#[non_exhaustive]
pub enum PublicKey {
    RSA {
        e: MPI,
        n: MPI,
    },
    DSA {
        p: MPI,
        q: MPI,
        g: MPI,
        y: MPI,
    },
    ElGamal {
        p: MPI,
        g: MPI,
        y: MPI,
    },
    EdDSA {
        curve: Curve,
        q: MPI,
    },
    ECDSA {
        curve: Curve,
        q: MPI,
    },
    ECDH {
        curve: Curve,
        q: MPI,
        hash: HashAlgorithm,
        sym: SymmetricAlgorithm,
    },
    Unknown {
        mpis: Box<[MPI]>,
        rest: Box<[u8]>,
    },
}
Expand description

A public key.

Provides a typed and structured way of storing multiple MPIs (and the occasional elliptic curve) in Key packets.

Note: This enum cannot be exhaustively matched to allow future extensions.

Variants (Non-exhaustive)§

This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
§

RSA

Fields

§e: MPI

Public exponent

§n: MPI

Public modulo N = pq.

RSA public key.

§

DSA

Fields

§p: MPI

Prime of the ring Zp.

§q: MPI

Order of g in Zp.

§g: MPI

Public generator of Zp.

§y: MPI

Public key g^x mod p.

NIST DSA public key.

§

ElGamal

Fields

§p: MPI

Prime of the ring Zp.

§g: MPI

Generator of Zp.

§y: MPI

Public key g^x mod p.

ElGamal public key.

§

EdDSA

Fields

§curve: Curve

Curve we’re using. Must be curve 25519.

§q: MPI

Public point.

DJB’s “Twisted” Edwards curve DSA public key.

§

ECDSA

Fields

§curve: Curve

Curve we’re using.

§q: MPI

Public point.

NIST’s Elliptic Curve DSA public key.

§

ECDH

Fields

§curve: Curve

Curve we’re using.

§q: MPI

Public point.

§hash: HashAlgorithm

Algorithm used to derive the Key Encapsulation Key.

§sym: SymmetricAlgorithm

Algorithm used to encapsulate the session key.

Elliptic Curve Diffie-Hellman public key.

§

Unknown

Fields

§mpis: Box<[MPI]>

The successfully parsed MPIs.

§rest: Box<[u8]>

Any data that failed to parse.

Unknown number of MPIs for an unknown algorithm.

Implementations§

Returns the length of the public key in bits.

For finite field crypto this returns the size of the field we operate in, for ECC it returns Curve::bits().

Note: This information is useless and should not be used to gauge the security of a particular key. This function exists only because some legacy PGP application like HKP need it.

Returns None for unknown keys and curves.

Returns, if known, the public-key algorithm for this public key.

Parses a set of OpenPGP MPIs representing a public key.

See Section 3.2 of RFC 4880 for details.

Trait Implementations§

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more
Formats the value using the given formatter. Read more
Feeds this value into the given Hasher. Read more
Feeds a slice of this type into the given Hasher. Read more
Updates the given hash with this object.
Writes a serialized version of the object to o.
Exports a serialized version of the object to o. Read more
Computes the maximal length of the serialized representation. Read more
Serializes into the given buffer. Read more
Serializes the packet to a vector.
Exports into the given buffer. Read more
Exports to a vector. Read more
This method returns an Ordering between self and other. Read more
Compares and returns the maximum of two values. Read more
Compares and returns the minimum of two values. Read more
Restrict a value to a certain interval. Read more
This method tests for self and other values to be equal, and is used by ==.
This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
This method returns an ordering between self and other values if one exists. Read more
This method tests less than (for self and other) and is used by the < operator. Read more
This method tests less than or equal to (for self and other) and is used by the <= operator. Read more
This method tests greater than (for self and other) and is used by the > operator. Read more
This method tests greater than or equal to (for self and other) and is used by the >= operator. Read more

Auto Trait Implementations§

Blanket Implementations§

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Should always be Self
The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.