.0.0-cp311-cp311-macosx_10_9_x86_64.whl
numpy-2.0.0-cp311-cp311-musllinux_1_2_aarch64.whl
numpy-2.0.0-cp311-cp311-musllinux_1_1_x86_64.whl
numpy-2.0.0-cp311-cp311-macosx_14_0_x86_64.whl
numpy-2.0.0-cp311-cp311-macosx_14_0_arm64.whl
numpy-2.0.0-cp311-cp311-macosx_11_0_arm64.whl
numpy-2.0.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
numpy-2.0.0-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
numpy-2.0.0-cp310-cp310-win_amd64.whl
numpy-2.0.0-cp310-cp310-win32.whl
numpy-2.0.0-cp310-cp310-macosx_10_9_x86_64.whl
numpy-2.0.0-cp310-cp310-musllinux_1_2_aarch64.whl
numpy-2.0.0-cp310-cp310-musllinux_1_1_x86_64.whl
numpy-2.0.0-cp310-cp310-macosx_14_0_x86_64.whl
numpy-2.0.0-cp310-cp310-macosx_14_0_arm64.whl
numpy-2.0.0-cp310-cp310-macosx_11_0_arm64.whl
numpy-2.0.0-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
numpy-2.0.0-pp39-pypy39_pp73-win_amd64.whl
numpy-2.0.0-pp39-pypy39_pp73-macosx_10_9_x86_64.whl
numpy-2.0.0-pp39-pypy39_pp73-macosx_14_0_x86_64.whl

Wheel Details

Project: numpy
Version: 2.0.0
Filename: numpy-2.0.0-cp312-cp312-macosx_14_0_arm64.whl
Download: [link]
Size: 4977729
MD5: 029703d0ff0e96c603c91f611926ef17
SHA256: 1e72728e7501a450288fc8e1f9ebc73d90cfd4671ebbd631f3e7857c39bd16f2
Uploaded: 2024-06-16 13:14:26 +0000

dist-info

METADATA

Metadata-Version: 2.1
Name: numpy
Version: 2.0.0
Summary: Fundamental package for array computing in Python
Author: Travis E. Oliphant et al.
Maintainer-Email: NumPy Developers <numpy-discussion[at]python.org>
Home-Page: https://numpy.org
Project-Url: Homepage, https://numpy.org
Project-Url: Documentation, https://numpy.org/doc/
Project-Url: Source, https://github.com/numpy/numpy
Project-Url: Download, https://pypi.org/project/numpy/#files
Project-Url: Tracker, https://github.com/numpy/numpy/issues
Project-Url: Release notes, https://numpy.org/doc/stable/release
License: Copyright (c) 2005-2024, NumPy Developers. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the NumPy Developers nor the names of any contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- The NumPy repository and source distributions bundle several libraries that are compatibly licensed. We list these here. Name: lapack-lite Files: numpy/linalg/lapack_lite/* License: BSD-3-Clause For details, see numpy/linalg/lapack_lite/LICENSE.txt Name: dragon4 Files: numpy/_core/src/multiarray/dragon4.c License: MIT For license text, see numpy/_core/src/multiarray/dragon4.c Name: libdivide Files: numpy/_core/include/numpy/libdivide/* License: Zlib For license text, see numpy/_core/include/numpy/libdivide/LICENSE.txt Note that the following files are vendored in the repository and sdist but not installed in built numpy packages: Name: Meson Files: vendored-meson/meson/* License: Apache 2.0 For license text, see vendored-meson/meson/COPYING Name: spin Files: .spin/cmds.py License: BSD-3 For license text, see .spin/LICENSE ---- This binary distribution of NumPy also bundles the following software: Name: OpenBLAS Files: numpy/.dylibs/libopenblas*.so Description: bundled as a dynamically linked library Availability: https://github.com/OpenMathLib/OpenBLAS/ License: BSD-3-Clause Copyright (c) 2011-2014, The OpenBLAS Project All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the OpenBLAS project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Name: LAPACK Files: numpy/.dylibs/libopenblas*.so Description: bundled in OpenBLAS Availability: https://github.com/OpenMathLib/OpenBLAS/ License: BSD-3-Clause-Attribution Copyright (c) 1992-2013 The University of Tennessee and The University of Tennessee Research Foundation. All rights reserved. Copyright (c) 2000-2013 The University of California Berkeley. All rights reserved. Copyright (c) 2006-2013 The University of Colorado Denver. All rights reserved. $COPYRIGHT$ Additional copyrights may follow $HEADER$ Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer listed in this license in the documentation and/or other materials provided with the distribution. - Neither the name of the copyright holders nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. The copyright holders provide no reassurances that the source code provided does not infringe any patent, copyright, or any other intellectual property rights of third parties. The copyright holders disclaim any liability to any recipient for claims brought against recipient by any third party for infringement of that parties intellectual property rights. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Name: GCC runtime library Files: numpy/.dylibs/libgfortran*, numpy/.dylibs/libgcc* Description: dynamically linked to files compiled with gcc Availability: https://gcc.gnu.org/git/?p=gcc.git;a=tree;f=libgfortran License: GPL-3.0-with-GCC-exception Copyright (C) 2002-2017 Free Software Foundation, Inc. Libgfortran is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. Libgfortran is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. Under Section 7 of GPL version 3, you are granted additional permissions described in the GCC Runtime Library Exception, version 3.1, as published by the Free Software Foundation. You should have received a copy of the GNU General Public License and a copy of the GCC Runtime Library Exception along with this program; see the files COPYING3 and COPYING.RUNTIME respectively. If not, see <http://www.gnu.org/licenses/>. ---- Full text of license texts referred to above follows (that they are listed below does not necessarily imply the conditions apply to the present binary release): ---- GCC RUNTIME LIBRARY EXCEPTION Version 3.1, 31 March 2009 Copyright (C) 2009 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This GCC Runtime Library Exception ("Exception") is an additional permission under section 7 of the GNU General Public License, version 3 ("GPLv3"). It applies to a given file (the "Runtime Library") that bears a notice placed by the copyright holder of the file stating that the file is governed by GPLv3 along with this Exception. When you use GCC to compile a program, GCC may combine portions of certain GCC header files and runtime libraries with the compiled program. The purpose of this Exception is to allow compilation of non-GPL (including proprietary) programs to use, in this way, the header files and runtime libraries covered by this Exception. 0. Definitions. A file is an "Independent Module" if it either requires the Runtime Library for execution after a Compilation Process, or makes use of an interface provided by the Runtime Library, but is not otherwise based on the Runtime Library. "GCC" means a version of the GNU Compiler Collection, with or without modifications, governed by version 3 (or a specified later version) of the GNU General Public License (GPL) with the option of using any subsequent versions published by the FSF. "GPL-compatible Software" is software whose conditions of propagation, modification and use would permit combination with GCC in accord with the license of GCC. "Target Code" refers to output from any compiler for a real or virtual target processor architecture, in executable form or suitable for input to an assembler, loader, linker and/or execution phase. Notwithstanding that, Target Code does not include data in any format that is used as a compiler intermediate representation, or used for producing a compiler intermediate representation. The "Compilation Process" transforms code entirely represented in non-intermediate languages designed for human-written code, and/or in Java Virtual Machine byte code, into Target Code. Thus, for example, use of source code generators and preprocessors need not be considered part of the Compilation Process, since the Compilation Process can be understood as starting with the output of the generators or preprocessors. A Compilation Process is "Eligible" if it is done using GCC, alone or with other GPL-compatible software, or if it is done without using any work based on GCC. For example, using non-GPL-compatible Software to optimize any GCC intermediate representations would not qualify as an Eligible Compilation Process. 1. Grant of Additional Permission. You have permission to propagate a work of Target Code formed by combining the Runtime Library with Independent Modules, even if such propagation would otherwise violate the terms of GPLv3, provided that all Target Code was generated by Eligible Compilation Processes. You may then convey such a combination under terms of your choice, consistent with the licensing of the Independent Modules. 2. No Weakening of GCC Copyleft. The availability of this Exception does not imply any general presumption that third-party software is unaffected by the copyleft requirements of the license of GCC. ---- GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations. To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a "modified version" of the earlier work or a work "based on" the earlier work. A "covered work" means either the unmodified Program or a work based on the Program. To "propagate" a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To "convey" a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays "Appropriate Legal Notices" to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 1. Source Code. The "source code" for a work means the preferred form of the work for making modifications to it. "Object code" means any non-source form of a work. A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language. The "System Libraries" of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A "Major Component", in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures. When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to "keep intact all notices". c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an "aggregate" if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, "normally used" refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. "Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. "Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version". A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, "control" includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a "patent license" is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To "grant" such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. "Knowingly relying" means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is "discriminatory" if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode: <program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an "about box". You should also get your employer (if you work as a programmer) or school, if any, to sign a "copyright disclaimer" for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see <http://www.gnu.org/licenses/>. The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>. Name: libquadmath Files: numpy/.dylibs/libquadmath*.so Description: dynamically linked to files compiled with gcc Availability: https://gcc.gnu.org/git/?p=gcc.git;a=tree;f=libquadmath License: LGPL-2.1-or-later GCC Quad-Precision Math Library Copyright (C) 2010-2019 Free Software Foundation, Inc. Written by Francois-Xavier Coudert <fxcoudert@gcc.gnu.org> This file is part of the libquadmath library. Libquadmath is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. Libquadmath is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. https://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Science/Research
