pub enum SecAlg {
Show 18 variants DeleteDs, RsaMd5, Dh, Dsa, RsaSha1, DsaNsec3Sha1, RsaSha1Nsec3Sha1, RsaSha256, RsaSha512, EccGost, EcdsaP256Sha256, EcdsaP384Sha384, Ed25519, Ed448, Indirect, PrivateDns, PrivateOid, Int(u8),
}
Expand description

Security Algorithm Numbers.

These numbers are used in various security related record types.

For the currently registered values see the IANA registration.

Variants

DeleteDs

Delete DS

This algorithm is used in RFC 8087 to signal to the parent that a certain DS record should be deleted. It is not an actual algorithm and can neither be used in zone nor transaction signing.

RsaMd5

RSA/MD5

This algorithm was described in RFC 2537 and since has been deprecated due to weaknesses of the MD5 hash algorithm by RFC 3110 which suggests to use RSA/SHA1 instead.

This algorithm may not be used for zone signing but may be used for transaction security.

Dh

Diffie-Hellman

This algorithm is described in RFC 2539 for storing Diffie-Hellman (DH) keys in DNS resource records. It can not be used for zone signing but only for transaction security.

Dsa

DSA/SHA1

This algorithm is described in RFC 2536. It may be used both for zone signing and transaction security.

RsaSha1

RSA/SHA-1

This algorithm is described in RFC 3110. It may be used both for zone signing and transaction security. It is mandatory for DNSSEC implementations.

DsaNsec3Sha1

DSA-NSEC3-SHA1

This value is an alias for Dsa for use within NSEC3 records.

RsaSha1Nsec3Sha1

RSASHA1-NSEC3-SHA1

This value is an alias for RsaSha1 for use within NSEC3 records.

RsaSha256

RSA/SHA-256

This algorithm is described in RFC 5702. It may be used for zone signing only.

RsaSha512

RSA/SHA-512

This algorithm is described in RFC 5702. It may be used for zone signing only.

EccGost

GOST R 34.10-2001

This algorithm is described in RFC 5933. It may be used for zone signing only.

EcdsaP256Sha256

ECDSA Curve P-256 with SHA-256

This algorithm is described in RFC 6605. It may be used for zone signing only.

EcdsaP384Sha384

ECDSA Curve P-384 with SHA-384

This algorithm is described in RFC 6605. It may be used for zone signing only.

Ed25519

ED25519

This algorithm is described in RFC 8080.

Ed448

ED448

This algorithm is described in RFC 8080.

Indirect

Reserved for Indirect Keys

This value is reserved by RFC 4034.

PrivateDns

A private algorithm identified by a domain name.

This value is defined in RFC 4034.

PrivateOid

A private algorithm identified by a ISO OID.

This value is defined in RFC 4034.

Int(u8)

A raw value given through its integer.

Implementations

Returns a value from its raw integer value.

Returns the raw integer value for a value.

Returns a value from a well-defined mnemonic.

Returns the mnemonic for this value if there is one.

This will also return a mnemonic if a well-defined variant is hidden in a Int variant.

Trait Implementations

Returns a copy of the value. Read more

Performs copy-assignment from source. Read more

Appends the concrete representation of the value to the target. Read more

Appends the canonical representation of the value to the target. Read more

Formats the value using the given formatter. Read more

Deserialize this value from the given Serde deserializer. Read more

Formats the value using the given formatter. Read more

Converts to this type from the input type.

Converts to this type from the input type.

Converts to this type from the input type.

The associated error which can be returned from parsing.

Parses a string s to return a value of this type. Read more

Feeds this value into the given Hasher. Read more

Feeds a slice of this type into the given Hasher. Read more

This method returns an Ordering between self and other. Read more

Compares and returns the maximum of two values. Read more

Compares and returns the minimum of two values. Read more

Restrict a value to a certain interval. Read more

Extracts a value from the beginning of parser. Read more

Skips over a value of this type at the beginning of parser. Read more

This method tests for self and other values to be equal, and is used by ==. Read more

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason. Read more

This method tests for self and other values to be equal, and is used by ==. Read more

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason. Read more

This method tests for self and other values to be equal, and is used by ==. Read more

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason. Read more

This method returns an ordering between self and other values if one exists. Read more

This method tests less than (for self and other) and is used by the < operator. Read more

This method tests less than or equal to (for self and other) and is used by the <= operator. Read more

This method tests greater than (for self and other) and is used by the > operator. Read more

This method tests greater than or equal to (for self and other) and is used by the >= operator. Read more

This method returns an ordering between self and other values if one exists. Read more

This method tests less than (for self and other) and is used by the < operator. Read more

This method tests less than or equal to (for self and other) and is used by the <= operator. Read more

This method tests greater than (for self and other) and is used by the > operator. Read more

This method tests greater than or equal to (for self and other) and is used by the >= operator. Read more

This method returns an ordering between self and other values if one exists. Read more

This method tests less than (for self and other) and is used by the < operator. Read more

This method tests less than or equal to (for self and other) and is used by the <= operator. Read more

This method tests greater than (for self and other) and is used by the > operator. Read more

This method tests greater than or equal to (for self and other) and is used by the >= operator. Read more

Available on crate feature master only.

Scans a value from a master file.

Serialize this value into the given Serde serializer. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Performs the conversion.

The resulting type after obtaining ownership.

Creates owned data from borrowed data, usually by cloning. Read more

Uses borrowed data to replace owned data, usually by cloning. Read more

Converts the given value to a String. Read more

The type returned in the event of a conversion error.

Performs the conversion.

The type returned in the event of a conversion error.

Performs the conversion.