[−][src]Struct sequoia_openpgp::types::KeyServerPreferences
Describes preferences regarding key servers.
Key server preferences are specified in Section 5.2.3.17 of RFC 4880 and Section 5.2.3.18 of RFC 4880bis.
The keyserver preferences are set by the user's OpenPGP implementation to communicate them to any peers.
A note on equality
PartialEq
compares the serialized form of the two key server
preference sets. If you prefer to compare two key server
preference sets for semantic equality, you should use
KeyServerPreferences::normalized_eq
. The difference between
semantic equality and serialized equality is that semantic
equality ignores differences in the amount of padding.
Examples
use sequoia_openpgp as openpgp; use openpgp::cert::prelude::*; use openpgp::policy::StandardPolicy; let p = &StandardPolicy::new(); let (cert, _) = CertBuilder::general_purpose(None, Some("alice@example.org")) .generate()?; match cert.with_policy(p, None)?.primary_userid()?.key_server_preferences() { Some(preferences) => { println!("Certificate holder's keyserver preferences:"); assert!(preferences.no_modify()); } None => { println!("Certificate Holder did not specify any key server preferences."); } }
Implementations
impl KeyServerPreferences
[src]
pub fn new<B: AsRef<[u8]>>(bits: B) -> Self
[src]
Creates a new instance from bits
.
pub fn normalized_eq(&self, other: &Self) -> bool
[src]
Compares two key server preference sets for semantic equality.
KeyServerPreferences
' implementation of PartialEq
compares
two key server preference sets for serialized equality. That
is, the PartialEq
implementation considers two key server
preference sets to not be equal if they have different
amounts of padding. This comparison function ignores padding.
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let a = KeyServerPreferences::new(&[ 0x1 ]); let b = KeyServerPreferences::new(&[ 0x1, 0x0 ]); assert!(a != b); assert!(a.normalized_eq(&b));
pub fn get(&self, bit: usize) -> bool
[src]
Returns whether the specified keyserver preference flag is set.
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; // Keyserver Preferences flags 0 and 2. let ksp = KeyServerPreferences::new(&[ 0x5 ]); assert!(ksp.get(0)); assert!(! ksp.get(1)); assert!(ksp.get(2)); assert!(! ksp.get(3)); assert!(! ksp.get(8)); assert!(! ksp.get(80));
pub fn set(self, bit: usize) -> Self
[src]
Sets the specified keyserver preference flag.
This also clears any padding (trailing NUL bytes).
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let ksp = KeyServerPreferences::default().set(0).set(2); assert!(ksp.get(0)); assert!(! ksp.get(1)); assert!(ksp.get(2)); assert!(! ksp.get(3));
pub fn clear(self, bit: usize) -> Self
[src]
Clears the specified keyserver preference flag.
This also clears any padding (trailing NUL bytes).
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let ksp = KeyServerPreferences::default().set(0).set(2).clear(2); assert!(ksp.get(0)); assert!(! ksp.get(1)); assert!(! ksp.get(2)); assert!(! ksp.get(3));
pub fn no_modify(&self) -> bool
[src]
Returns whether the certificate's owner requests that the certificate is not modified.
If this flag is set, the certificate's owner requests that the certificate should only be changed by the owner and the key server's operator.
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let ksp = KeyServerPreferences::default(); assert!(! ksp.no_modify());
pub fn set_no_modify(self) -> Self
[src]
Requests that the certificate is not modified.
See KeyServerPreferences::no_modify
.
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let ksp = KeyServerPreferences::default().set_no_modify(); assert!(ksp.no_modify());
pub fn clear_no_modify(self) -> Self
[src]
Clears the request that the certificate is not modified.
See KeyServerPreferences::no_modify
.
Examples
use sequoia_openpgp as openpgp; use openpgp::types::KeyServerPreferences; let ksp = KeyServerPreferences::new(&[0x80][..]); assert!(ksp.no_modify()); let ksp = ksp.clear_no_modify(); assert!(! ksp.no_modify());
Trait Implementations
impl Clone for KeyServerPreferences
[src]
fn clone(&self) -> KeyServerPreferences
[src]
fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Debug for KeyServerPreferences
[src]
impl Default for KeyServerPreferences
[src]
impl Eq for KeyServerPreferences
[src]
impl Hash for KeyServerPreferences
[src]
fn hash<__H: Hasher>(&self, state: &mut __H)
[src]
fn hash_slice<H>(data: &[Self], state: &mut H) where
H: Hasher,
1.3.0[src]
H: Hasher,
impl PartialEq<KeyServerPreferences> for KeyServerPreferences
[src]
fn eq(&self, other: &KeyServerPreferences) -> bool
[src]
fn ne(&self, other: &KeyServerPreferences) -> bool
[src]
impl StructuralEq for KeyServerPreferences
[src]
impl StructuralPartialEq for KeyServerPreferences
[src]
Auto Trait Implementations
impl RefUnwindSafe for KeyServerPreferences
impl Send for KeyServerPreferences
impl Sync for KeyServerPreferences
impl Unpin for KeyServerPreferences
impl UnwindSafe for KeyServerPreferences
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DynClone for T where
T: Clone,
[src]
T: Clone,
impl<T> From<T> for T
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
fn to_owned(&self) -> T
[src]
fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,