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: BSD License
Classifier: Programming Language :: C
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Topic :: Software Development
Classifier: Topic :: Scientific/Engineering
Classifier: Typing :: Typed
Classifier: Operating System :: Microsoft :: Windows
Classifier: Operating System :: POSIX
Classifier: Operating System :: Unix
Classifier: Operating System :: MacOS
Requires-Python: >=3.9
Description-Content-Type: text/markdown
[Description omitted; length: 3972 characters]

WHEEL

Wheel-Version: 1.0
Generator: meson
Root-Is-Purelib: false
Tag: cp312-cp312-macosx_14_0_arm64

RECORD

Path Digest Size
numpy/_pytesttester.pyi sha256=OtyXSiuSy8o_78w3QNQRjMLpvvNyEdC0aMsx6T-vRxU 489
numpy/ctypeslib.pyi sha256=UIko2MzsafWZm8C3TUE5ujXhx_ODK19el6yJRGsDFn4 8052
numpy/conftest.py sha256=iS1IVUnNR-PLvJG9Uu6f4wnoaX1SLA0klU4rK1B7O1w 4624
numpy/version.pyi sha256=7i8--xZKy1nA-mLxAXO7PzU3vmZjW3tO9_4khaZ0mB8 100
numpy/dtypes.pyi sha256=odltZR9lKHOsIoYyrdsPWDDbICSwwLER6WcsGnAIg8c 1241
numpy/version.py sha256=6vyXkrME4VGIDiD7JKK_IT1QVipt26PXkR_aKgGOJ1A 293
numpy/__init__.cython-30.pxd sha256=LUAKIdEjGmtAasX1bcOTdITctIePhqLxU5rTaRBjXTA 45833
numpy/__init__.pyi sha256=oMzZchGMgeVRqBx4Wpnf2Aby5pf2doSPKzYwRxAHwG4 143204
numpy/_globals.py sha256=XVuUPpFLueqKUTNwqiOjWWahnM-vGxGy4tYA3ph-EAE 3090
numpy/__init__.pxd sha256=665J4lpdvgoMHH093GH8Gm8V1w1jGnpfkscpUMCESRs 42467
numpy/_configtool.py sha256=asiPfz_TX2Dp0msoNjG43pZKRYgNYusSIg2ieczK8as 1007
numpy/exceptions.pyi sha256=rc61wK_jQEfT7IZrlVZObnxuJ8KRgyPXAabGUwblsaE 639
numpy/__init__.py sha256=wJ4ltY9rL44ss8FYFo-QLUR_gXHl6mUTwKykHsvafCs 21817
numpy/dtypes.py sha256=zuPwgC0ijF2oDRAOJ6I9JKhaJuhXFAygByLQaoVtT54 1312
numpy/_distributor_init.py sha256=IKy2THwmu5UgBjtVbwbD9H-Ap8uaUJoPJ2btQ4Jatdo 407
numpy/__config__.py sha256=ZRaECq119ULclNcoVcJulh-s80PJA8HuaGpA2wdF27k 4718
numpy/ctypeslib.py sha256=BC9oVPfwS3N25h7ZtfGyhnQrjL3E5mlvyH_Fyxf_Lmg 17229
numpy/matlib.py sha256=hBmpfUQRZuNUQdvBFqlr4ZpX5gnODbaSkojNgbV4gAE 10691
numpy/py.typed sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/exceptions.py sha256=lTRfULzLfrIycZ38iIcxqdoEBbjRmutaT90z5mBMNzk 7642
numpy/_expired_attrs_2_0.py sha256=bEHcv-70OrXVXiPGmVZtuQom34qDPsXQ83QxZHZDVN4 3832
numpy/_pytesttester.py sha256=3PD0aJCA6x2VlfUr0oI63_dkuZXBuL23lCJ07zK5Ge0 6287
numpy/_utils/_pep440.py sha256=Vr7B3QsijR5p6h8YAz2LjNGUyzHUJ5gZ4v26NpZAKDc 14069
numpy/_utils/__init__.py sha256=Lsv7p1NzTQNaMG8vkYxvHPYDoMUolFzG1KdhGFZMedE 3224
numpy/_utils/_convertions.py sha256=0xMxdeLOziDmHsRM_8luEh4S-kQdMoMg6GxNDDas69k 329
numpy/_utils/_inspect.py sha256=8Ma7QBRwfSWKeK1ShJpFNc7CDhE6fkIE_wr1FxrG1A8 7447
numpy/strings/__init__.pyi sha256=Ki81NEwY5NABr-qIDvAvI3vVbDzCBJ9THlGJK3Zcdbw 1210
numpy/strings/__init__.py sha256=-hT1HYpbswLkRWswieJQwAYn72IAwuaSCA5S1sdSPMk 83
numpy/compat/py3k.py sha256=Je74CVk_7qI_qX7pLbYcuQJsxlMq1poGIfRIrH99kZQ 3833
numpy/compat/__init__.py sha256=b3rw1J_V3MwU-LZf8uISRKvfXzFaBjFHACbgyLo785Y 727
numpy/compat/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/char/__init__.pyi sha256=HWtTk64fLvQGvS_2MFk_zKv1Kt1lD-7EQ8SG-tR39XM 1332
numpy/char/__init__.py sha256=WGpEng-lsHKxUlmuANY8hKCl3ZC622HYSAFnpf7sgUE 93
numpy/core/umath.py sha256=f6KbsWYh5oTj3_FWHip_dr51BdczTAtMqgpn9_eHcz4 318
numpy/core/fromnumeric.py sha256=aNquLnfZX1XZRAz5MJza5ZT7IlgJo0TMHlR62YT2biM 342
numpy/core/_dtype.py sha256=3SnNsjxlKobD8Dn8B9egjIQuQLdbWz9OtVAZ4_wlDw8 322
numpy/core/_internal.py sha256=f3eVtRx2tKrJxxavZNe_f1Ln-_1shhSlfeRZEDTlxhU 947
numpy/core/__init__.pyi sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/core/multiarray.py sha256=SwVF8KNm29qyaq7vx8rrljNNxfn0e6G5y1H830n1Rac 792
numpy/core/records.py sha256=j9BftQLLljVdcENT41eGflG7DA7miXQ7q3Yf53-zYcY 326
numpy/core/__init__.py sha256=FWRkekGqZ1NF4YYNfm46mOAO9u3v4ZYts_lc8ygQfqY 1275
numpy/core/overrides.py sha256=sWaAgbH_piO0mWDeVqqoqkFqqpPHM87FqOZFJ3AO8lU 334
numpy/core/getlimits.py sha256=aYJVaVqiSGKuPfSIa7r0MMZMQkJP2NRNJ7Zd2dszygU 334
numpy/core/_dtype_ctypes.py sha256=lLzxauA8PVnopTuGh9USt1nVw2qCI8Z7bL66er3JoHU 350
numpy/core/defchararray.py sha256=G9S6jkdXegRkXl58hSpPnmndjdym4801Yzq2lzzmApM 346
numpy/core/shape_base.py sha256=MhuxPRwwg5hIdHcJ-LABdQ0oYEYGVxeD-aomaFs9-f4 338
numpy/core/numeric.py sha256=LSuzJ9OsQ0IEpW2rKlAwuvNypZeDZ0AJDoJOt93XB-k 359
numpy/core/function_base.py sha256=Sa9Ec2Y21kPmjn4Xsh7Y1V1c7bUdxYjzixIwHZJ4sCo 350
numpy/core/einsumfunc.py sha256=px-rSPkwAMbRNmp5uILgVC2QSr73InKFfvW7LSfNGGw 338
numpy/core/numerictypes.py sha256=RvhfWFh9KR0SPDNcrAYnW-PO9TKAND75ONXhL5Djs8Q 346
numpy/core/_utils.py sha256=s57m7yaOneaUIljT4WrwqX-tqqexCIomSQKgeL10RIU 917
numpy/core/arrayprint.py sha256=a1DkStlBSsVViSJw523Mm-lboVaAtCloBNCrigyOpbI 338
numpy/core/_multiarray_umath.py sha256=Yb0HORec_wcEV3RNNU4RZnlATYTUQtjAHMYmL4pvNLs 2096
numpy/linalg/__init__.pyi sha256=WeROFcujp1o9g_5HJ5j1DSXSMn-3ZCp1NlkqBhfHOMg 960
numpy/linalg/__init__.py sha256=XNtdLo33SVTjQbXeimLFa5ZudzpEEwnfJBNorVbxuyc 2106
numpy/linalg/_linalg.pyi sha256=2LX6e848yOMbNt5iTEw5nvdKpSPQWMXLeN1L43xs2Po 10688
numpy/linalg/_linalg.py sha256=rYvzlNV7mZVbZcsjlSMS_ifNCtcl_Wi0B9XyWadgB0k 107574
numpy/linalg/lapack_lite.cpython-312-darwin.so sha256=xYG2BZV8fhmSc_E4upN7RonD1VlRxbkWqudU8cTRToY 52926
numpy/linalg/linalg.py sha256=JQWcEvjY_bjhaMHXY5vDk69OIoMzX5Rvbn1eGW2FCvE 584
numpy/linalg/_umath_linalg.cpython-312-darwin.so sha256=52Q-07pPsJBjYN_uI2S3jdZfme8Wj1vxKfB5kHhgqNc 156576
numpy/linalg/tests/test_linalg.py sha256=WGQUy6CCUMXDJbBygpdqtJ2NaL_t36j5WvmnUYwHlYA 83206
numpy/linalg/tests/test_deprecations.py sha256=9p_SRmtxj2zc1doY9Ie3dyy5JzWy-tCQWFoajcAJUmM 640
numpy/linalg/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/linalg/tests/test_regression.py sha256=zGYhucRUwMkKMpTkO4AauJ8TEAL_uf67qTiV8icgxvc 6050
numpy/ma/extras.py sha256=zmSWCnOv2P_FSloi4mbaryvla2FtA9W6jy6oUg9z_vU 70071
numpy/ma/LICENSE sha256=BfO4g1GYjs-tEKvpLAxQ5YdcZFLVAJoAhMwpFVH_zKY 1593
numpy/ma/__init__.pyi sha256=HQBOppzm8lvEENgI3k6DtGT5eB9nuaiuNeKa-2jjLqQ 6041
numpy/ma/testutils.py sha256=sbiHivmwPQX3fPAPUe9OMktEqrwg1rcr8xgKfMM1Ex0 10272
numpy/ma/core.pyi sha256=Itfc09FEcueCM5YbNv70ksR3dtTOmmi6c8SVowJoZ98 14348
numpy/ma/mrecords.pyi sha256=r1a2I662ywnhGS6zvfcyK-9RHVvb4sHxiCx9Dhf5AE4 1934
numpy/ma/API_CHANGES.txt sha256=F_4jW8X5cYBbzpcwteymkonTmvzgKKY2kGrHF1AtnrI 3405
numpy/ma/__init__.py sha256=dgP0WdnOpph28Fd6UiqoyDKhfrct0H6QWqbCcETsk6M 1404
numpy/ma/core.py sha256=wRDM9NA-Mf4iGHHMni6SYAOH3BZejTtqkEjw2p_aS2I 282382
numpy/ma/README.rst sha256=krf2cvVK_zNQf1d3yVYwg0uDHzTiR4vHbr91zwaAyoI 9874
numpy/ma/extras.pyi sha256=BBsiCZbaPpGCY506fkmqZdBkJNCXcglc3wcSBuAACNk 2646
numpy/ma/timer_comparison.py sha256=Gm5zQYF_X8IEMdKBSnS4mFMi2wmojyftUa-iLg4lwcU 15694
numpy/ma/mrecords.py sha256=0hMM8idHDAtZaqnSpfkEVQ97i9Kr3y9crCCKeQFiY58 27194
numpy/ma/tests/test_old_ma.py sha256=BW01_4m8wZcHvAkZ8FIjDmFfusnjgFmGVbRyqbWD000 32753
numpy/ma/tests/test_core.py sha256=52mUvhi4QCSznU5djqXw2-qimKuoScjJo73-eBg2iIE 215668
numpy/ma/tests/test_deprecations.py sha256=nq_wFVt2EBHcT3AHxattfKXx2JDf1K5D-QBzUU0_15A 2566
numpy/ma/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/ma/tests/test_subclassing.py sha256=X8HylxMtWb55lCVslO0-w7URLgRIL5oK_Ahh9vMdTPg 17026
numpy/ma/tests/test_extras.py sha256=ifelSxrxDGuf7rXvqIqUIs9obBl5G3oGzrrAIS_c6aI 76824
numpy/ma/tests/test_arrayobject.py sha256=MSvEcxlsVt4YZ7mVXU8q_hkwM0I7xsxWejEqnUQx6hE 1099
numpy/ma/tests/test_mrecords.py sha256=gh_aLEKCuBStWG5W2yvKMM5UUIei7MM-6aOXNt2n6Hk 19857
numpy/ma/tests/test_regression.py sha256=foMpI0luAvwkkRpAfPDV_810h1URISXDZhmaNhxb50k 3287
numpy/_core/umath.py sha256=j1WFAGBOOXoGBNxtkpCAKwRv4Y9QCM4MjQYTgyVHf54 1974
numpy/_core/fromnumeric.py sha256=uEE0oqIF9vJUU8v-XYh_1-OjFf3yKr9X-ilKfbi9Wjc 132567
numpy/_core/numeric.pyi sha256=Qzsa2O17bU2_ArX4ffSu3FWHxb9Fv25pX4zvgd1VWsA 16360
numpy/_core/_operand_flag_tests.cpython-312-darwin.so sha256=OLxlDarUAid-NPBn1TZaz5LdnxsIohB1Nrm4Wkfl2WA 51206
numpy/_core/_dtype.py sha256=JZ_4D2YlNdsdSAyhGvm_HMuxV9kq39zfUaeGqgRtSFQ 10768
numpy/_core/getlimits.pyi sha256=qeIXUEtognTHr_T-tv-VcZI7n8Z2VzAyIpIgKXzsLkc 82
numpy/_core/_add_newdocs.py sha256=JeDaGvEt8_cgfpfTuf0z9y3UP0dPAjIs2JYzpGMLxHc 208198
numpy/_core/defchararray.pyi sha256=HxINLeeqiLamvWbj_ZQOlLxtAZ1ofVrfiYlKG81MZgc 19764
numpy/_core/_methods.py sha256=yZwkK9T0sAfHH11-1Q6RrXT1rMPUEKJlAwslVvBWyvs 9266
numpy/_core/_internal.py sha256=lK7WdHGiSFhFrQimElDy_ZtgWYQJrnP4n_NNyOtby6o 28962
numpy/_core/strings.pyi sha256=qv0ms8Nj9nrTQ5d6qzfEaU-g490jX3TKXvxJZXzTwNw 7520
numpy/_core/function_base.pyi sha256=lMuu0qyK6IHl17CSdDxK7o6TTDYTvfNfd14GLe2Zv8Y 5021
numpy/_core/__init__.pyi sha256=Mj2I4BtqBVNUZVs5o1T58Z7wSaWjfhX0nCl-a0ULjgA 86
numpy/_core/_string_helpers.py sha256=gu3x0dEnRnh3mnOkviX17r8rCmagVgYHfxILt9Q9irA 2837
numpy/_core/_struct_ufunc_tests.cpython-312-darwin.so sha256=zyQHC_1PWI483lC4Q9zyPj9qiN4_t6k4T6cBqJzppmI 51478
numpy/_core/multiarray.py sha256=HKE72lXft98BwsSBoYUJeGufSEC-AUqwAiK2QK_b2co 57030
numpy/_core/_rational_tests.cpython-312-darwin.so sha256=HNlprep-xDb_9ZjSPGkMrca9NaRn2O7eNJRoIeJuz8M 72786
numpy/_core/_asarray.py sha256=VULLkQIXCDbq5_qSQI588z-3kgDWjqeoyOK2uVIPTvI 3883
numpy/_core/_multiarray_tests.cpython-312-darwin.so sha256=HwGMqQWYxAByYY5WXp5mhalElQskQlWn7ugGp92Y1nk 122468
numpy/_core/records.py sha256=0LVFGHZoKH1B_13tUwtsgHNb20pU3RmEQ1kHRVZ2rn4 36813
numpy/_core/_ufunc_config.pyi sha256=-615enOVQMBhVx7Pln7DY_s4H6JjSgSnBy89YkpvuLg 1066
numpy/_core/_add_newdocs_scalars.py sha256=aO6c2hEi6Lbw-J4_TjPLG6btCAybzhFhU9m_Z4KZvwQ 12595
numpy/_core/__init__.py sha256=H95-zST0CH6pnnObjXUXXiPgtub9M35IBGaYE-q4wrU 5612
numpy/_core/_machar.py sha256=ZGDDdOxsfa2JBZdWcRpUAFHZPAC2nAQnjqceiY7bWjg 11566
numpy/_core/memmap.py sha256=HjLqbW_O2ioVucChh3mr3WRhgJtgPeOrlFiRK_DKb40 12184
numpy/_core/overrides.py sha256=uq6llUwm2-tnF4FNrEHoQ09aoqbo_Xf-WNj4Z1coPK0 7094
numpy/_core/getlimits.py sha256=6bYwq8y0EgxqqQnuWyEaOb1ZsQ8_AIzUIRVWFuvzCH0 25900
numpy/_core/_dtype_ctypes.py sha256=dcZHQ46qjV0n7l934WIYw7kv-1HoHxelu50oIIX7GWU 3718
