[][src]Struct sequoia_openpgp::types::KeyServerPreferences

pub struct KeyServerPreferences(_);

Describes preferences regarding key servers.

Key server preferences are specified in Section 5.2.3.17 of RFC 4880 and Section 5.2.3.18 of RFC 4880bis.

The keyserver preferences are set by the user's OpenPGP implementation to communicate them to any peers.

A note on equality

PartialEq compares the serialized form of the two key server preference sets. If you prefer to compare two key server preference sets for semantic equality, you should use KeyServerPreferences::normalized_eq. The difference between semantic equality and serialized equality is that semantic equality ignores differences in the amount of padding.

Examples

use sequoia_openpgp as openpgp;
use openpgp::cert::prelude::*;
use openpgp::policy::StandardPolicy;

let p = &StandardPolicy::new();

let (cert, _) =
    CertBuilder::general_purpose(None, Some("alice@example.org"))
    .generate()?;

match cert.with_policy(p, None)?.primary_userid()?.key_server_preferences() {
    Some(preferences) => {
        println!("Certificate holder's keyserver preferences:");
        assert!(preferences.no_modify());
    }
    None => {
        println!("Certificate Holder did not specify any key server preferences.");
    }
}

Implementations

impl KeyServerPreferences[src]

pub fn new<B: AsRef<[u8]>>(bits: B) -> Self[src]

Creates a new instance from bits.

pub fn empty() -> Self[src]

Returns an empty key server preference set.

pub fn normalized_eq(&self, other: &Self) -> bool[src]

Compares two key server preference sets for semantic equality.

KeyServerPreferences' implementation of PartialEq compares two key server preference sets for serialized equality. That is, the PartialEq implementation considers two key server preference sets to not be equal if they have different amounts of padding. This comparison function ignores padding.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let a = KeyServerPreferences::new(&[0x1]);
let b = KeyServerPreferences::new(&[0x1, 0x0]);

assert!(a != b);
assert!(a.normalized_eq(&b));

pub fn get(&self, bit: usize) -> bool[src]

Returns whether the specified keyserver preference flag is set.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

// Keyserver Preferences flags 0 and 2.
let ksp = KeyServerPreferences::new(&[0x5]);

assert!(ksp.get(0));
assert!(! ksp.get(1));
assert!(ksp.get(2));
assert!(! ksp.get(3));
assert!(! ksp.get(8));
assert!(! ksp.get(80));

pub fn set(self, bit: usize) -> Self[src]

Sets the specified keyserver preference flag.

This also clears any padding (trailing NUL bytes).

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let ksp = KeyServerPreferences::empty().set(0).set(2);

assert!(ksp.get(0));
assert!(! ksp.get(1));
assert!(ksp.get(2));
assert!(! ksp.get(3));

pub fn clear(self, bit: usize) -> Self[src]

Clears the specified keyserver preference flag.

This also clears any padding (trailing NUL bytes).

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let ksp = KeyServerPreferences::empty().set(0).set(2).clear(2);

assert!(ksp.get(0));
assert!(! ksp.get(1));
assert!(! ksp.get(2));
assert!(! ksp.get(3));

pub fn no_modify(&self) -> bool[src]

Returns whether the certificate's owner requests that the certificate is not modified.

If this flag is set, the certificate's owner requests that the certificate should only be changed by the owner and the key server's operator.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let ksp = KeyServerPreferences::empty();
assert!(! ksp.no_modify());

pub fn set_no_modify(self) -> Self[src]

Requests that the certificate is not modified.

See KeyServerPreferences::no_modify.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let ksp = KeyServerPreferences::empty().set_no_modify();
assert!(ksp.no_modify());

pub fn clear_no_modify(self) -> Self[src]

Clears the request that the certificate is not modified.

See KeyServerPreferences::no_modify.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::KeyServerPreferences;

let ksp = KeyServerPreferences::new(&[0x80][..]);
assert!(ksp.no_modify());
let ksp = ksp.clear_no_modify();
assert!(! ksp.no_modify());

Trait Implementations

impl Clone for KeyServerPreferences[src]

impl Debug for KeyServerPreferences[src]

impl Eq for KeyServerPreferences[src]

impl Hash for KeyServerPreferences[src]

impl Ord for KeyServerPreferences[src]

impl PartialEq<KeyServerPreferences> for KeyServerPreferences[src]

impl PartialOrd<KeyServerPreferences> for KeyServerPreferences[src]

impl StructuralEq for KeyServerPreferences[src]

impl StructuralPartialEq for KeyServerPreferences[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> DynClone for T where
    T: Clone
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> Same<T> for T

type Output = T

Should always be Self

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.