Elliptic curves used in OpenPGP.
PublicKeyAlgorithm does not differentiate between elliptic
curves. Instead, the curve is specified using an OID prepended to
the key material. We provide this type to be able to match on the
NIST curve P-256.
NIST curve P-384.
NIST curve P-521.
D.J. Bernstein's "Twisted" Edwards curve Ed25519.
Elliptic curve Diffie-Hellman using D.J. Bernstein's Curve25519.
Returns the length of public keys over this curve in bits.
For the Kobliz curves this is the size of the underlying finite field. For X25519 it is 256.
Note: This information is useless and should not be used to gauge the security of a particular curve. This function exists only because some legacy PGP application like HKP need it.
None for unknown curves.
Parses the given OID.
Returns this curve's OID.
Returns the length of a coordinate in bits.
Error::UnsupportedEllipticCurve if the curve is not
pub fn is_supported(&self) -> bool[src]
Returns whether this algorithm is supported.
fn hash_slice<H>(data: &[Self], state: &mut H) where1.3.0[src]
impl PartialOrd<Curve> for Curve[src]
fn partial_cmp(&self, other: &Curve) -> Option<Ordering>[src]
impl StructuralEq for Curve[src]
impl StructuralPartialEq for Curve[src]
impl RefUnwindSafe for Curve
impl UnwindSafe for Curve
type Owned = T
The resulting type after obtaining ownership.
fn clone_into(&self, target: &mut T)[src]
type Error = Infallible
The type returned in the event of a conversion error.