numpy/_core/defchararray.py sha256=PJNy6lEdDo8wRqFAtSjAZYkrvJt4mpm4CKxuszYMx1A 34891
numpy/_core/multiarray.pyi sha256=tkmE59PAvYe5NXl9uMv6oXBdXiJT-bpxkLhMoozUZHQ 25723
numpy/_core/records.pyi sha256=ws1d2UVMDf6XNQJEZf2lk-anygcb8qOan46Aqrg1w8w 8765
numpy/_core/fromnumeric.pyi sha256=gqI8c-LOg90r9erYfcRSBIfOxNHY22EGewkeeowZEj8 24743
numpy/_core/shape_base.py sha256=_APvRz2LPmfcdqRwK4VwLPNWtxhHsDCwGjnVeT7DjZw 29726
numpy/_core/_internal.pyi sha256=06EhTNYJ7HUtuV-oFz14OijSOCkT8f71-qBc7GOrCGk 1022
numpy/_core/_umath_tests.cpython-312-darwin.so sha256=K08vAlIgKLZ-hQwhXiIDoIFYLmd6ktjCX8HCX0IhYbM 70959
numpy/_core/numeric.py sha256=VVvriaqSAjqSNBy3F2JwOFZ5W0adHDkFwgx43bB9GQY 80578
numpy/_core/numerictypes.pyi sha256=Ydil-YYm-jZW2DsI9qGmbtPVQKnZtJ4hmJHilAwkVGk 1674
numpy/_core/einsumfunc.pyi sha256=Ai7745UQf8-oZgrDod9z2NMj8BrDNJYzJWTltSDZd5Q 4821
numpy/_core/function_base.py sha256=L3tzQxsOrSiHfzAC4Nai0EXeFn-RQCuYLes5loehsMs 19945
numpy/_core/einsumfunc.py sha256=066W9VApLUi5TL22tRYT3729fdY0KqAdudtiY18d5nc 52921
numpy/_core/_ufunc_config.py sha256=yMCBS0zGnSg2yc-cH1RON9X6pQgf1x_-5ofTaPrpt6c 14977
numpy/_core/shape_base.pyi sha256=ff38BDqZ_TyV2v7qz-fP5NqmVcZbVBVccXJTlTw1dkM 2792
numpy/_core/_exceptions.py sha256=dZWKqfdLRvJvbAEG_fof_8ikEKxjakADMty1kLC_l_M 5379
numpy/_core/numerictypes.py sha256=3vsRBdGn1O_J5R6Ystn1UAOKGV9cQSA5l7IJqms-8dE 16087
numpy/_core/_simd.cpython-312-darwin.so sha256=U_bGoAQ97qauIeatd1fBI-ED9fqo8WhO-kpjayakp-A 339800
numpy/_core/_type_aliases.pyi sha256=pQ0FXzLol6L7XATTBfrbpNwEay-P0cl2DZVYqM43o7E 70
numpy/_core/_type_aliases.py sha256=3MfPJXIhE0-Gxsmw3HZTlLgulAY9lowvyrjjzzxY77Y 3493
numpy/_core/cversions.py sha256=H_iNIpx9-hY1cQNxqjT2d_5SXZhJbMo_caq4_q6LB7I 347
numpy/_core/_multiarray_umath.cpython-312-darwin.so sha256=xAI0jmprB72zrdw0TzTfdquzKrQ6UO9IHM9q2E7RpzE 3152596
numpy/_core/memmap.pyi sha256=sxIQ7T5hPLG-RBNndAc8JPvrsKEX1amBSH2HGg48Obo 55
numpy/_core/strings.py sha256=uMDfLr1uuXzOFPSvU7_h1S38RLJEHjP3pmfwxargRQI 38219
numpy/_core/_asarray.pyi sha256=UgVEqBCv5MbJkXSYsVoG6a_4ARTIoKHeeouyG0LPMH8 1041
numpy/_core/arrayprint.pyi sha256=JwI74lsiQP-pBwZ7CIczphk5exTpYi1uBtBNxKnIenc 4234
numpy/_core/arrayprint.py sha256=o8tvNlsb2f1uF3nLxYbqQmdZQP2lNphNzap79h9Aato 65677
numpy/_core/include/numpy/ndarrayobject.h sha256=MnykWmchyS05ler_ZyhFIr_0j6c0IcndEi3X3n0ZWDk 12057
numpy/_core/include/numpy/utils.h sha256=wMNomSH3Dfj0q78PrjLVtFtN-FPo7UJ4o0ifCUO-6Es 1185
numpy/_core/include/numpy/__multiarray_api.h sha256=UraKnVicKICqF9ltIOJgG6_holH183CYye08XrrJKfw 61106
numpy/_core/include/numpy/npy_1_7_deprecated_api.h sha256=90kGcNaBPgT5FJArB_MPgW24_Mpl5RcfUR3Y0rRB5Bw 3746
numpy/_core/include/numpy/ufuncobject.h sha256=4LXpXBRoTcHH0CSgCLqjEdrqE-P_34FyDL6evcHcI_U 9861
numpy/_core/include/numpy/npy_common.h sha256=e-4hfzUzRJ_x8v7y-WSm9DJz3P6EXRJHaHTvk-FWJgw 36381
numpy/_core/include/numpy/npy_2_complexcompat.h sha256=eE9dV_Iq3jEfGGJFH_pQjJnvC6eQ12WgOB7cZMmHByE 857
numpy/_core/include/numpy/npy_cpu.h sha256=pcVRtj-Y6120C5kWB1VAiAjZoxkTPDEg0gGm5IAt3jM 4629
numpy/_core/include/numpy/npy_2_compat.h sha256=tdp7D4EYJTLoqqnmPBntEi5OFqMyr9uUQL2OnIPZjPM 8533
numpy/_core/include/numpy/__ufunc_api.c sha256=Fg7WlH4Ow6jETKRArVL_QF11ABKYz1VpOve56_U3E0w 1755
numpy/_core/include/numpy/ndarraytypes.h sha256=cJAkNBdgi5zGHxNJYU5UxxeMGc0rAa6Zz6vSKFr6mGg 64950
numpy/_core/include/numpy/npy_no_deprecated_api.h sha256=0yZrJcQEJ6MCHJInQk5TP9_qZ4t7EfBuoLOJ34IlJd4 678
numpy/_core/include/numpy/__multiarray_api.c sha256=u7HxPIx7xdxAPTE0gristUOO0-1L-_fl0IeKqR4voxI 12669
numpy/_core/include/numpy/npy_3kcompat.h sha256=SvN9yRA3i02O4JFMXxZz0Uq_vJ5ZpvC-pC2sfF56A5I 15883
numpy/_core/include/numpy/npy_os.h sha256=hlQsg_7-RkvS3s8OM8KXy99xxyJbCm-W1AYVcdnO1cw 1256
numpy/_core/include/numpy/npy_endian.h sha256=we7X9fPeWzNpo_YTh09MPGDwdE0Rw_WDM4c9y4nBj5I 2786
numpy/_core/include/numpy/_numpyconfig.h sha256=76_3iSt2L_tmCZC-p0Ek7i6UUnIb91rKDdaanPGd4NY 928
numpy/_core/include/numpy/_neighborhood_iterator_imp.h sha256=s-Hw_l5WRwKtYvsiIghF0bg-mA_CgWnzFFOYVFJ-q4k 1857
numpy/_core/include/numpy/_public_dtype_api_table.h sha256=n6_Kb98SyvsR_X7stiNA6VuGp_c5W1e4fMVcJdO0wis 4574
numpy/_core/include/numpy/numpyconfig.h sha256=oNOl7vOe3fatCEtKUxGNfn_MHa3pXt5jaRm9hJjj7sI 6708
numpy/_core/include/numpy/__ufunc_api.h sha256=zxsbMwcmM4Ocd-Ayw3wywFPobG7RhpxRUBi7mC-J0bs 13114
numpy/_core/include/numpy/arrayscalars.h sha256=LlyrZIa_5td11BfqfMCv1hYbiG6__zxxGv1MRj8uIVo 4243
numpy/_core/include/numpy/dtype_api.h sha256=HKIJsKGGY_bslnE5l2jleVChMkKIBS0K0RmB3-effx0 19180
numpy/_core/include/numpy/npy_math.h sha256=5xAWcPlIiygP7aYFn2r56CmjQ7fq6f0Ta2nps-IQyXo 18532
numpy/_core/include/numpy/halffloat.h sha256=TRZfXgipa-dFppX2uNgkrjrPli-1BfJtadWjAembJ4s 1959
numpy/_core/include/numpy/arrayobject.h sha256=mU5vpcQ95PH1j3bp8KYhJOFHB-GxwRjSUsR7nxlTSRk 204
numpy/_core/include/numpy/random/distributions.h sha256=W5tOyETd0m1W0GdaZ5dJP8fKlBtsTpG23V2Zlmrlqpg 9861
numpy/_core/include/numpy/random/libdivide.h sha256=ew9MNhPQd1LsCZiWiFmj9IZ7yOnA3HKOXffDeR9X1jw 80138
numpy/_core/include/numpy/random/bitgen.h sha256=49AwKOR552r-NkhuSOF1usb_URiMSRMvD22JF5pKIng 488
numpy/_core/include/numpy/random/LICENSE.txt sha256=-8U59H0M-DvGE3gID7hz1cFGMBJsrL_nVANcOSbapew 1018
numpy/_core/tests/test_numerictypes.py sha256=K_SN19hufIrPLcH6sowl8HossDcq6Sliph-S5meQ88Q 23259
numpy/_core/tests/test_scalar_methods.py sha256=I7ur1EfJXbLQnctqkM5ojqEpQFaau7TfbfQA4nbyxtM 7567
numpy/_core/tests/test_scalarmath.py sha256=hSy7JZPuxnCQtgxLwWlJPpCMeftUaXGPeD6o423f_c8 45638
numpy/_core/tests/test_item_selection.py sha256=kI30kiX8mIrZYPn0jw3lGGw1ruZF4PpE9zw-aai9EPA 6458
numpy/_core/tests/test_array_coercion.py sha256=E0SbWiyFMijRFO30FHWBO2Ssg7a_6SC06BU4VB8DXbE 34437
numpy/_core/tests/test_limited_api.py sha256=Z_6M-GBzDOxVji6rXLFLm6HtgSnRhqxdSU6yXDlflNc 2377
numpy/_core/tests/test_casting_floatingpoint_errors.py sha256=nnBEgeRIENrOOZvTzRK7SRYYW9dD6E6npDmIuN0ggCc 5074
numpy/_core/tests/test_machar.py sha256=eDTrzJgwfaus0Ts86-HR9YkAPOwOSOPImPTHugn1EOc 1069
numpy/_core/tests/_natype.py sha256=9N-pE9LuQKrqT7ef-P9mtXpWls3YAsZ8JR-3cR7TRjs 6259
numpy/_core/tests/test_unicode.py sha256=eAUcEFUGAfWASXdqTgW1sQ2mU9jnUlzWBhLgctKDo7Q 12868
numpy/_core/tests/test_cpu_dispatcher.py sha256=nqlgFk-Ocfgc18g-b4fprYssfcpReiyvgbWPzsNEoFI 1552
numpy/_core/tests/test_arrayprint.py sha256=5B7adcwijOcmzLEPRjhLBytabVBCUWDW-9wTw9ITQIA 45386
numpy/_core/tests/test_scalarbuffer.py sha256=EdiF5tVrZXDchoK0P5sbQgluyyYQCIrLCaxvafaCKNk 5582
numpy/_core/tests/test_indexerrors.py sha256=wvatr7JlqAAYv-hHAAT-9DwUCnRcKiJ9qLcl6aKe9RU 4734
numpy/_core/tests/test_print.py sha256=mzUSbQ2kSa1aDl7NRUexj5UG4IM4zaZ-5EIoEoXhA_Q 6836
numpy/_core/tests/test_half.py sha256=VYPyap9GYOWZuphsfFofcIRl-oa5Ufrtv83OTp6azdU 24593
numpy/_core/tests/test_arraymethod.py sha256=gdRXJjnvAs6-QWZ7o18LX9cHdOIBvZ90neCWW1clRso 3264
numpy/_core/tests/test_mem_overlap.py sha256=SSe1tvi8BBAs-0osQd0y1IauR47Axsk7pK74x9GOWwU 29140
numpy/_core/tests/test_shape_base.py sha256=S7cjyUEMOvmfZWOZx0P1VPGqz8Z5uq4LA_I37Jp9jSM 29838
numpy/_core/tests/test_hashtable.py sha256=hSHv44tRcdAKxbTQuaFYWYZCFnwDMxxb_nDGa9Csr0M 1012
numpy/_core/tests/test_array_interface.py sha256=o0zqIhnyRaRt6o5fwwHIpRwTMh_JMLlhXRPuMdI5B4s 7675
numpy/_core/tests/test_deprecations.py sha256=OAFXU3AbAX1umWVnL03QWC7_yW8j9jzLJ1mcx5dz5J0 27396
numpy/_core/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/_core/tests/test_errstate.py sha256=fno3tnaY1U8uIgd7JZSgJoM_yWkd5GrHXDC6-PIYVhY 4646
numpy/_core/tests/test_nep50_promotions.py sha256=RTLiVH6Y82K6ewDax45XjuToRU0VZX2cgWLe2vDUYa4 12219
numpy/_core/tests/test_records.py sha256=-8z9n-Ip-cjVJsCnDTCE_Cr0BM1RAEq_w2Odsf9ptdw 20541
numpy/_core/tests/test_mem_policy.py sha256=KrqtyuvbCb6MCFgj6VYtKOE7GaAc3ANKELlFXUW04RQ 16778
numpy/_core/tests/test_simd.py sha256=cIKbJZbJY6Jh_4GbZOM6fPFG68c_rvsz-VH0-SHWuYU 48698
numpy/_core/tests/test_scalarinherit.py sha256=fMInDGKsiH3IS_2ejZtIcmJZ0Ry8c7kVsHx7wp5XDoM 2368
numpy/_core/tests/test_indexing.py sha256=qjLKkRfvJ1Sy-KQWT4AP_KlbhuXKBaDbPzmtjQwP73U 54406
numpy/_core/tests/test_umath.py sha256=j-cYcBE0USEv8B_KJCTKamNiP43IOg2QSkDoi85ZusE 190069
numpy/_core/tests/test_numeric.py sha256=peoaL8y-eHC3ki5285-2Dg3Y4luBL-SdIt2NnzVhE9U 152921
numpy/_core/tests/test_function_base.py sha256=QY3rM552ju9LvD6dfcXs-LJbpUcG8XpnGNhyUSJH1lY 17119
numpy/_core/tests/test_datetime.py sha256=mxN5VHOyMv7KUYV5MKNVPx_vaifknpnr7w19qoph_9Y 117386
numpy/_core/tests/test__exceptions.py sha256=PA9MhiaEITLOaIe86lnOwqAa3RFrA5Ra4IrqKXF-nMU 2881
numpy/_core/tests/test_extint128.py sha256=tVrw3jMHQkA0ebk7Pnq33I5Yu9V24KNHotYIG3V8ds0 5644
numpy/_core/tests/test_cython.py sha256=ypf1e4CBmr1m6vktX3-KvPKS6JBu9jYJrmRlpNrBvQc 8226
numpy/_core/tests/test_umath_complex.py sha256=pWRHpzBodvDGoKG1gkRAKJ1uPxQ_fV_VqIm77SD0BlA 23290
numpy/_core/tests/_locales.py sha256=S4x5soqF0oxpBYOE8J9Iky72O9J25IiZ8349m93pWC4 2206
numpy/_core/tests/test_custom_dtypes.py sha256=EjHB0Tl9sIoa5AJ4aGwotGDe5OP0nZEpBU4th2bn0VE 11633
numpy/_core/tests/test_defchararray.py sha256=l_GsWT0u0x2o-5HYfJE8PzFKQ5DlCd00UcI-FUoRh30 30124
numpy/_core/tests/test_conversion_utils.py sha256=fpduQ79yLpvZ8fdLs4H0CCsBEh3TlZs3SMr-lUQ6pTg 6605
numpy/_core/tests/test_arrayobject.py sha256=cybY9FWXY34oapV9VWj9Lq4Yem-BbaFLu-NZcV7tuf0 790
numpy/_core/tests/test_scalarprint.py sha256=9ITKVAklqVuphseF1lfMFrv1pBHKNJvTJFZQw8NDhfY 18788
numpy/_core/tests/test_casting_unittests.py sha256=jHnE_9O1YcquVLBzO9UANf83PUIph3CxVRmGOYEXp8M 34308
numpy/_core/tests/test_abc.py sha256=mIZtCZ8PEIOd6pxLqdUws3wMfXUjsVO3vOE9vK5YPd8 2221
numpy/_core/tests/test_ufunc.py sha256=QXHbj6PwXcGyVlnrd-CPffPiTDcnvFiClsTmVQEDESQ 128335
numpy/_core/tests/test_dtype.py sha256=XdKBkEZizDADqH4ehkACbz1ffg1BlBrv--WeeVkth7A 78237
numpy/_core/tests/test_umath_accuracy.py sha256=tj-RfH2NqnuCHjGjZhzyRFXmfYlLW9hvBq76h_DF_Yo 5450
numpy/_core/tests/test_simd_module.py sha256=g0XWjB1TE4E0y4McOjkZKhR7OB-K01eqy4pJcGfU2zg 3903
numpy/_core/tests/test_getlimits.py sha256=mVtBnC0QtZKHf83a2gr-Y9aZ3NIr1JogWZ1vVQCfQXU 6738
numpy/_core/tests/test_stringdtype.py sha256=--4BN9buhSnxydCx6O4EvVlEbok73zwAzJN7YgGinKw 51787
numpy/_core/tests/test_strings.py sha256=4GBar5so2PStoInzV7ActKF2acs4jSyKN-aPYwi-rcc 36260
numpy/_core/tests/test_dlpack.py sha256=skY100NqwpWi6a6TqZ3-gdEpjtbg6xVAKhb_qIOhwwM 3521
numpy/_core/tests/test_einsum.py sha256=t3mwFsM-3RQuO4PraaRyL9FXYzAHC5t2uVuR5pIacpc 53669
numpy/_core/tests/test_api.py sha256=42vvnflUK_-Jj6aJesxBcZFNpxS5QPzl5oHYrbAqjDk 21814
numpy/_core/tests/test_longdouble.py sha256=H7VeOyaLfSMHClUDSKloOuHiDbZxeoypJnc5AtsM4xw 13890
numpy/_core/tests/test_overrides.py sha256=h0GYY0DrPdR8BkgU4aUWp6KrO9KwwHAKC19vWkx-aNw 25273
numpy/_core/tests/test_scalar_ctors.py sha256=3mhZlumKJs5WazhPgATWf5Y4E4POQy-bcUBSEt5pasc 6719
