This file is indexed.

/usr/lib/python3/dist-packages/sshpubkeys-2.2.0.egg-info/PKG-INFO is in python3-sshpubkeys 2.2.0-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
Metadata-Version: 1.1
Name: sshpubkeys
Version: 2.2.0
Summary: SSH public key parser
Home-page: https://github.com/ojarva/python-sshpubkeys
Author: Olli Jarva
Author-email: olli@jarva.fi
License: BSD
Description-Content-Type: UNKNOWN
Description: OpenSSH Public Key Parser for Python
        ====================================
        
        .. image:: https://travis-ci.org/ojarva/python-sshpubkeys.svg?branch=master
            :target: https://travis-ci.org/ojarva/python-sshpubkeys
        
        .. image:: https://pypip.in/v/sshpubkeys/badge.png
            :target: https://pypi.python.org/pypi/sshpubkeys
        
        Native implementation for validating OpenSSH public keys.
        
        Currently ssh-rsa, ssh-dss (DSA), ssh-ed25519 and ecdsa keys with NIST curves are supported.
        
        Installation:
        
        ::
        
          pip install sshpubkeys
        
        or clone the `repository <https://github.com/ojarva/sshpubkeys>`_ and use
        
        ::
        
          python setup.py install
        
        Usage:
        
        ::
        
          import sys
          from sshpubkeys import SSHKey
        
          ssh = SSHKey("ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAYQCxO38tKAJXIs9ivPxt7AY"
                "dfybgtAR1ow3Qkb9GPQ6wkFHQqcFDe6faKCxH6iDRteo4D8L8B"
                "xwzN42uZSB0nfmjkIxFTcEU3mFSXEbWByg78aoddMrAAjatyrh"
                "H1pON6P0= ojarva@ojar-laptop", strict_mode=True)
          try:
              ssh.parse()
          except InvalidKeyException as err:
              print("Invalid key:", err)
              sys.exit(1)
          except NotImplementedError as err:
              print("Invalid key type:", err)
              sys.exit(1)
        
          print(ssh.bits)  # 768
          print(ssh.hash_md5())  # 56:84:1e:90:08:3b:60:c7:29:70:5f:5e:25:a6:3b:86
          print(ssh.hash_sha256())  # SHA256:xk3IEJIdIoR9MmSRXTP98rjDdZocmXJje/28ohMQEwM
          print(ssh.hash_sha512())  # SHA512:1C3lNBhjpDVQe39hnyy+xvlZYU3IPwzqK1rVneGavy6O3/ebjEQSFvmeWoyMTplIanmUK1hmr9nA8Skmj516HA
          print(ssh.comment)  # ojar@ojar-laptop
          print(ssh.options_raw)  # None (string of optional options at the beginning of public key)
          print(ssh.options)  # None (options as a dictionary, parsed and validated)
        
        Options
        -------
        
        Set options in constructor as a keywords (i.e., `SSHKey(None, strict_mode=False)`)
        
        - strict_mode: defaults to True. Disallows keys OpenSSH's ssh-keygen refuses to create. For instance, this includes DSA keys where length != 1024 bits and RSA keys shorter than 1024-bit. If set to False, tries to allow all keys OpenSSH accepts, including highly insecure 1-bit DSA keys.
        - skip_option_parsing: if set to True, options string is not parsed (ssh.options_raw is populated, but ssh.options is not).
        
        Exceptions
        ----------
        
        - NotImplementedError if invalid ecdsa curve or unknown key type is encountered.
        - InvalidKeyException if any other error is encountered:
            - TooShortKeyException if key is too short (<768 bits for RSA, <1024 for DSA, <256 for ED25519)
            - TooLongKeyException if key is too long (>16384 for RSA, >1024 for DSA, >256 for ED25519)
            - InvalidTypeException if key type ("ssh-rsa" in above example) does not match to what is included in base64 encoded data.
            - MalformedDataException if decoding and extracting the data fails.
            - InvalidOptionsException if options string is invalid.
                - InvalidOptionNameException if option name contains invalid characters.
                    - UnknownOptionNameException if option name is not recognized.
                - MissingMandatoryOptionValueException if option needs to have parameter, but it is absent.
        
        Tests
        -----
        
        See "`tests/ <https://github.com/ojarva/sshpubkeys/tree/master/tests>`_" folder for unit tests. Use
        
        ::
        
          python setup.py test
        
        or
        
        ::
        
          python3 setup.py test
        
        to run test suite. If you have keys that are not parsed properly, or malformed keys that raise incorrect exception, please send your *public key* to olli@jarva.fi, and I'll include it. Alternatively, `create a new issue <https://github.com/ojarva/sshpubkeys/issues/new>`_ or make `a pull request <https://github.com/ojarva/sshpubkeys/compare>`_ in github.
        
Keywords: ssh pubkey public key openssh ssh-rsa ssh-dss ssh-ed25519
Platform: UNKNOWN
Classifier: Development Status :: 4 - Beta
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: System Administrators
Classifier: Topic :: Security
Classifier: License :: OSI Approved :: BSD License
Classifier: Programming Language :: Python :: 2.6
Classifier: Programming Language :: Python :: 2.7
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.2
Classifier: Programming Language :: Python :: 3.3
Classifier: Programming Language :: Python :: 3.4
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: Implementation :: PyPy