#[non_exhaustive]
pub enum SymmetricAlgorithm {
Show 14 variants Unencrypted, IDEA, TripleDES, CAST5, Blowfish, AES128, AES192, AES256, Twofish, Camellia128, Camellia192, Camellia256, Private(u8), Unknown(u8),
}
Expand description

The symmetric-key algorithms as defined in Section 9.2 of RFC 4880.

The values can be converted into and from their corresponding values of the serialized format.

Use SymmetricAlgorithm::from to translate a numeric value to a symbolic one.

Note: This enum cannot be exhaustively matched to allow future extensions.

Examples

Use SymmetricAlgorithm to set the preferred symmetric algorithms on a signature:

use sequoia_openpgp as openpgp;
use openpgp::packet::signature::SignatureBuilder;
use openpgp::types::{HashAlgorithm, SymmetricAlgorithm, SignatureType};

let mut builder = SignatureBuilder::new(SignatureType::DirectKey)
    .set_hash_algo(HashAlgorithm::SHA512)
    .set_preferred_symmetric_algorithms(vec![
        SymmetricAlgorithm::AES256,
    ])?;

Variants (Non-exhaustive)§

This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
§

Unencrypted

Null encryption.

§

IDEA

IDEA block cipher.

§

TripleDES

3-DES in EDE configuration.

§

CAST5

CAST5/CAST128 block cipher.

§

Blowfish

Schneier et.al. Blowfish block cipher.

§

AES128

10-round AES.

§

AES192

12-round AES.

§

AES256

14-round AES.

§

Twofish

Twofish block cipher.

§

Camellia128

18 rounds of NESSIEs Camellia.

§

Camellia192

24 rounds of NESSIEs Camellia w/192 bit keys.

§

Camellia256

24 rounds of NESSIEs Camellia w/256 bit keys.

§

Private(u8)

Private algorithm identifier.

§

Unknown(u8)

Unknown algorithm identifier.

Implementations§

Returns whether this algorithm is supported by the crypto backend.

All backends support all the AES variants.

Examples
use sequoia_openpgp as openpgp;
use openpgp::types::SymmetricAlgorithm;

assert!(SymmetricAlgorithm::AES256.is_supported());
assert!(SymmetricAlgorithm::TripleDES.is_supported());

assert!(!SymmetricAlgorithm::IDEA.is_supported());
assert!(!SymmetricAlgorithm::Unencrypted.is_supported());
assert!(!SymmetricAlgorithm::Private(101).is_supported());

Length of a key for this algorithm in bytes.

Fails if Sequoia does not support this algorithm.

Length of a block for this algorithm in bytes.

Fails if Sequoia does not support this algorithm.

Returns an iterator over all valid variants.

Returns an iterator over all known variants. This does not include the SymmetricAlgorithm::Unencrypted, SymmetricAlgorithm::Private, or SymmetricAlgorithm::Unknown variants.

Trait Implementations§

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more
Formats the value using the given formatter. Read more
Returns the “default value” for a type. Read more

Formats the symmetric algorithm name.

There are two ways the symmetric algorithm name can be formatted. By default the short name is used. The alternate format uses the full algorithm name.

Examples

use sequoia_openpgp as openpgp;
use openpgp::types::SymmetricAlgorithm;

// default, short format
assert_eq!("AES-128", format!("{}", SymmetricAlgorithm::AES128));

// alternate, long format
assert_eq!("AES with 128-bit key", format!("{:#}", SymmetricAlgorithm::AES128));
Formats the value using the given formatter. Read more
Converts to this type from the input type.
Converts to this type from the input type.
Feeds this value into the given Hasher. Read more
Feeds a slice of this type into the given Hasher. Read more
This method returns an Ordering between self and other. Read more
Compares and returns the maximum of two values. Read more
Compares and returns the minimum of two values. Read more
Restrict a value to a certain interval. Read more
This method tests for self and other values to be equal, and is used by ==.
This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
This method returns an ordering between self and other values if one exists. Read more
This method tests less than (for self and other) and is used by the < operator. Read more
This method tests less than or equal to (for self and other) and is used by the <= operator. Read more
This method tests greater than (for self and other) and is used by the > operator. Read more
This method tests greater than or equal to (for self and other) and is used by the >= operator. Read more

Auto Trait Implementations§

Blanket Implementations§

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Should always be Self
The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
Converts the given value to a String. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.