numpy/_core/tests/test_multiarray.py sha256=6odbsbcYz1De25k7CFzWlTYI0a8OkixH0xIrRU7U1v0 386695
numpy/_core/tests/test_memmap.py sha256=g-vr5Zys-NGc3IwK8UkqhkjSXYJx4d_enElyw6ydh6A 7743
numpy/_core/tests/test_nditer.py sha256=iY4O1hMkLoZSDOmm6bWoLvZ8qbNvt6Z7bh8C7B58pjE 131319
numpy/_core/tests/test_cpu_features.py sha256=RseWn4E8kQ1XmNwuXBoaaKZ99M57pycAUqGLN8jUdzU 14927
numpy/_core/tests/test_protocols.py sha256=RvaT5Ax3P92-DReMOMvAPHIu703JqTk_2DRsdeNEt70 1180
numpy/_core/tests/test_argparse.py sha256=r_3_uJlkwWV3r4ZNMotWKDQ7Ji6GPpHjnUJTYVvFCLU 2340
numpy/_core/tests/test_regression.py sha256=SgsFc7xbiO-vWvQFFOdbZPt2JfRmx2c6o8HrnFsRc7I 93898
numpy/_core/tests/examples/cython/meson.build sha256=CiCEWymz_EGurxEIEuQz9mgHOC20LlDZV009deIxcdA 1118
numpy/_core/tests/examples/cython/setup.py sha256=_WpU8F4U-CczLvajjc305-Sl_QrgRFdeKxHCfgbmkUo 601
numpy/_core/tests/examples/cython/checks.pyx sha256=HY8uP4EiRkFsKsc6KX4yJwFfjx3yi4gpyRntDdtsfdo 7290
numpy/_core/tests/examples/limited_api/limited_api2.pyx sha256=1q4I59pdkCmMhLcYngN_XwQnPoLmDEo1uTGnhrLRjDc 203
numpy/_core/tests/examples/limited_api/meson.build sha256=eq-opBGhy0dr_-S2cW677M8b0tc3Ym1-RJb2S-1HftA 1389
numpy/_core/tests/examples/limited_api/limited_api1.c sha256=htSR9ER3S8AJqv4EZMsrxQ-SufTIlXNpuFI6MXQs87w 346
numpy/_core/tests/examples/limited_api/setup.py sha256=p2w7F1ardi_GRXSrnNIR8W1oeH_pgmw_1P2wS0A2I6M 435
numpy/_core/tests/data/umath-validation-set-log2.csv sha256=39EUD0vFMbwyoXoOhgCmid6NeEAQU7Ff7QFjPsVObIE 68917
numpy/_core/tests/data/umath-validation-set-arcsinh.csv sha256=DZrMYoZZZyM1DDyXNUxSlzx6bOgajnRSLWAzxcPck8k 60289
numpy/_core/tests/data/umath-validation-set-arctanh.csv sha256=HEK9ePx1OkKrXIKkMUV0IxrmsDqIlgKddiI-LvF2J20 61339
numpy/_core/tests/data/umath-validation-set-sin.csv sha256=8PUjnQ_YfmxFb42XJrvpvmkeSpEOlEXSmNvIK4VgfAM 58611
numpy/_core/tests/data/umath-validation-set-cos.csv sha256=0PNnDqKkokZ7ERVDgbes8KNZc-ISJrZUlVZc5LkW18E 59122
numpy/_core/tests/data/umath-validation-set-cbrt.csv sha256=v855MTZih-fZp_GuEDst2qaIsxU4a7vlAbeIJy2xKpc 60846
numpy/_core/tests/data/generate_umath_validation_data.cpp sha256=BQakB5o8Mq60zex5ovVO0IatNa7xbF8JvXmtk6373So 5842
numpy/_core/tests/data/umath-validation-set-arctan.csv sha256=0aosXZ-9DYTop0lj4bfcBNwYVvjZdW13hbMRTRRTmV0 60305
numpy/_core/tests/data/umath-validation-set-cosh.csv sha256=JKC4nKr3wTzA_XNSiQvVUq9zkYy4djvtu2-j4ZZ_7Oc 60869
numpy/_core/tests/data/umath-validation-set-README.txt sha256=pxWwOaGGahaRd-AlAidDfocLyrAiDp0whf5hC7hYwqM 967
numpy/_core/tests/data/umath-validation-set-expm1.csv sha256=K7jL6N4KQGX71fj5hvYkzcMXk7MmQes8FwrNfyrPpgU 60299
numpy/_core/tests/data/recarray_from_file.fits sha256=NA0kliz31FlLnYxv3ppzeruONqNYkuEvts5wzXEeIc4 8640
numpy/_core/tests/data/umath-validation-set-sinh.csv sha256=XOsBUuPcMjiO_pevMalpmd0iRv2gmnh9u7bV9ZLLg8I 60293
numpy/_core/tests/data/umath-validation-set-tanh.csv sha256=iolZF_MOyWRgYSa-SsD4df5mnyFK18zrICI740SWoTc 60299
numpy/_core/tests/data/umath-validation-set-log10.csv sha256=NOBD-rOWI_FPG4Vmbzu3JtX9UA838f2AaDFA-waiqGA 68922
numpy/_core/tests/data/umath-validation-set-arcsin.csv sha256=w_Sv2NDn-mLZSAqb56JT2g4bqBzxYAihedWxHuf82uU 61339
numpy/_core/tests/data/umath-validation-set-arccos.csv sha256=yBlz8r6RnnAYhdlobzGGo2FKY-DoSTQaP26y8138a3I 61365
numpy/_core/tests/data/umath-validation-set-log1p.csv sha256=tdbYWPqWIz8BEbIyklynh_tpQJzo970Edd4ek6DsPb8 60303
numpy/_core/tests/data/umath-validation-set-log.csv sha256=ynzbVbKxFzxWFwxHnxX7Fpm-va09oI3oK1_lTe19g4w 11692
numpy/_core/tests/data/umath-validation-set-exp2.csv sha256=djosT-3fTpiN_f_2WOumgMuuKgC_XhpVO-QsUFwI6uU 58624
numpy/_core/tests/data/umath-validation-set-arccosh.csv sha256=0GXe7XG1Z3jXAcK-OlEot_Df3MetDQSlbm3MJ__iMQk 61365
numpy/_core/tests/data/umath-validation-set-tan.csv sha256=Hv2WUMIscfvQJ5Y5BipuHk4oE4VY6QKbQp_kNRdCqYQ 60299
numpy/_core/tests/data/umath-validation-set-exp.csv sha256=rUAWIbvyeKh9rPfp2n0Zq7AKq_nvHpgbgzLjAllhsek 17491
numpy/_core/tests/data/astype_copy.pkl sha256=lWSzCcvzRB_wpuRGj92spGIw-rNPFcd9hwJaRVvfWdk 716
numpy/_core/lib/libnpymath.a sha256=0q-dyC21WHzTwUCEHYAr2qQfa6-f2IYJl9uitKYt63E 35240
numpy/_core/lib/pkgconfig/numpy.pc sha256=aKfDXDhUWa4iVDLNsd1eV6FpnzGcnXzpXdE8nKx3s8E 191
numpy/_core/lib/npy-pkg-config/npymath.ini sha256=0iMzarBfkkZ_EXO95_kz-SHZRcNIEwIeOjE_esVBkRQ 361
numpy/_core/lib/npy-pkg-config/mlib.ini sha256=_LsWV1eStNqwhdiYPa2538GL46dnfVwT4MrI1zbsoFw 147
numpy/_typing/_char_codes.py sha256=Hik5xK2sqGlwlQz44zU06PARmirGNNBsGO3bNAA5xnc 5810
numpy/_typing/_extended_precision.py sha256=dGios-1k-QBGew7YFzONZTzVWxz-aYAaqlccl2_h5Bo 777
numpy/_typing/_ufunc.pyi sha256=DVtEeJDfROxjsJBwtEChUltog6_ZZJs1UxOtB0B0sKI 11937
numpy/_typing/_nbit.py sha256=9WFXtFFjveTV-5qLDBXh8TYwOGTanix_k67OZWmc_FQ 361
numpy/_typing/__init__.py sha256=FzB-zSTTh4iB8zZfae9jYPgvKJPJq2YtT4ZxsHvjUdk 7093
numpy/_typing/_dtype_like.py sha256=_osA5_3tUuHfnUDo1UoaEjLY7iUuksaAj_mJvnDXE1o 5723
numpy/_typing/_array_like.py sha256=Uj6rrZiWfqk13-u2brluc2QeUTyzU_qSlsIAFGzUIH4 4320
numpy/_typing/_scalars.py sha256=kfnzxhkaAf80GrbdrH3nhbbymw3MkYXhPlVKFoCeqWE 978
numpy/_typing/_shape.py sha256=JPy7jJMkISGFTnkgiEifYM-4xTcjb7JMRkLIIjZLw08 211
numpy/_typing/_add_docstring.py sha256=0osLPAV_ZiC6NhVrq0mCB3iollD9usc14h29qBf-n_Y 3966
numpy/_typing/_nested_sequence.py sha256=5eNaVZAV9tZQLFWHYOuVs336JjoiaWxyZQ7cMKb6m1I 2566
numpy/_typing/_callable.pyi sha256=kg89OnMdRGyq1EnOcQZuLCyfpojW2o2-h4e2mL4DIMQ 11108
numpy/tests/test_warnings.py sha256=ZEtXqHI1iyeVeLfVxDcMfN5qw67Ti2u54709hvBG4eY 2284
numpy/tests/test_matlib.py sha256=gwhIXrJJo9DiecaGLCHLJBjhx2nVGl6yHq80AOUQSRM 1852
numpy/tests/test_ctypeslib.py sha256=c0x56qlAMnxTCO9MiuV05LCoqju8cidHj1URV5gOwQE 12351
numpy/tests/test_lazyloading.py sha256=YETrYiDLAqLX04K_u5_3NVxAfxDoeguxwkIRfz6qKcY 1162
numpy/tests/test__all__.py sha256=L3mCnYPTpzAgNfedVuq9g7xPWbc0c1Pot94k9jZ9NpI 221
numpy/tests/test_numpy_version.py sha256=2d0EtPJZYP3XRE6C6rfJW6QsPlFoDxqgO1yPxObaiE0 1754
numpy/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/tests/test_reloading.py sha256=sGu5XM-_VCNphyJcY5VCoQCmy5MgtL6_hDnsqf2j_ro 2367
numpy/tests/test_public_api.py sha256=-F6WzmygeZYm6F-0LsENiYVtbkuX--AExOnBFhZDq3U 22865
numpy/tests/test_scripts.py sha256=jluCLfG94VM1cuX-5RcLFBli_yaJZpIvmVuMxRKRJrc 1645
numpy/tests/test_configtool.py sha256=lhtwsoUPSOSdgnSdxvrvS4roiid86eWzSrGjdrKkH7g 1555
numpy/tests/test_numpy_config.py sha256=qHvepgi9oyAbQuZD06k7hpcCC2MYhdzcY6D1iQDPNMI 1241
numpy/_pyinstaller/test_pyinstaller.py sha256=8K-7QxmfoXCG0NwR0bhIgCNrDjGlrTzWnrR1sR8btgU 1135
numpy/_pyinstaller/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/_pyinstaller/hook-numpy.py sha256=2H-lJ_c8bpxayRNic6mBYcIaIPGE4VrVK3ZwBOeV-1g 1411
numpy/_pyinstaller/pyinstaller-smoke.py sha256=6iL-eHMQaG3rxnS5EgcvrCqElm9aKL07Cjr1FZJSXls 1143
numpy/rec/__init__.pyi sha256=02w4lxCiiwaw1V4hb35x3xn0Xd0Tz83mJGSsYGovxtc 297
numpy/rec/__init__.py sha256=w2G_npkmqm5vrWgds8V6Gusehmi1bRbiqCxsl9yOjow 83
numpy/typing/__init__.py sha256=ph9_WtDCJ7tKrbbRcz5OZEbXwxRXZfzSd2K1mLab910 5267
numpy/typing/mypy_plugin.py sha256=r53CPvn4IujSWOAnub_InD44qc90-XmSpUSXOIhWZ74 6409
numpy/typing/tests/test_isfile.py sha256=77lnjlxFqhrIRfGpSrqmvIVwpo9VoOPGiS7rRQSdKT0 865
numpy/typing/tests/test_typing.py sha256=A5JAOarysBiYRo5kKlANM0iYQ8xTETk0Uf-zVrl8ihE 8306
numpy/typing/tests/test_runtime.py sha256=2qu8JEliITnZCBJ_QJpohacj_OQ08o73ixS2w2ooNXI 3275
numpy/typing/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/typing/tests/data/mypy.ini sha256=KLojiWL5k-6Aj-b6Y3kyv2q4OoK3L5M7z2g5VT5Cor0 168
numpy/typing/tests/data/misc/extended_precision.pyi sha256=bS8bBeCFqjgtOiy-8_y39wfa7rwhdjLz2Vmo-RXAYD4 884
numpy/typing/tests/data/fail/ndarray_misc.pyi sha256=VaPL5mDB0OkHpDslehpIG_420O5-qDGNnLMCMJfwQVo 1333
numpy/typing/tests/data/fail/type_check.pyi sha256=CIyI0j0Buxv0QgCvNG2urjaKpoIZ-ZNawC2m6NzGlbo 379
numpy/typing/tests/data/fail/modules.pyi sha256=_ek4zKcdP-sIh_f-IDY0tP-RbLORKCSWelM9AOYxsyA 670
numpy/typing/tests/data/fail/warnings_and_errors.pyi sha256=KXExnFGz9O7Veut_U7YEIpi6x-BdfeaGtpqWf1Yd274 185
numpy/typing/tests/data/fail/lib_utils.pyi sha256=6oI_kPhJqL0P0q-rsC3WtGso3V-hF7ntbNUmbhUPfXE 96
numpy/typing/tests/data/fail/lib_function_base.pyi sha256=0Wb5Dy0A2NRXWIBrjZ3Gsu6XkulJUu1lHECw5tUkVUI 1950
numpy/typing/tests/data/fail/strings.pyi sha256=l4Q3_tyER2UESkzKZPyVpaIweuzbYzYyR1drV_k_eFk 2842
numpy/typing/tests/data/fail/random.pyi sha256=0sFOsJeHwYc1cUNF-MByWONEF_MP8CQWTjdyGFvgl90 2821
numpy/typing/tests/data/fail/ufunclike.pyi sha256=JsJ3M8QZv9-6GKwRnojJGIfeIkdtJFe-3ix5reLXx-M 627
numpy/typing/tests/data/fail/bitwise_ops.pyi sha256=gJ-ZL-e-yMbHMRKUv8r2KqJ08Mkgpg74nUe6lgi2RDU 583
numpy/typing/tests/data/fail/constants.pyi sha256=IzmswvmTKbAOkCjgyxu1jChlikIwqeAETHGVH2TtY0k 85
numpy/typing/tests/data/fail/index_tricks.pyi sha256=moINir9iQoi6Q1ZuVg5BuSB9hSBtbg_uzv-Qm_lLYZk 509
numpy/typing/tests/data/fail/scalars.pyi sha256=hr5uVhIa0DcpRxKleFTgUmsrN6XXoxM-uhQsV2_ZYn0 2951
numpy/typing/tests/data/fail/twodim_base.pyi sha256=eRFtqBbwkVI6G6MZMVpep1UKnFMDYzhrN82fO3ilnH0 898
numpy/typing/tests/data/fail/flatiter.pyi sha256=JcggwDkKcMWDBz0Ky8-dkJzjwnKxQ-kyea5br5DDqq0 866
numpy/typing/tests/data/fail/array_like.pyi sha256=OVAlEJZ5k8ZRKt0aGpZQwIjlUGpy0PzOOYqfI-IMqBQ 455
numpy/typing/tests/data/fail/lib_version.pyi sha256=7-ZJDZwDcB-wzpMN8TeYtZAgaqc7xnQ8Dnx2ISiX2Ts 158
numpy/typing/tests/data/fail/rec.pyi sha256=Ws3TyesnoQjt7Q0wwtpShRDJmZCs2jjP17buFMomVGA 704
numpy/typing/tests/data/fail/npyio.pyi sha256=ix5WhSp3vKf7UZE5X6h_Cs1gOIhzisHpMoOCfEg8Dpo 518
numpy/typing/tests/data/fail/multiarray.pyi sha256=1_9X7BW6hukiappz0kn3WCWN6OWXtT6OQqmJmJpdkfQ 1643
numpy/typing/tests/data/fail/ufuncs.pyi sha256=YaDTL7QLmGSUxE6JVMzpOlZTjHWrgbOo0UIlkX-6ZQk 1347
numpy/typing/tests/data/fail/linalg.pyi sha256=yDd05aK1dI37RPt3pD2eJYo4dZFaT2yB1PEu3K0y9Tg 1322
numpy/typing/tests/data/fail/datasource.pyi sha256=gACpSdzMDej9WZbNvDQlkWX9DvHD7DjucesbH0EWEaM 405
numpy/typing/tests/data/fail/char.pyi sha256=Zi3dygeaxHT8-5aFNCAreGU-T89zLg5pcE6c9NBCs6c 2712
numpy/typing/tests/data/fail/array_pad.pyi sha256=57oK0Yp53rtKjjIrRFYLcxa-IfIGhtI-bEem7ggJKwI 132
numpy/typing/tests/data/fail/array_constructors.pyi sha256=SjiwoGrefYsuScJcBQZlwzfvENADeRMxHYCDCo685Vc 1129
numpy/typing/tests/data/fail/arrayterator.pyi sha256=Qb7oMI1GdDQO_jcoJEAsMkXLjzOdcb3sx-b5mW73cAE 470
numpy/typing/tests/data/fail/histograms.pyi sha256=yAPVt0rYTwtxnigoGT-u7hhKCE9iYxsXc24x2HGBrmA 367
numpy/typing/tests/data/fail/fromnumeric.pyi sha256=57E3-vHlXpN9YC6jkpBbAlHaydbRlgK49LZ019IM68Y 5591
numpy/typing/tests/data/fail/dtype.pyi sha256=OAGABqdXNB8gClJFEGMckoycuZcIasMaAlS2RkiKROI 334
numpy/typing/tests/data/fail/lib_polynomial.pyi sha256=Ur7Y4iZX6WmoH5SDm0ePi8C8LPsuPs2Yr7g7P5O613g 899
numpy/typing/tests/data/fail/nditer.pyi sha256=w7emjnOxnf3NcvLktNLlke6Cuivn2gU3sVmGCfbG6rw 325
numpy/typing/tests/data/fail/ufunc_config.pyi sha256=0t_yJ4eVOhneDSfa3EsoTh6RreyMtkHVOi9oQ35_EW0 734
numpy/typing/tests/data/fail/testing.pyi sha256=e7b5GKTWCtKGoB8z2a8edsW0Xjl1rMheALsvzEJjlCw 1370
numpy/typing/tests/data/fail/nested_sequence.pyi sha256=em4GZwLDFE0QSxxg081wVwhh-Dmtkn8f7wThI0DiXVs 427
numpy/typing/tests/data/fail/numerictypes.pyi sha256=jl_pxMAq_VmkaK13-sfhUOUYGAQ4OV2pQ1d7wG-DNZg 120
numpy/typing/tests/data/fail/einsumfunc.pyi sha256=32Bsrr3ueX2CMaiBZN1xLGGsbjqKZWF2WopvNWRqCT4 487
numpy/typing/tests/data/fail/chararray.pyi sha256=cWyxV7TuJVUHlhxgkmktqZSzt8KghctCc3eOfOvsK5g 2306
numpy/typing/tests/data/fail/stride_tricks.pyi sha256=IjA0Xrnx0lG3m07d1Hjbhtyo1Te5cXgjgr5fLUo4LYQ 315
numpy/typing/tests/data/fail/false_positives.pyi sha256=Q61qMsSsNCtmO0EMRxHj5Z7RYTyrELVpkzfJY5eK8Z0 366
numpy/typing/tests/data/fail/comparisons.pyi sha256=YrcL2POtM1g8GEWW4AJMl9vAkV-lG_6kEb7FzueeiLU 822
numpy/typing/tests/data/fail/ndarray.pyi sha256=cgoWlpQqBQ5pkfiYsoz2f6o-DASrVRCraKBCgXLJQSk 404
numpy/typing/tests/data/fail/shape_base.pyi sha256=Y_f4buHtX2Q2ZA4kaDTyR8LErlPXTzCB_-jBoScGh_Q 152
numpy/typing/tests/data/fail/memmap.pyi sha256=HSTCQYNuW1Y6X1Woj361pN4rusSPs4oDCXywqk20yUo 159
numpy/typing/tests/data/fail/arithmetic.pyi sha256=HKbBj3T6tw0jkJ-QOtm6zZDaYf7637F38fGbj2UJk8g 3778
numpy/typing/tests/data/fail/arrayprint.pyi sha256=f27hi9dyYgh3JbEuvFroYwTKU2a7ZUKUcOEgqiZLioo 590
numpy/typing/tests/data/pass/fromnumeric.py sha256=iQnbMo3e9_s6zQ06wrD7-1za-e5Wazhcjg7-R6EWm-E 3742
numpy/typing/tests/data/pass/arithmetic.py sha256=vkA7LFXSuemLY2Uh91Z-hHg38gW-Q7Q0l2Fo-94NyGA 7555
numpy/typing/tests/data/pass/ndarray_conversion.py sha256=d7cFNUrofdLXh9T_9RG3Esz1XOihWWQNlz5Lb0yt6dM 1525
numpy/typing/tests/data/pass/literal.py sha256=ObHVl2_Ja7-DSR-2FfuFwW8US-O0opZmChPmIDhQzgw 1360
numpy/typing/tests/data/pass/comparisons.py sha256=0H6YT3cRqKkWNwX-VXJPZG3Xh6xvjkogADQH8zInk0c 2993
numpy/typing/tests/data/pass/multiarray.py sha256=MxHax6l94yqlTVZleAqG77ILEbW6wU5osPcHzxJ85ns 1331
numpy/typing/tests/data/pass/array_constructors.py sha256=rfJ8SRB4raElxRjsHBCsZIkZAfqZMie0VE8sSKMgkHg 2447
numpy/typing/tests/data/pass/dtype.py sha256=YDuYAb0oKoJc9eOnKJuoPfLbIKOgEdE04_CYxRS4U5I 1070
numpy/typing/tests/data/pass/ndarray_misc.py sha256=UOZZdelG843BuO11QAvfnB2W6NRA0aCsVnCoukQJTxk 2619
numpy/typing/tests/data/pass/ndarray_shape_manipulation.py sha256=37eYwMNqMLwanIW9-63hrokacnSz2K_qtPUlkdpsTjo 640
numpy/typing/tests/data/pass/ufuncs.py sha256=1Rem_geEm4qyD3XaRA1NAPKwr3YjRq68zbIlC_Xhi9M 422
numpy/typing/tests/data/pass/ufunc_config.py sha256=uzXOhCl9N4LPV9hV2Iqg_skgkKMbBPBF0GXPU9EMeuE 1205
numpy/typing/tests/data/pass/simple_py3.py sha256=HuLrc5aphThQkLjU2_19KgGFaXwKOfSzXe0p2xMm8ZI 96
numpy/typing/tests/data/pass/random.py sha256=LOycKHYsF1F0OvXC6W0rfdwuDGT0p1xypdqbsF4mU6Q 61810
numpy/typing/tests/data/pass/index_tricks.py sha256=oaFD9vY01_RI5OkrXt-xTk1n_dd-SpuPp-eZ58XR3c8 1492
numpy/typing/tests/data/pass/warnings_and_errors.py sha256=ETLZkDTGpZspvwjVYAZlnA1gH4PJ4bSY5PkWyxTjusU 161
numpy/typing/tests/data/pass/arrayterator.py sha256=FqcpKdUQBQ0FazHFxr9MsLEZG-jnJVGKWZX2owRr4DQ 393
numpy/typing/tests/data/pass/numeric.py sha256=bn0SCWOUKks0LOa8xIV8LwoXh9M_ERQsKl68vez8aBM 1531
numpy/typing/tests/data/pass/lib_utils.py sha256=bj1sEA4gsmezqbYdqKnVtKzY_fb64w7PEoZwNvaaUdA 317
numpy/typing/tests/data/pass/modules.py sha256=g9PhyLO6rflYHZtmryx1VWTubphN4TAPUSfoiYriTqE 625
numpy/typing/tests/data/pass/einsumfunc.py sha256=eXj5L5MWPtQHgrHPsJ36qqrmBHqct9UoujjJCvHnF1k 1370
numpy/typing/tests/data/pass/lib_version.py sha256=HnuGOx7tQA_bcxFIJ3dRoMAR0fockxg4lGqQ4g7LGIw 299
numpy/typing/tests/data/pass/scalars.py sha256=7jy6s0VuTPnGxlqZOLdPicefyKt3SAzdC2sHtONrMzk 3393
numpy/typing/tests/data/pass/array_like.py sha256=Pptxuxfy0ccmLo47LTA8VFohJh6rXxl8V5Xsm1ym_Q8 1018
numpy/typing/tests/data/pass/simple.py sha256=kQEQK59ISrra5i7p-_ijdRq9OdCdV0l7GEalDQtC1VQ 2737
numpy/typing/tests/data/pass/flatiter.py sha256=0BnbuLMBC7MQlprNZ0QhNSscfYwPhEhXOhWoyiRACWU 174
numpy/typing/tests/data/pass/numerictypes.py sha256=6x6eN9-5NsSQUSc6rf3fYieS2poYEY0t_ujbwgF9S5Q 331
numpy/typing/tests/data/pass/mod.py sha256=owFL1fys3LPTWpAlsjS-IzW4sSu98ncp2BnsIetLSrA 1576
numpy/typing/tests/data/pass/arrayprint.py sha256=y_KkuLz1uM7pv53qfq7GQOuud4LoXE3apK1wtARdVyM 766
numpy/typing/tests/data/pass/ufunclike.py sha256=sZ4WJeuzF58lLoZb9Q41Ce1kIX3vMA6WVT4HJzkfNjQ 1141
numpy/typing/tests/data/pass/bitwise_ops.py sha256=FmEs_sKaU9ox-5f0NU3_TRIv0XxLQVEZ8rou9VNehb4 964
numpy/typing/tests/data/reveal/emath.pyi sha256=-muNpWOv_niIn-zS3gUnFO4qBZAouNlVGue2x1L5Ris 2423
numpy/typing/tests/data/reveal/ndarray_misc.pyi sha256=gC04XSbtncnRTJTw5vCaxCrhGJ_1n_4AfoRGCKXyLFw 6678
numpy/typing/tests/data/reveal/type_check.pyi sha256=wKHbJXNosHyuV5Cmk3XdI4tAEmYgz-JklOD6P4pEblA 2756
numpy/typing/tests/data/reveal/ctypeslib.pyi sha256=cj8a0Z_DQZJOlZ3BqtCjKIroJz9vQkWCaAgES2GxkRk 4814
numpy/typing/tests/data/reveal/numeric.pyi sha256=r5Y3tySbm3wiDWjaw8l6wl_NxWpZZrAe9Oj3GKNyX74 6497
numpy/typing/tests/data/reveal/modules.pyi sha256=0WPq7A-aqWkJsV-IA1_7dFNCcxBacj1AWExaXbXErG4 1958
numpy/typing/tests/data/reveal/warnings_and_errors.pyi sha256=4KVv0HCz6Fu54WPq-594ruuPiPIGSiLewfRDAScNxrM 549
numpy/typing/tests/data/reveal/ndarray_shape_manipulation.pyi sha256=QDQ9g6l-e73pTJp-Dosiynb-okbqi91D4KirjhIjcv4 1233
numpy/typing/tests/data/reveal/lib_utils.pyi sha256=hYb7ELrXZXK9xpG4Sm_sRbwRuBS6moMJJ4V7yJJpdhk 536
numpy/typing/tests/data/reveal/lib_function_base.pyi sha256=wBn9ch2_HhOK87NKSBUwqsg7SJI6lwomJ35qOselXk4 7920
numpy/typing/tests/data/reveal/getlimits.pyi sha256=nUGOMFpWj3pMgqLy6ZbR7A4G2q7iLIl5zEFBGf-Qcfw 1592
numpy/typing/tests/data/reveal/fft.pyi sha256=ReQ9qn5frvJEy-g0RWpUGlPBntUS1cFSIu6WfPotHzE 1749
numpy/typing/tests/data/reveal/strings.pyi sha256=kfz7t_jZjUFvtp2ySC0H3NW8xtUcptPdltKh9Bew6zw 6373
numpy/typing/tests/data/reveal/random.pyi sha256=GratcSvCMhnV0oRvCrf1_5NwYrKvQFQHxUtJ3leWGAM 104393
numpy/typing/tests/data/reveal/ufunclike.pyi sha256=5VhzeeEJTTY0s3RObhWIsxpuGAvpBG0BE9acvODPROU 1321
numpy/typing/tests/data/reveal/mod.pyi sha256=1MKvcgPBWEWEiAtTmQCkDcqX2haPYJx3c-6XF_PtCQU 5664
numpy/typing/tests/data/reveal/bitwise_ops.pyi sha256=WIwuobIYzgJhN3Wm-nYqJftxN5R1AzhMC8oV4FaFVHU 3911
numpy/typing/tests/data/reveal/constants.pyi sha256=22VOM0_IpimXviyx98OTfNVHtFu4XsPAuN7F04q1xhA 393
numpy/typing/tests/data/reveal/index_tricks.pyi sha256=IgRiXmgSDT_VLw12AZXfa0uAV3WjzVwbNbduzl1-oDI 3174
numpy/typing/tests/data/reveal/scalars.pyi sha256=PWo_pzZnTJKL7d3dbPLnq1d_9DEO3Y8VR-Kg7u_7kRQ 4591
numpy/typing/tests/data/reveal/twodim_base.pyi sha256=AjQE00YEyt-BLC7cqZLDzC_dJRnndkCr2xIPDHFIIYU 3125
numpy/typing/tests/data/reveal/flatiter.pyi sha256=e1OQsVxQpgyfqMNw2puUTATl-w3swvdknlctAiWxf_E 882
numpy/typing/tests/data/reveal/lib_version.pyi sha256=UCioUeykot8-nWL6goKxZnKZxtgB4lFEi9wdN_xyF1U 672
numpy/typing/tests/data/reveal/rec.pyi sha256=tQS7ozIsq6uJ-atFuluT_pNkgQDqYl-zfXkCwNftlcw 3853
numpy/typing/tests/data/reveal/npyio.pyi sha256=CimelY4GQX-RMx6FjBz99egW3X7bZGaG0rInQXZaR6s 3611
numpy/typing/tests/data/reveal/multiarray.pyi sha256=v0Xgh013jdYuBsHGg2qJRPldiLpuOkl0RLIOzWiA61U 5149
numpy/typing/tests/data/reveal/ufuncs.pyi sha256=Al_6UDIOjiEkWxZX0dHS44Z9jNLNTBOqcdTpgGOJ-EY 3298
numpy/typing/tests/data/reveal/linalg.pyi sha256=RzeKBHXnW1U2Q9krz5F6EZSmk_yjo29T1R-iDyeb8gw 6324
numpy/typing/tests/data/reveal/datasource.pyi sha256=A10C5zPFLo7ggtCJdeWSx4U15ZaXXOjE6_rM91zi120 701
numpy/typing/tests/data/reveal/char.pyi sha256=-LyIxSayAdJDHICYq7KaMgHAnGDjPvZ4ezQzNRZ6Uds 7197
numpy/typing/tests/data/reveal/array_constructors.pyi sha256=C2CdAxCVzsXrUy2CJoZtQYXshiVK_1fOD26Mbn3EHqY 10710
numpy/typing/tests/data/reveal/ndarray_conversion.pyi sha256=ovigNoNijqvE-Z1ZvGSWEwqG8Rut8JCInj_bMdoEYz4 1856
numpy/typing/tests/data/reveal/arrayterator.pyi sha256=Sdl-xlxIVYSZnB9C0Mo6GwXzcJRFHz7kwQevIuWW6Zk 1097
numpy/typing/tests/data/reveal/histograms.pyi sha256=wTkDU-4kSjz5ybOgb0-R7sQQO4U1_1FC0U_tM9W_PUg 1375
numpy/typing/tests/data/reveal/fromnumeric.pyi sha256=6WsxULIl4p5OMUXQaQ2ECaYOM_Y_FFsBcdU2HSV0e_c 12055
numpy/typing/tests/data/reveal/dtype.pyi sha256=eQeL3ny5S6aESd3ut3NjZAFR4my2jn-8nqIR9WH2HnQ 2874
numpy/typing/tests/data/reveal/lib_polynomial.pyi sha256=gPrcYAohiyFlC3IgXqMOc-9UB5_oHL6ejG3ZK2hlEZA 5983
numpy/typing/tests/data/reveal/arraypad.pyi sha256=Q1pcU4B3eRsw5jsv-S0MsEfNUbp_4aMdO_o3n0rtA2A 776
numpy/typing/tests/data/reveal/nditer.pyi sha256=VFXnT75BgWSUpb-dD-q5cZkfeOqsk-x9cH626g9FWT4 2021
numpy/typing/tests/data/reveal/ufunc_config.pyi sha256=m9Cu_D8ygBCXWP_86cnfz5xHjTXFkVTxv-E_TuSQlW4 1316
numpy/typing/tests/data/reveal/testing.pyi sha256=-uDO8ueb84xFgzrj1HGrLqtnhrRr5_4HCVlccBcdAZc 8610
numpy/typing/tests/data/reveal/nested_sequence.pyi sha256=IQyRlXduk-ZEakOtoliMLCqNgGbeg0mzZf-a-a3Gq_0 734
numpy/typing/tests/data/reveal/numerictypes.pyi sha256=71W9cygjvTd7ry-b2SW4ufeKKBhIGQWhy8AJDxNBQmY 1388
numpy/typing/tests/data/reveal/nbit_base_example.pyi sha256=DRUMGatQvQXTuovKEMF4dzazIU6it6FU53LkOEo2vNo 657
numpy/typing/tests/data/reveal/einsumfunc.pyi sha256=pbtSfzIWUJRkDpe2riHBlvFlNSC3CqVM-SbYtBgX9H0 2044
numpy/typing/tests/data/reveal/chararray.pyi sha256=r_i5FIC-2WWu6xd8uCsEmrndwQRyfIqY3KZ9ARVOdx0 6259
numpy/typing/tests/data/reveal/stride_tricks.pyi sha256=9-XEw94BheIL7mFuW4KdWgFCqpYxjH7I9tKYBougMEc 1433
numpy/typing/tests/data/reveal/matrix.pyi sha256=1Dl5XuO7xCRAnox5EwM-ySj9asFWx2N09Cj8eG9Q8OU 2918
numpy/typing/tests/data/reveal/false_positives.pyi sha256=AplTmZV7TS7nivU8vegbstMN5MdMv4U0JJdZ4IeeA5M 482
numpy/typing/tests/data/reveal/comparisons.pyi sha256=Aa5aFbSJrjXPpk5n3PnfdlRsmT32pMVYVeGsCaIyWp0 7271
numpy/typing/tests/data/reveal/shape_base.pyi sha256=AzrGSCEj55BZ4FziDOm0mwp1Cysml7LdbzXFA03aJEI 1985
numpy/typing/tests/data/reveal/arraysetops.pyi sha256=MApdRBAeWajSdDQFVCF4yF8-WZhOJLJUmZkqBz_fmzY 4509
numpy/typing/tests/data/reveal/memmap.pyi sha256=A5PovMzjRp2zslF1vw3TdTQjj4Y0dIEJ__HDBV_svGM 842
numpy/typing/tests/data/reveal/arithmetic.pyi sha256=Oqg-yp6l9Iie7IiTrmHg2vEKj_3AAVu-REqJR-_NCJw 19762
numpy/typing/tests/data/reveal/arrayprint.pyi sha256=soSfSAZPBOI3dvaHW5DXIUmTGDFaljbvcVXIqQjgZmk 905
numpy/f2py/cfuncs.py sha256=KJyW7mdjmFSmxssfeegGJs5NZyF3mZMgNvOxN9-vYHQ 51913
numpy/f2py/_src_pyf.py sha256=4t6TN4ZKWciC4f1z6fwaGrpIGhHKRiwHfcrNj4FIzCg 7654
numpy/f2py/common_rules.py sha256=gHB76WypbkVmhaD_RWhy8Od4zDTgj8cbDOdUdIp6PIQ 5131
numpy/f2py/__init__.pyi sha256=eA7uYXZr0p0aaz5rBW-EypLx9RchrvqDYtSnkEJQsYw 1087
numpy/f2py/crackfortran.py sha256=jVk3M3L4bI4ZpxAjnpQFiBWeFUxVsNYhNmVGl-cYeyk 148023
numpy/f2py/cb_rules.py sha256=fSxXAxjNaPXt54E957v1-Q3oCM06vbST5gFu1D98ic4 25004
numpy/f2py/__init__.py sha256=aov9Lx4W4n19yV4gmvAi7Z1nMQJxDWnAdDAu81F44Dg 2526
numpy/f2py/rules.py sha256=B4FxSYEfZ_1j_z9GulQNZ1BNrPrUvlU3ybxwTkrIxjI 62727
numpy/f2py/f2py2e.py sha256=sX4y1wSmdst4MtdONUx6x06dkmW1xZTVxjsW61d3U5A 27696
numpy/f2py/func2subr.py sha256=6d2R5awuHRT4xzgfUfwS7JHTqhhAieSXcENlssD_2c4 10298
numpy/f2py/__version__.py sha256=7HHdjR82FCBmftwMRyrlhcEj-8mGQb6oCH-wlUPH4Nw 34
numpy/f2py/symbolic.py sha256=jWBoAwECCxRdWczR9r7O6UERcYmH_GbdcAReNp7cmJY 53270
numpy/f2py/diagnose.py sha256=0SRXBE2hJgKJN_Rf4Zn00oKXC_Tka3efPWM47zg6BoY 5197
numpy/f2py/capi_maps.py sha256=ENjYyeZ3CCJcLwJJgmKOSYrD1KPuhpwauXqeizdV55o 30563
numpy/f2py/f90mod_rules.py sha256=MBor9OopBCPhOR7uw5lj3F2YqFiE_PQ9Q6Lu6eDM0wQ 9764
numpy/f2py/setup.cfg sha256=Fpn4sjqTl5OT5sp8haqKIRnUcTPZNM6MIvUJBU7BIhg 48
numpy/f2py/use_rules.py sha256=3pTDOPur6gbPHPtwuMJPQvpnUMw39Law1KFSH0coB_0 3527
numpy/f2py/auxfuncs.py sha256=dNs4b2KDIcG4M1hPBvD09-Vh7CDzlPIrFscOdvL3p1o 26539
numpy/f2py/_isocbind.py sha256=zaBgpfPNRmxVG3doUIlbZIiyB990MsXiwDabrSj9HnQ 2360
numpy/f2py/__main__.py sha256=6i2jVH2fPriV1aocTY_dUFvWK18qa-zjpnISA-OpF3w 130
numpy/f2py/_backends/_backend.py sha256=GKb9-UaFszT045vUgVukPs1n97iyyjqahrWKxLOKNYo 1187
numpy/f2py/_backends/meson.build.template sha256=ey3LotOX-gZvl_k9nfB2H_GzfqAvyk7BHC2MYUgPrdw 1583
numpy/f2py/_backends/__init__.py sha256=7_bA7c_xDpLc4_8vPfH32-Lxn9fcUTgjQ25srdvwvAM 299
numpy/f2py/_backends/_distutils.py sha256=D9UkK_cvecPdqahGO-D0rck3luTPlyP7Trc3pV7eVIs 2388
numpy/f2py/_backends/_meson.py sha256=wIg1M0j_1r2PiVVv9P7R3-WzoQuFaw5oYQKiYQULBow 7026
numpy/f2py/tests/test_character.py sha256=29o5PCGC_t5UsOwmxM4dL3k3IPZ6hpUD25VFSZk5N9E 21926
numpy/f2py/tests/test_mixed.py sha256=ie1hr7-3QlyYkUt3suPTCNOqUbcaawphSlRLHmU6czA 870
numpy/f2py/tests/test_return_logical.py sha256=XCmp8E8I6BOeNYF59HjSFAdv1hM9WaDvl8UDS10_05o 2017
numpy/f2py/tests/test_assumed_shape.py sha256=FeaqtrWyBf5uyArcmI0D2e_f763aSMpgU3QmdDXe-tA 1466
numpy/f2py/tests/test_common.py sha256=VPsy0SLqbKaUGgDqesYXmjYuLpnPK-XyzseqmV5QnhM 641
numpy/f2py/tests/test_pyf_src.py sha256=eD0bZu_GWfoCq--wWqEKRf-F2h5AwoTyO6GMA9wJPr4 1135
numpy/f2py/tests/test_kind.py sha256=mLoh2b9XAQpirywOw9_qEelgKMRdMIMUqkkhAhgpols 1793
numpy/f2py/tests/test_isoc.py sha256=kY7yg7Jtyn_RBlozwe6UpQvtwPbPcpTC0B27s2GRo7s 1428
numpy/f2py/tests/test_array_from_pyobj.py sha256=hI9U1VWmhwI-9E8_LKMlquReAhz-4xOBVX9KAuPFGB0 23841
numpy/f2py/tests/test_return_real.py sha256=rxgglxBljLavw3LzWCeT41mYYVhvkTMlQE5E2rfg_LI 3253
numpy/f2py/tests/test_symbolic.py sha256=28quk2kTKfWhKe56n4vINJ8G9weKBfc7HysMlE9J3_g 18341
numpy/f2py/tests/util.py sha256=oBSBUDvDdMYAHtvEZRBKv3guZq6sJxvyp1iZuhaCTOY 11562
numpy/f2py/tests/test_size.py sha256=q6YqQvcyqdXJeWbGijTiCbxyEG3EkPcvT8AlAW6RCMo 1164
numpy/f2py/tests/test_callback.py sha256=19lLfl2HmJpKUPaTu3mdtK9meJXx_nx9vXpIC6LmwuI 6560
numpy/f2py/tests/test_string.py sha256=5xZOfdReoHnId0950XfmtfduPPfBbtMkzBoXMtygvMk 2962
numpy/f2py/tests/test_docs.py sha256=DXAAqi0DHa6S25R6zQ5VhtbZYJxBKvnrs5KVw-ZAUI8 1874
numpy/f2py/tests/__init__.py sha256=vEz8dZy9p_HASmgJ_bfGrpKGWRW6zlFKCbKr9tTcsaQ 172
numpy/f2py/tests/test_quoted_character.py sha256=T6I2EyopdItKamcokG0ylvhT7krZYhBU6hF3UFIBr2g 476
numpy/f2py/tests/test_parameter.py sha256=Nt6elnMp5zJ-lk0Yu-mwUdLzYwhCFNtPT7o0EVr5Ip8 4633
numpy/f2py/tests/test_abstract_interface.py sha256=SGJqspdwvo6JWjQ-VAifepzTo86cU5VNxe9E_sH4Yts 850
numpy/f2py/tests/test_f2cmap.py sha256=-WnN0HlqiG9RPgc1P_KSLZvqgQ4wGYDf0lFcyfWOLfs 385
numpy/f2py/tests/test_semicolon_split.py sha256=gi0I439sNF1x2dl4fnJmkFzhoGUpE7ni7_mJ8tQdH5c 1653
numpy/f2py/tests/test_block_docstring.py sha256=2WGCsNBxtH57BjAYyPAzUZgiBRYWAQpC9zODP02OZec 582
numpy/f2py/tests/test_return_integer.py sha256=qR8Ismf40Ml2impqjGzjL2i-CRyGTxXVEvzQQMkJfJo 1776
numpy/f2py/tests/test_return_character.py sha256=DP63vrF6bIV-QRBsJ1ZpPsKz-u906Ph8M6_biPEzBJs 1511
numpy/f2py/tests/test_data.py sha256=sFaaYt8EdWu6hI2Kyg2gK38ug5XsCUkPOEkl6zarh58 2898
numpy/f2py/tests/test_value_attrspec.py sha256=SKi010iuwoWCH5fGfLDpjYrqOxKtSGZ6a0W1EKPnHj8 339
numpy/f2py/tests/test_return_complex.py sha256=4vtpIYqAZZrbKYi3fnP7l_Zn42YnBbPwl8-eNfZOHHo 2415
numpy/f2py/tests/test_modules.py sha256=guAhuAWiJs7HMKx7JbTTWZrfN0TuFPVcOjaLqp_6x98 1536
numpy/f2py/tests/test_crackfortran.py sha256=uy-HPvfRnNPMMQb57K0ykyUPnMJ59OUtH5h-s5HpcHA 15894
numpy/f2py/tests/test_f2py2e.py sha256=moihX1dNkSjhAVE2IUgofU0jO4fSKvjDfKPol6DabG8 25471
numpy/f2py/tests/test_regression.py sha256=vtAPdbbDTK0KgKdN8JRfVw1YoHW8vw5EDDa-ypT3iH8 4046
numpy/f2py/tests/src/abstract_interface/foo.f90 sha256=JFU2w98cB_XNwfrqNtI0yDTmpEdxYO_UEl2pgI_rnt8 658
numpy/f2py/tests/src/abstract_interface/gh18403_mod.f90 sha256=gvQJIzNtvacWE0dhysxn30-iUeI65Hpq7DiE9oRauz8 105
numpy/f2py/tests/src/isocintrin/isoCtests.f90 sha256=jcw-fzrFh0w5U66uJYfeUW4gv94L5MnWQ_NpsV9y0oI 998
numpy/f2py/tests/src/return_character/foo77.f sha256=WzDNF3d_hUDSSZjtxd3DtE-bSx1ilOMEviGyYHbcFgM 980
numpy/f2py/tests/src/return_character/foo90.f90 sha256=ULcETDEt7gXHRzmsMhPsGG4o3lGrcx-FEFaJsPGFKyA 1248
numpy/f2py/tests/src/f2cmap/.f2py_f2cmap sha256=iUOtfHd3OuT1Rz2-yiSgt4uPKGvCt5AzQ1iygJt_yjg 82
numpy/f2py/tests/src/f2cmap/isoFortranEnvMap.f90 sha256=iJCD8a8MUTmuPuedbcmxW54Nr4alYuLhksBe1sHS4K0 298
numpy/f2py/tests/src/mixed/foo_free.f90 sha256=fIQ71wrBc00JUAVUj_r3QF9SdeNniBiMw6Ly7CGgPWU 139
numpy/f2py/tests/src/mixed/foo_fixed.f90 sha256=pxKuPzxF3Kn5khyFq9ayCsQiolxB3SaNtcWaK5j6Rv4 179
numpy/f2py/tests/src/mixed/foo.f sha256=90zmbSHloY1XQYcPb8B5d9bv9mCZx8Z8AMTtgDwJDz8 85
numpy/f2py/tests/src/return_complex/foo77.f sha256=8ECRJkfX82oFvGWKbIrCvKjf5QQQClx4sSEvsbkB6A8 973
numpy/f2py/tests/src/return_complex/foo90.f90 sha256=c1BnrtWwL2dkrTr7wvlEqNDg59SeNMo3gyJuGdRwcDw 1238
numpy/f2py/tests/src/quoted_character/foo.f sha256=WjC9D9171fe2f7rkUAZUvik9bkIf9adByfRGzh6V0cM 482
numpy/f2py/tests/src/array_from_pyobj/wrapmodule.c sha256=SEtK_OwTVqOek0FhmbaxBLJHoWtuPzxTI1Ms3hXhVtE 7313
numpy/f2py/tests/src/cli/gh_22819.pyf sha256=5rvOfCv-wSosB354LC9pExJmMoSHnbGZGl_rtA2fogA 142
numpy/f2py/tests/src/cli/hi77.f sha256=ttyI6vAP3qLnDqy82V04XmoqrXNM6uhMvvLri2p0dq0 71
numpy/f2py/tests/src/cli/hiworld.f90 sha256=QWOLPrTxYQu1yrEtyQMbM0fE9M2RmXe7c185KnD5x3o 51
numpy/f2py/tests/src/kind/foo.f90 sha256=zIHpw1KdkWbTzbXb73hPbCg4N2Htj3XL8DIwM7seXpo 347
numpy/f2py/tests/src/value_attrspec/gh21665.f90 sha256=JC0FfVXsnB2lZHb-nGbySnxv_9VHAyD0mKaLDowczFU 190
numpy/f2py/tests/src/negative_bounds/issue_20853.f90 sha256=fdOPhRi7ipygwYCXcda7p_dlrws5Hd2GlpF9EZ-qnck 157
numpy/f2py/tests/src/common/gh19161.f90 sha256=BUejyhqpNVfHZHQ-QC7o7ZSo7lQ6YHyX08lSmQqs6YM 193
numpy/f2py/tests/src/common/block.f sha256=GQ0Pd-VMX3H3a-__f2SuosSdwNXHpBqoGnQDjf8aG9g 224
numpy/f2py/tests/src/return_real/foo77.f sha256=ZTrzb6oDrIDPlrVWP3Bmtkbz3ffHaaSQoXkfTGtCuFE 933
numpy/f2py/tests/src/return_real/foo90.f90 sha256=gZuH5lj2lG6gqHlH766KQ3J4-Ero-G4WpOOo2MG3ohU 1194
numpy/f2py/tests/src/assumed_shape/precision.f90 sha256=r08JeTVmTTExA-hYZ6HzaxVwBn1GMbPAuuwBhBDtJUk 130
numpy/f2py/tests/src/assumed_shape/.f2py_f2cmap sha256=But9r9m4iL7EGq_haMW8IiQ4VivH0TgUozxX4pPvdpE 29
numpy/f2py/tests/src/assumed_shape/foo_mod.f90 sha256=rfzw3QdI-eaDSl-hslCgGpd5tHftJOVhXvb21Y9Gf6M 499
numpy/f2py/tests/src/assumed_shape/foo_free.f90 sha256=oBwbGSlbr9MkFyhVO2aldjc01dr9GHrMrSiRQek8U64 460
numpy/f2py/tests/src/assumed_shape/foo_use.f90 sha256=rmT9k4jP9Ru1PLcGqepw9Jc6P9XNXM0axY7o4hi9lUw 269
numpy/f2py/tests/src/block_docstring/foo.f sha256=y7lPCPu7_Fhs_Tf2hfdpDQo1bhtvNSKRaZAOpM_l3dg 97
numpy/f2py/tests/src/return_integer/foo77.f sha256=_8k1evlzBwvgZ047ofpdcbwKdF8Bm3eQ7VYl2Y8b5kA 1178
numpy/f2py/tests/src/return_integer/foo90.f90 sha256=bzxbYtofivGRYH35Ang9ScnbNsVERN8-6ub5-eI-LGQ 1531
numpy/f2py/tests/src/return_logical/foo77.f sha256=FxiF_X0HkyXHzJM2rLyTubZJu4JB-ObLnVqfZwAQFl8 1188
numpy/f2py/tests/src/return_logical/foo90.f90 sha256=9KmCe7yJYpi4ftkKOM3BCDnPOdBPTbUNrKxY3p37O14 1531
numpy/f2py/tests/src/parameter/constant_non_compound.f90 sha256=IcxESVLKJUZ1k9uYKoSb8Hfm9-O_4rVnlkiUU2diy8Q 609
numpy/f2py/tests/src/parameter/constant_array.f90 sha256=KRg7Gmq_r3B7t3IEgRkP1FT8ve8AuUFWT0WcTlXoN5U 1468
numpy/f2py/tests/src/parameter/constant_both.f90 sha256=-bBf2eqHb-uFxgo6Q7iAtVUUQzrGFqzhHDNaxwSICfQ 1939
numpy/f2py/tests/src/parameter/constant_integer.f90 sha256=nEmMLitKoSAG7gBBEQLWumogN-KS3DBZOAZJWcSDnFw 612
numpy/f2py/tests/src/parameter/constant_compound.f90 sha256=re7pfzcuaquiOia53UT7qNNrTYu2euGKOF4IhoLmT6g 469
numpy/f2py/tests/src/parameter/constant_real.f90 sha256=quNbDsM1Ts2rN4WtPO67S9Xi_8l2cXabWRO00CPQSSQ 610
numpy/f2py/tests/src/string/gh24008.f sha256=UA8Pr-_yplfOFmc6m4v9ryFQ8W9OulaglulefkFWD68 217
numpy/f2py/tests/src/string/char.f90 sha256=ihr_BH9lY7eXcQpHHDQhFoKcbu7VMOX5QP2Tlr7xlaM 618
numpy/f2py/tests/src/string/gh25286_bc.pyf sha256=6Y9zU66NfcGhTXlFOdFjCSMSwKXpq5ZfAe3FwpkAsm4 384
numpy/f2py/tests/src/string/gh24662.f90 sha256=-Tp9Kd1avvM7AIr8ZukFA9RVr-wusziAnE8AvG9QQI4 197
numpy/f2py/tests/src/string/fixed_string.f90 sha256=5n6IkuASFKgYICXY9foCVoqndfAY0AQZFEK8L8ARBGM 695
numpy/f2py/tests/src/string/gh25286.pyf sha256=GjgWKh1fHNdPGRiX5ek60i1XSeZsfFalydWqjISPVV8 381
numpy/f2py/tests/src/string/scalar_string.f90 sha256=ACxV2i6iPDk-a6L_Bs4jryVKYJMEGUTitEIYTjbJes4 176
numpy/f2py/tests/src/string/gh25286.f90 sha256=2EpxvC-0_dA58MBfGQcLyHzpZgKcMf_W9c73C_Mqnok 304
numpy/f2py/tests/src/string/string.f sha256=shr3fLVZaa6SyUJFYIF1OZuhff8v5lCwsVNBU2B-3pk 248
numpy/f2py/tests/src/callback/gh18335.f90 sha256=NraOyKIXyvv_Y-3xGnmTjtNjW2Znsnlk8AViI8zfovc 506
numpy/f2py/tests/src/callback/gh25211.pyf sha256=FWxo0JWQlw519BpZV8PoYeI_FZ_K6C-3Wk6gLrfBPlw 447
numpy/f2py/tests/src/callback/gh25211.f sha256=a2sxlQhtDVbYn8KOKHUYqwc-aCFt7sDPSnJsXFG35uI 179
numpy/f2py/tests/src/callback/foo.f sha256=C1hjfpRCQWiOVVzIHqnsYcnLrqQcixrnHCn8hd9GhVk 1254
numpy/f2py/tests/src/callback/gh17797.f90 sha256=_Nrl0a2HgUbtymGU0twaJ--7rMa1Uco2A3swbWvHoMo 148
numpy/f2py/tests/src/size/foo.f90 sha256=IlFAQazwBRr3zyT7v36-tV0-fXtB1d7WFp6S1JVMstg 815
numpy/f2py/tests/src/regression/incfile.f90 sha256=i7Y1zgMXR9bSxnjeYWSDGeCfsS5jiyn7BLb-wbwjz2U 92
numpy/f2py/tests/src/regression/f77comments.f sha256=bqTsmO8WuSLVFsViIV7Nj7wQbJoZ7IAA3d2tpRDKsnA 626
numpy/f2py/tests/src/regression/f90continuation.f90 sha256=_W1fj0wXLqT91Q14qpBnM3F7rJKaiSR8upe0mR6_OIE 276
numpy/f2py/tests/src/regression/AB.inc sha256=cSNxitwrjTKMiJzhY2AI5FaXJ5y9zDgA27x79jyoI6s 16
numpy/f2py/tests/src/regression/inout.f90 sha256=CpHpgMrf0bqA1W3Ozo3vInDz0RP904S7LkpdAH6ODck 277
numpy/f2py/tests/src/crackfortran/data_stmts.f90 sha256=19YO7OGj0IksyBlmMLZGRBQLjoE3erfkR4tFvhznvvE 693
numpy/f2py/tests/src/crackfortran/data_with_comments.f sha256=hoyXw330VHh8duMVmAQZjr1lgLVF4zFCIuEaUIrupv0 175
numpy/f2py/tests/src/crackfortran/accesstype.f90 sha256=-5Din7YlY1TU7tUHD2p-_DSTxGBpDsWYNeT9WOwGhno 208
numpy/f2py/tests/src/crackfortran/unicode_comment.f90 sha256=aINLh6GlfTwFewxvDoqnMqwuCNb4XAqi5Nj5vXguXYs 98
numpy/f2py/tests/src/crackfortran/gh23598.f90 sha256=41W6Ire-5wjJTTg6oAo7O1WZfd1Ug9vvNtNgHS5MhEU 101
numpy/f2py/tests/src/crackfortran/operators.f90 sha256=-Fc-qjW1wBr3Dkvdd5dMTrt0hnjnV-1AYo-NFWcwFSo 1184
numpy/f2py/tests/src/crackfortran/publicmod.f90 sha256=Pnwyf56Qd6W3FUH-ZMgnXEYkb7gn18ptNTdwmGan0Jo 167
numpy/f2py/tests/src/crackfortran/gh2848.f90 sha256=gPNasx98SIf7Z9ibk_DHiGKCvl7ERtsfoGXiFDT7FbM 282
numpy/f2py/tests/src/crackfortran/gh23533.f sha256=w3tr_KcY3s7oSWGDmjfMHv5h0RYVGUpyXquNdNFOJQg 126
numpy/f2py/tests/src/crackfortran/gh23879.f90 sha256=LWDJTYR3t9h1IsrKC8dVXZlBfWX7clLeU006X6Ow8oI 332
numpy/f2py/tests/src/crackfortran/pubprivmod.f90 sha256=eYpJwBYLKGOxVbKgEqfny1znib-b7uYhxcRXIf7uwXg 165
numpy/f2py/tests/src/crackfortran/data_common.f sha256=ZSUAh3uhn9CCF-cYqK5TNmosBGPfsuHBIEfudgysun4 193
numpy/f2py/tests/src/crackfortran/foo_deps.f90 sha256=CaH7mnWTG7FcnJe2vXN_0zDbMadw6NCqK-JJ2HmDjK8 128
numpy/f2py/tests/src/crackfortran/gh17859.f sha256=7K5dtOXGuBDAENPNCt-tAGJqTfNKz5OsqVSk16_e7Es 340
numpy/f2py/tests/src/crackfortran/data_multiplier.f sha256=jYrJKZWF_59JF9EMOSALUjn0UupWvp1teuGpcL5s1Sc 197
numpy/f2py/tests/src/crackfortran/gh22648.pyf sha256=qZHPRNQljIeYNwbqPLxREnOrSdVV14f3fnaHqB1M7c0 241
numpy/f2py/tests/src/crackfortran/privatemod.f90 sha256=7bubZGMIn7iD31wDkjF1TlXCUM7naCIK69M9d0e3y-U 174
numpy/f2py/tests/src/crackfortran/gh15035.f sha256=jJly1AzF5L9VxbVQ0vr-sf4LaUo4eQzJguhuemFxnvg 375
numpy/f2py/tests/src/crackfortran/gh23598Warn.f90 sha256=1v-hMCT_K7prhhamoM20nMU9zILam84Hr-imck_dYYk 205
numpy/f2py/tests/src/modules/module_data_docstring.f90 sha256=tDZ3fUlazLL8ThJm3VwNGJ75QIlLcW70NnMFv-JA4W0 224
numpy/f2py/tests/src/modules/use_modules.f90 sha256=UsFfx0B2gu_tS-H-BpLWed_yoMDl1kbydMIOz8fvXWA 398
numpy/f2py/tests/src/modules/gh25337/data.f90 sha256=9Uz8CHB9i3_mjC3cTOmkTgPAF5tWSwYacG3MUrU-SY0 180
numpy/f2py/tests/src/modules/gh25337/use_data.f90 sha256=WATiDGAoCKnGgMzm_iMgmfVU0UKOQlk5Fm0iXCmPAkE 179
numpy/f2py/src/fortranobject.h sha256=7cfRN_tToAQ1Na13VQ2Kzb2ujMHUAgGsbScnfLVOHqs 5823
numpy/f2py/src/fortranobject.c sha256=YPF0qUjOUnGdOFZEcvId1ooZMfmuDcGkaWbOG7_4HmM 46048
numpy/testing/__init__.pyi sha256=cYNKSlLuYnm6T1_qJlxRQMzxk9LfIglDSSZFGGTultw 1654
numpy/testing/__init__.py sha256=InpVKoDAzMKO_l_HNcatziW_u1k9_JZze__t2nybrL0 595
numpy/testing/overrides.py sha256=IB0inJ_540YOcATsjm0Qy8jEvrY_mHRI5fQj-yI6Z6Q 2125
numpy/testing/print_coercion_tables.py sha256=v9RlpFnOlaw34QGWnDIovDGhG1clwGhha0UnCqni0RE 6223
numpy/testing/tests/test_utils.py sha256=UzoYayAz1gdKE7f0R0Ov7jtaafhsxUVPTWQiQzFCiHo 70508
numpy/testing/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/testing/_private/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/testing/_private/extbuild.py sha256=0tE1oUYSHM7Wt7EuqQN20CdnqwFtALABHrd7OK_lD6M 8016
numpy/testing/_private/utils.pyi sha256=SqYZTJqx7pMVJGQa_ZhS6wveLU7cVlrkZXkl3_TgOy4 10330
numpy/testing/_private/utils.py sha256=VdGiX-fb5xRt6xbwgngzsge4iq2tZTZlS07HAgpVnkA 92868
numpy/lib/_stride_tricks_impl.pyi sha256=J_DcfNwm4btn7ynKMAdDGHDSNRbxuWlQKsbGLat3T9o 1753
numpy/lib/_scimath_impl.pyi sha256=E2roKJzMFwWSyhLu8UPUr54WOpxF8jp_pyXYBgsUSQ8 2883
numpy/lib/_iotools.py sha256=tWr7T-kaddCqsHSww58EfcrWC2umZ2AecGD1HfVXiBs 30870
numpy/lib/_polynomial_impl.pyi sha256=hwookIwMJ8VrQWaZhjcJb8nunseXfm_Z1nlJ2W9Xdng 6936
numpy/lib/mixins.py sha256=jedTdqltOakWU1sZ_GY_oFHmFJP7Q3JbONo5ZRpJNJY 7365
numpy/lib/_polynomial_impl.py sha256=aWWxqFTt47npbfXea9ON2WxoXl-TL5mO7rcOr6RkrkQ 43992
numpy/lib/recfunctions.py sha256=SlAw-x1KjO89reNmlBiqGjVgB1k7Da5WImheu_R66FY 59476
numpy/lib/_user_array_impl.py sha256=n36wSKrwpatZVc7CBZSXLZhyUYqy5XKemnZ4gBjpaUE 7890
numpy/lib/_array_utils_impl.py sha256=kYDat6enV_pRf_fPse4Cc29ybirpeDUXC6vw7a3Lm_U 1662
numpy/lib/_arraysetops_impl.py sha256=hFEgKBw9f2dBAJ3nsDEOlL7bhHDoEftU5is06Ihl8i8 37566
numpy/lib/_version.pyi sha256=B572hyWrUWG-TAAAXrNNAT4AgyUAmJ4lvgpwMkDzunk 633
numpy/lib/scimath.py sha256=iO0IiDgpHk1EurdUvJIE2KqDzVOfvSsU3MFIlJskIOE 118
numpy/lib/_stride_tricks_impl.py sha256=gCBPWVLdyxNK3O24vMmdKS4GrBek6SO0tn_139i0USg 18113
numpy/lib/__init__.pyi sha256=f6_weeFha_MBO1TfKATaqRKHv3N9n5A2azKB7jd_9UY 770
numpy/lib/_version.py sha256=6vK7czNSB_KrWx2rZJzJ1pyOc73Q07hAgfLB5ItUCnU 4855
numpy/lib/array_utils.py sha256=zoaLw9TvrAFRkh9n8uMyr8kvug3IvVlUT7LcJzB3Tk0 130
numpy/lib/_type_check_impl.py sha256=hpDL9mgAnYApV1flSGGPuzAz5UXvWYSFVk7D9uu9nPk 19086
numpy/lib/format.pyi sha256=YWBxC3GdsZ7SKBN8I7nMwWeVuFD1aT9d-VJ8zE4-P-o 748
numpy/lib/scimath.pyi sha256=MIWKfkv7MVE063prnzdSzI8pnVHPnXIFWOhBwlL6_0U 241
numpy/lib/_npyio_impl.pyi sha256=o46cfLBl37nRIsuXpu0UafpttgRd2ca20H0tVVGpLHI 10238
numpy/lib/_scimath_impl.py sha256=f5twn7CSRRiqOHzMUZJ8cvRCKlE6gE2au8C7PFUMKog 15200
numpy/lib/mixins.pyi sha256=yJM9NNPaU1-TQ3D9vj9QgcY3L_lDKEjI6a8Y9NWylzo 3114
numpy/lib/user_array.py sha256=Ev3yeNNLZVNWk9xZuiCIbODYKwQ6XfYGpI5WAoYvtok 49
numpy/lib/__init__.py sha256=ZZrCRjberqMU5UaiUW0jP0evjVtDNOWV7NZgptwDlWc 3115
numpy/lib/format.py sha256=n51y8OFXZ-Ocru-XZdnvlvyVHMnCCI3359ay9NB7-kM 36287
numpy/lib/npyio.pyi sha256=b_cbxg8tD8AA9ql9mqMCcA0Wts5iUBCXSpVNBLNzvZ0 92
numpy/lib/_histograms_impl.pyi sha256=hfWyE2pyRJcijx0qsZYXNjJ3PvApbPPNjzTa-u25bVs 1001
numpy/lib/_array_utils_impl.pyi sha256=w37sTX4F4AJNrN4pnUovcqEcxfsdkpdhF4CDtsbB36o 748
numpy/lib/_arrayterator_impl.py sha256=dI87nybiVY_n55J-pXunJ7-clJuMOMxIWEE6FKWzvCo 7141
numpy/lib/introspect.py sha256=Wv3fir3oMJwJqQXdPMShGYjbFkTue4x54_JQcb-6mxI 2710
numpy/lib/_shape_base_impl.pyi sha256=Cf2HMxh0x7wrE7Npy9oYYY9iTlAMH-62RVhod7zs91U 4819
numpy/lib/npyio.py sha256=NCxqWedJbSM5M-wr69TED8x7KXcyBJ0x5u49vj4sPkI 62
numpy/lib/_shape_base_impl.py sha256=S_UHYAN8_TwPRAZOR0jNbSTFiAf4XakhkXOSkwt6Fg0 38999
numpy/lib/_arrayterator_impl.pyi sha256=M-oDG2ShygvxufQG0NMimXYMJtTQcCPHPwogWO1bN00 1514
numpy/lib/_utils_impl.pyi sha256=beIHx7IktQu13uqwpOJ0dz5P6CtYV_MN8xREYAfqxA4 644
numpy/lib/stride_tricks.py sha256=VGR5M8Jyw8IC4S6XEB9NN_GULTJJQj_1QrItIi_BJiM 82
numpy/lib/_histograms_impl.py sha256=vnLx8QE-kB-TAgE-UfNqYkY-KKAOUVULNUimkoV2khM 38337
numpy/lib/_function_base_impl.pyi sha256=yDFSbGZ2jT56I1VyVBI7Rw5S616yihxFqBCVPm3cqbw 16547
numpy/lib/_index_tricks_impl.pyi sha256=udLQYETv5PGTWWIGvaUMhHE22DA1kYWmlkk40043BqU 4163
numpy/lib/_nanfunctions_impl.pyi sha256=WI7OtJWk9HLWpYSw5hufi3q-sCvscZxNByar7fBkM5U 613
numpy/lib/_arraypad_impl.py sha256=OTPfZ38GNYHFGadP1Am8IHiUxuaTOASwB3_Kdqj03ug 32397
numpy/lib/_arraypad_impl.pyi sha256=ADXphtAORYl3EqvE5qs_u32B_TALKSOtF43jOLmoxRw 1728
numpy/lib/_twodim_base_impl.pyi sha256=FsS5iEL5lKDiNOEq1VUe5YsNpQOtWyR2P3JLdlV1OBA 5505
numpy/lib/_ufunclike_impl.py sha256=gh7apgXMPEjRChBfBbwjBI6st4_PC3LweynH5LQ48gY 6250
numpy/lib/array_utils.pyi sha256=kEO5wShp8zEbNTPu-Kw-EHuZQvq1rXHzgjK797xCV0Q 191
numpy/lib/_npyio_impl.py sha256=WBuwbkCGItcmRCgW6tEqHdjO-qYKcRWHW63WERyKpPs 98497
numpy/lib/stride_tricks.pyi sha256=Fqn9EZXdjIgUTce6UMD7rBBb8289QTMzohhjHwYP3TU 124
numpy/lib/_index_tricks_impl.py sha256=ia0LRAn25WtapAG16-e6wYZQbAcAo5BQMWW1C7VTIqQ 31850
numpy/lib/_arraysetops_impl.pyi sha256=eHCK7aprLhBsPCaeyhnZyzDuNCX2jW7cQBvOmON55z8 9315
numpy/lib/_ufunclike_impl.pyi sha256=vxaQ_C9VeH9OzAxotaBTwPNu247jo3tAbwq4O6xPBHA 1299
numpy/lib/_twodim_base_impl.py sha256=sDtfstqNIDXPkhfCy6rZO2HokFqF5z2LvsCGfPT5mFk 33212
numpy/lib/_type_check_impl.pyi sha256=hRKacjRatDTGfYhJYYnfpFwj3uHgQJuVpRGUdcoqkJ4 5207
numpy/lib/_function_base_impl.py sha256=QxrkDl4iK1xmZkPgxj0uLPLdyoL5sddBkR_wk2dTnSY 196833
numpy/lib/_nanfunctions_impl.py sha256=oiiFNXFCFcvk6Fa9U90qf4KZdAITYE7wYJCswEWjiUY 72015
numpy/lib/_datasource.py sha256=buGtWNy9KaefhFNkDiTwY5A3ArjMoUzAfhtiFcznY4o 22777
numpy/lib/_utils_impl.py sha256=1GuwKmbhF36cJr0826FwMr0nyZFWZnr-bodE64nENvg 23297
numpy/lib/tests/test_type_check.py sha256=kh2n-xjjmygmul0L0vMvmcXySX9ViBjWGKJYQbN6yCA 14702
numpy/lib/tests/test_utils.py sha256=oiaOkq92XhdCX6BK7X1JXHBblNuDobvV4CxTpZWOmm8 2378
numpy/lib/tests/test_twodim_base.py sha256=ll-72RhqCItIPB97nOWhH7H292h4nVIX_w1toKTPMUg 18841
numpy/lib/tests/test_polynomial.py sha256=XwAkZbKZaF2yyeEjbo0WevOwewGWPaox-8liLZZ4YnU 11400
numpy/lib/tests/test__iotools.py sha256=W2gLNsi2S8-4qixUs6EKkTYnOOp55qLLuM3zpBzZoR4 13744
numpy/lib/tests/test_shape_base.py sha256=KxEmD2gn-4FtvcH45Lv732t4x6iaXNO0MY6zueU0kEo 26832
numpy/lib/tests/test_ufunclike.py sha256=5AFySuvUfggh0tpBuQHJ7iZRrP0r_yZZv5xHxOuCZ1s 3023
numpy/lib/tests/test_index_tricks.py sha256=ZpKsvd3P3p2hwfj6sHlL_lysJp1IevAoM6AdpeTAx8M 20368
numpy/lib/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/lib/tests/test_arrayterator.py sha256=AYs2SwV5ankgwnvKI9RSO1jZck118nu3SyZ4ngzZNso 1291
numpy/lib/tests/test__version.py sha256=aO3YgkAohLsLzCNQ7vjIwdpFUMz0cPLbcuuxIkjuN74 1999
numpy/lib/tests/test_io.py sha256=TpKQ5q_ClEZxcU9VRDi50kBIjSn6ST5B5qazz1Igp60 109391
numpy/lib/tests/test_array_utils.py sha256=vOC6AmlPIQbVxQf2DiRL02May5IK5BK2GUFK0nP83FM 1119
numpy/lib/tests/test_arraysetops.py sha256=4SAWdh-3HIKsxgLOIML1Q719pUlrY07S_c11Arw3ri8 36973
numpy/lib/tests/test_function_base.py sha256=iPDMxVQXIlnwEAttBjH9diaWdkZHJJ06Y8SZsZtyB-U 164747
numpy/lib/tests/test_arraypad.py sha256=pPTksDqBqZT9TnzRS8mjhBykFBcib-n0Xc4GWR1lqWE 56087
numpy/lib/tests/test_mixins.py sha256=Wivwz3XBWsEozGzrzsyyvL3qAuE14t1BHk2LPm9Z9Zc 7030
numpy/lib/tests/test_packbits.py sha256=OWGAd5g5GG0gl7WHqNfwkZ7G-2rrtLt2sI854PG4nnw 17546
numpy/lib/tests/test__datasource.py sha256=65KXfUUvp8wXSqgQisuYlkhg-qHjBV5FXYetL8Ba-rc 10571
numpy/lib/tests/test_stride_tricks.py sha256=zndC6JApNslL3_8GOSv1LY6JWMopbtHO_mhom-Uj7O4 22856
numpy/lib/tests/test_recfunctions.py sha256=6jzouPEQ7Uhtj8_-W5yTI6ymNp2nLgmdHzxdd74jVuM 44001
numpy/lib/tests/test_nanfunctions.py sha256=p2wp_C3vyalQ2hx7HADJPbIUQhF64aM3oR01WfB7Img 53353
numpy/lib/tests/test_loadtxt.py sha256=IbEns4qFk2MEUteRW2Q9BG_iJi7FN6A7WgS7S_xsMI4 38465
numpy/lib/tests/test_format.py sha256=7Uwxs2RT8KfvXB4dv85PNsS3BrMxb7ejPSAs29dSSzc 41057
numpy/lib/tests/test_histograms.py sha256=qFUquax3Wo9t3qmZ3qSQAK9LxJJ5hugWM9cGvadgoSs 32655
numpy/lib/tests/test_regression.py sha256=PmC3JIX_7HzWMItnoJkjtMpBnLlIVFM9diKoIMYbiek 7716
numpy/lib/tests/data/py2-objarr.npy sha256=F4cyUC-_TB9QSFLAo2c7c44rC6NUYIgrfGx9PqWPSKk 258
numpy/lib/tests/data/py3-objarr.npz sha256=vVRl9_NZ7_q-hjduUr8YWnzRy8ESNlmvMPlaSSC69fk 453
numpy/lib/tests/data/py2-np0-objarr.npy sha256=ZLoI7K3iQpXDkuoDF1Ymyc6Jbw4JngbQKC9grauVRsk 258
numpy/lib/tests/data/python3.npy sha256=X0ad3hAaLGXig9LtSHAo-BgOvLlFfPYMnZuVIxRmj-0 96
numpy/lib/tests/data/win64python2.npy sha256=agOcgHVYFJrV-nrRJDbGnUnF4ZTPYXuSeF-Mtg7GMpc 96
numpy/lib/tests/data/py2-objarr.npz sha256=xo13HBT0FbFZ2qvZz0LWGDb3SuQASSaXh7rKfVcJjx4 366
numpy/lib/tests/data/py3-objarr.npy sha256=7mtikKlHXp4unZhM8eBot8Cknlx1BofJdd73Np2PW8o 325
numpy/fft/_helper.pyi sha256=4Z9lTaHKEldkDrh8vpYJKOeGfPrTJAs9UATt1u8FlEw 1330
numpy/fft/__init__.pyi sha256=IYRQ9v8fS2H9iMdCJfO9am_86vbcpWFpzXLbwPjSSZo 531
numpy/fft/_helper.py sha256=aqfMugqDOO-3tj1JXp0v0PVhB2uJ_5q08O1bSD3fB_w 6667
numpy/fft/__init__.py sha256=cW8oJRorHlG10mhnhAB1OOkg4HpG2NGYHDgonFNI04s 8326
numpy/fft/helper.py sha256=str0NJ1vpLNlC_3vMfulTu9D9_cThxKG2zkaGuZ5NTY 610
numpy/fft/_pocketfft_umath.cpython-312-darwin.so sha256=OheLL956YtURWvZ8bHpcvwuMXScCiJjFFL_xEls8SQc 329587
numpy/fft/_pocketfft.pyi sha256=JZJM0TeqqY0WrnYpr1mzfe3FWTa8yzEcrqEoTLJhGZc 2961
numpy/fft/_pocketfft.py sha256=0wwPR9oK0R9tGwi_NqMpNIKrPFqSwLGXLeF1X3aRqgU 62775
numpy/fft/tests/test_pocketfft.py sha256=yFRUOqWmk6uIE-qBiUjZtvgLyFeoU9iP91iuvO3XT00 23631
numpy/fft/tests/test_helper.py sha256=pVYVLUwNEcE9M8eyHaRi7JOgc6k5p_JVzJ0AKnelgvI 6149
numpy/fft/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/doc/ufuncs.py sha256=i1alLg19mNyCFZ2LYSOZGm--RsRN1x63U_UYU-N3x60 5357
numpy/random/_generator.pyi sha256=10sKaoew5r7dEJYlpESLdpKROrz9h_iEFOTgBZ1PesU 24608
numpy/random/LICENSE.md sha256=EDFmtiuARDr7nrNIjgUuoGvgz_VmuQjxmeVh_eSa8Z8 3511
numpy/random/_common.pxd sha256=7kGArYkBcemrxJcSttwvtDGbimLszdQnZdNvPMgN5xQ 4982
numpy/random/_pcg64.pyi sha256=uxr5CbEJetN6lv9vBG21jlRhuzOK8SQnXrwqAQBxj_c 1091
numpy/random/bit_generator.cpython-312-darwin.so sha256=TcTUpqesOEwKCIGgwOmrke0WDktDCBLdKIzYrZ5cJ78 210432
numpy/random/__init__.pyi sha256=2SxvWDuxTcI2gcgIAU4A-cG_Azq8QV-EPi8SScO4D2w 2123
numpy/random/c_distributions.pxd sha256=7DE-mV3H_Dihk4OK4gMHHkyD4tPX1cAi4570zi5CI30 6344
numpy/random/_pickle.py sha256=7nW1Hv78ZVg8KtWGaCB2Cf4bAZfOKVGqCa-jIBXN-Ug 2779
numpy/random/__init__.pxd sha256=9JbnX540aJNSothGs-7e23ozhilG6U8tINOUEp08M_k 431
numpy/random/_pcg64.cpython-312-darwin.so sha256=GVunwGijyXrEQSk3M_GeWDHSTT2Dc1EILF2rdR5mxLA 133337
numpy/random/__init__.py sha256=81Thnexg5umN5WZwD5TRyzNc2Yp-d14B6UC7NBgVKh8 7506
numpy/random/_mt19937.cpython-312-darwin.so sha256=_Vo_nslKlSwjLcVSp_r3l8dQBNbPkgUVe97SznP_DPM 132843
numpy/random/_philox.cpython-312-darwin.so sha256=cWj_5xuB5pNsC6unOXnzd18TFDR3KtCueGwhSbYp_V8 132314
numpy/random/_bounded_integers.cpython-312-darwin.so sha256=f-vM6rt0IOiWbaUfZ8af7Jl3fnYWX8UqCTiqEhgCYxA 299380
numpy/random/_philox.pyi sha256=6OGeH8PMjzs9t21IdQJAz-5eKkjY4jX0vYgv3bkCwGw 954
numpy/random/mtrand.cpython-312-darwin.so sha256=H2QW1eN6P88cQLvdIjHHRp_dlJ6FIS4oeRWxF-1IqMU 709417
numpy/random/_common.cpython-312-darwin.so sha256=B-8OAB6BdMmTPXSBYP_TzykeOX2dJx4Dla9eWra01JE 235706
numpy/random/_bounded_integers.pxd sha256=SH_FwJDigFEInhdliSaNH2H2ZIZoX02xYhNQA81g2-g 1678
numpy/random/_sfc64.cpython-312-darwin.so sha256=dahJC37gpXAiV92LqzHyUvzig6aJMVlGBxw8jH67e_8 97161
numpy/random/_mt19937.pyi sha256=WWnxy1KiYOun55nB0du7jArWKmJd5GTcltt_L9sPivA 724
numpy/random/bit_generator.pyi sha256=EkXmABq21fF-wiCFmAehXLOSMQJk0fYyEJefzchBi0Q 3595
numpy/random/_sfc64.pyi sha256=xscekcSRmOwEAmMIwJUUTBYNgYO1I-PN8-JLKJamKLc 631
numpy/random/bit_generator.pxd sha256=lArpIXSgTwVnJMYc4XX0NGxegXq3h_QsUDK6qeZKbNc 1007
numpy/random/_generator.cpython-312-darwin.so sha256=U9x11UezeSYGJwAszz2hwoNgTv6HDvX1hZ1ZTMaIGC8 837357
numpy/random/mtrand.pyi sha256=4xzN5Ep8hN_NnOCBRI5PTOSv0gpGwSeev43AN23JXSA 22441
numpy/random/tests/test_generator_mt19937.py sha256=2-kLPE1yPSo-SMuBoTNtbYoTvJLecI3GxUy2wlInHGo 117294
numpy/random/tests/test_randomstate.py sha256=Cp-op2kfopZ8wq-SBQ12Mh5RQ0p8mcBQHYSh0h-DegU 85275
numpy/random/tests/test_direct.py sha256=4QsNnYfZZtVq-uiLKnsCOdp3yk_bsLDjIFwC3UGdACs 19251
numpy/random/tests/test_extending.py sha256=gQXSOzrZCc5Qt9B4HZ_yC5TMEc1xibe_4sbNuIX0lj4 3880
numpy/random/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/random/tests/test_smoke.py sha256=FUGrJ4JGHgKQRN9679Qb53tpkN3IRZchxTZrvSr5J_k 28180
numpy/random/tests/test_randomstate_regression.py sha256=xS_HOwtijRdgq-gZn0IDUcm0NxdjjJXYv6ex8WN7FPU 7999
numpy/random/tests/test_seed_sequence.py sha256=GNRJ4jyzrtfolOND3gUWamnbvK6-b_p1bBK_RIG0sfU 3311
numpy/random/tests/test_generator_mt19937_regressions.py sha256=sf_pMdbEaskVofWauYIXKre3MZcpI56Iq6fQ8IkP6Ww 6410
numpy/random/tests/test_random.py sha256=i44DXCHEBtKtOzwSBfADh_kBSjMPgaCJYHdFfs6sfCQ 70150
numpy/random/tests/test_regression.py sha256=RbAzZYLfyzUKmup5uJR19sK2N17L_d1rLRy-CWjtIaQ 5462
numpy/random/tests/data/philox-testset-1.csv sha256=SedRaIy5zFadmk71nKrGxCFZ6BwKz8g1A9-OZp3IkkY 23852
numpy/random/tests/data/philox-testset-2.csv sha256=dWECt-sbfvaSiK8-Ygp5AqyjoN5i26VEOrXqg01rk3g 23838
numpy/random/tests/data/sfc64-testset-1.csv sha256=iHs6iX6KR8bxGwKk-3tedAdMPz6ZW8slDSUECkAqC8Q 23840
numpy/random/tests/data/sfc64-testset-2.csv sha256=FIDIDFCaPZfWUSxsJMAe58hPNmMrU27kCd9FhCEYt_k 23833
numpy/random/tests/data/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/random/tests/data/generator_pcg64_np126.pkl.gz sha256=fN8deNVxX-HELA1eIZ32kdtYvc4hwKya6wv00GJeH0Y 208
numpy/random/tests/data/sfc64_np126.pkl.gz sha256=MVa1ylFy7DUPgUBK-oIeKSdVl4UYEiN3AZ7G3sdzzaw 290
numpy/random/tests/data/mt19937-testset-2.csv sha256=nsBEQNnff-aFjHYK4thjvUK4xSXDSfv5aTbcE59pOkE 15825
numpy/random/tests/data/generator_pcg64_np121.pkl.gz sha256=EfQ-X70KkHgBAFX2pIPcCUl4MNP1ZNROaXOU75vdiqM 203
numpy/random/tests/data/mt19937-testset-1.csv sha256=Xkef402AVB-eZgYQkVtoxERHkxffCA9Jyt_oMbtJGwY 15844
numpy/random/tests/data/pcg64-testset-1.csv sha256=xB00DpknGUTTCxDr9L6aNo9Hs-sfzEMbUSS4t11TTfE 23839
numpy/random/tests/data/pcg64-testset-2.csv sha256=NTdzTKvG2U7_WyU_IoQUtMzU3kEvDH39CgnR6VzhTkw 23845
numpy/random/tests/data/pcg64dxsm-testset-1.csv sha256=vNSUT-gXS_oEw_awR3O30ziVO4seNPUv1UIZ01SfVnI 23833
numpy/random/tests/data/pcg64dxsm-testset-2.csv sha256=uylS8PU2AIKZ185OC04RBr_OePweGRtvn-dE4YN0yYA 23839
numpy/random/lib/libnpyrandom.a sha256=gj1i4jZGka1HQ99fAqykQ_iGnwBiyyLfA41YY3rdb9A 55184
numpy/random/_examples/cffi/parse.py sha256=Bnb7t_6S_c5-3dZrQ-XX9EazOKhftUfcCejXXWyd1EU 1771
numpy/random/_examples/cffi/extending.py sha256=xSla3zWqxi6Hj48EvnYfD3WHfE189VvC4XsKu4_T_Iw 880
numpy/random/_examples/cython/meson.build sha256=KZTJSvHaFU5dGRzlhanwDpa7B75mRfz48UUsyVtvFck 1475
numpy/random/_examples/cython/extending_distributions.pyx sha256=oazFVWeemfE0eDzax7r7MMHNL1_Yofws2m-c_KT2Hbo 3870
numpy/random/_examples/cython/extending.pyx sha256=4IE692pq1V53UhPZqQiQGcIHXDoNyqTx62x5a36puVg 2290
numpy/random/_examples/numba/extending.py sha256=Ipyzel_h5iU_DMJ_vnXUgQC38uMDMn7adUpWSeEQLFE 1957
numpy/random/_examples/numba/extending_distributions.py sha256=M3Rt9RKupwEq71JjxpQFbUO7WKSOuLfR1skRM2a-hbI 2036
numpy/matrixlib/__init__.pyi sha256=WAYa7HoOr3wIRWLWg2Of80HlEfSJbGlCLXC1y0DO9k8 232
numpy/matrixlib/__init__.py sha256=BHBpQKoQv4EjT0UpWBA-Ck4L5OsMqTI2IuY24p-ucXk 242
numpy/matrixlib/defmatrix.pyi sha256=lmBMRahKcMOl2PHDo79J67VRAZOkI54BzfDaTLpE0LI 451
numpy/matrixlib/defmatrix.py sha256=8l1LDSiwtneMZmIlC62YUlyo4lqVlLWUBPhJRgvBw5g 30690
numpy/matrixlib/tests/test_matrix_linalg.py sha256=ObbSUXU4R2pWajH__xAdizADrU2kBKDDCxkDV-oVBXc 2059
numpy/matrixlib/tests/test_defmatrix.py sha256=tLHvsnn2xIKLLZULYqhQ1IJOtSdS52BfOOhU8-7jjvA 15035
numpy/matrixlib/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/matrixlib/tests/test_interaction.py sha256=jiLmXS0JtwEx0smkb5hUnY5Slp9I8FwGlYGHKE3iG1w 11895
numpy/matrixlib/tests/test_numeric.py sha256=MP70qUwgshTtThKZaZDp7_6U-Z66NIV1geVhasGXejQ 441
numpy/matrixlib/tests/test_masked_matrix.py sha256=1x3mzFol1GYvVxKXcmRYLi-On3cmK7gEjSVEyvbkh-w 8914
numpy/matrixlib/tests/test_multiarray.py sha256=jB3XCBmAtcqf-Wb9PwBW6uIykPpMPthuXLJ0giTKzZE 554
numpy/matrixlib/tests/test_regression.py sha256=LBkm6_moDjuU9RY4FszgaknOj3IyCp3t-Ej3HJfqpdk 932
numpy/polynomial/laguerre.py sha256=uqnIx24c62p9rZrd3Bp0WR-mRBb2gGgXqeXLZkiUJkU 52780
numpy/polynomial/_polybase.py sha256=13k0e6a9nPMkoBHUrGF6rO-Mp3mw2Q3fyU1HXOMqUz4 39788
numpy/polynomial/__init__.pyi sha256=O-eu54tCIP7_Iuvam8VgolJWWrI4_xbR4VCOUzvUMw4 681
numpy/polynomial/polyutils.py sha256=t04Hl9zRk2Vg4V2YeKCc4KKQFNkx9VG1mBhl051t2OY 22324
numpy/polynomial/hermite.pyi sha256=zP9yDm4ewWW5-n3oyHvdFvp7qNX1qC19122t38a123A 1188
numpy/polynomial/__init__.py sha256=xcCM2WwJP5QimtW30ZUvg-W5GfdAI1UNnqfvg97AfeU 6701
numpy/polynomial/polyutils.pyi sha256=dxY-MH3MSw1UxCYn9Tmf9yqvKxOiGf_hkzFkiEd5_Zg 227
numpy/polynomial/chebyshev.pyi sha256=xvLC5u6-M5Rkpepac4kTk6qWMBxZlxgCPNHMQqhtssM 1356
numpy/polynomial/laguerre.pyi sha256=dtlNq3Q9S-9EiHkPWmbEAabLV2PcouqneQpuDST6Mas 1147
numpy/polynomial/polynomial.pyi sha256=wdGrv6WXWGVoJFYrIvSNhHqRHC9EyP8toAe93y40nOY 1101
numpy/polynomial/_polybase.pyi sha256=J7yU9PPZW4W8mkqAltDfnL4ZNwljuM-bDEj4DPTJZpY 2321
numpy/polynomial/hermite_e.pyi sha256=eq_0AxdL3iAeqqptO9_hyghSkF2S7-0x_wyh0TkJkQA 1207
numpy/polynomial/legendre.pyi sha256=iZbN7F2UD0EE1igLcQAmj6PEyRy9x20xNmM2cso1sXE 1147
numpy/polynomial/hermite_e.py sha256=gCcxyqAbVnHX5uNZztIecy37qjaniY3lLEclceeoa90 52626
numpy/polynomial/chebyshev.py sha256=fZLhZ4ijn4I4986dm6UFMLE_zfAsDv7Laob_LQpwOiE 62860
numpy/polynomial/polynomial.py sha256=PxxHS2Q2RreC6bgzYLeU4IcgJ8n2MzoNGcL5vXH4U7M 52572
numpy/polynomial/legendre.py sha256=-UJKHd1EUnOcAF7eJSXp6aSRjk0IYgOJslYVEZReUWA 51558
numpy/polynomial/hermite.py sha256=mnZ4-GvZ2mPf3YeDHJXvD_0QI1iw4QUloFdK-OxoBos 54902
numpy/polynomial/tests/test_chebyshev.py sha256=6tMsFP1h7K8Zf72mNOta6Tv52_fVTlXknseuffj080c 20522
numpy/polynomial/tests/test_hermite_e.py sha256=_A3ohAWS4HXrQG06S8L47dImdZGTwYosCXnoyw7L45o 18911
numpy/polynomial/tests/test_polynomial.py sha256=Dm_e-y2Myutq6bGk_A-wZFLSOqTnTAEabhAQtPtkn_U 21345
numpy/polynomial/tests/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
numpy/polynomial/tests/test_laguerre.py sha256=BZOgs49VBXOFBepHopxuEDkIROHEvFBfWe4X73UZhn8 17511
numpy/polynomial/tests/test_legendre.py sha256=b_bblHs0F_BWw9ESuSq52ZsLKcQKFR5eqPf_SppWFqo 18673
numpy/polynomial/tests/test_printing.py sha256=x5JzVg3yfub38RkKhBG_zzlIxXkcRn0mkbTECG1Bc90 21333
numpy/polynomial/tests/test_hermite.py sha256=N9b2dx2UWPyja5v02dSoWYPnKvb6H-Ozgtrx-xjWz2k 18577
numpy/polynomial/tests/test_classes.py sha256=Tf6p3qCINxOfh7hsOdVp81-CJPkqNg1HnH2smcWbRBw 18450
numpy/polynomial/tests/test_symbol.py sha256=Hg-V7jR7qz5FKg_DrlkaiFcCI1UujYFUJfpf2TuoJZM 5372
numpy/polynomial/tests/test_polyutils.py sha256=ULZMU2soHOZ4uO0eJoRjxNkT3yGURuX35MXx1Bg5Wyk 3772
numpy-2.0.0.dist-info/RECORD
numpy-2.0.0.dist-info/WHEEL sha256=ySBagz5FwlI-5j9-I-4JmuCo9M5S9b0JoHIId2xKGes 93
numpy-2.0.0.dist-info/entry_points.txt sha256=4mXDNhJDQ9GHqMBeRJ8B3PlixTFmkXGqU3RVuac20q0 172
numpy-2.0.0.dist-info/LICENSE.txt sha256=OiC27FoKMm6WhZbFA7QtWmvXObGPmE8ddqpTWBvyXQw 47652
numpy-2.0.0.dist-info/METADATA sha256=tXfnHcrCXKJHE4_KBvBaCqolITyI0FtOZiVznoQWwzs 60922

entry_points.txt

numpy = numpy
f2py = numpy.f2py.f2py2e:main
numpy-config = numpy._configtool:main
hook-dirs = numpy:_pyinstaller_hooks_dir