#[non_exhaustive]pub enum SubpacketTag {
Show 32 variants
SignatureCreationTime,
SignatureExpirationTime,
ExportableCertification,
TrustSignature,
RegularExpression,
Revocable,
KeyExpirationTime,
PlaceholderForBackwardCompatibility,
PreferredSymmetricAlgorithms,
RevocationKey,
Issuer,
NotationData,
PreferredHashAlgorithms,
PreferredCompressionAlgorithms,
KeyServerPreferences,
PreferredKeyServer,
PrimaryUserID,
PolicyURI,
KeyFlags,
SignersUserID,
ReasonForRevocation,
Features,
SignatureTarget,
EmbeddedSignature,
IssuerFingerprint,
PreferredAEADAlgorithms,
IntendedRecipient,
ApprovedCertifications,
PreferredAEADCiphersuites,
Reserved(u8),
Private(u8),
Unknown(u8),
}
Expand description
The subpacket types.
The SubpacketTag
enum holds a Subpacket
’s identifier, the
so-called tag.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
SignatureCreationTime
The time the signature was made.
See Section 5.2.3.11 of RFC 9580 for details.
SignatureExpirationTime
The validity period of the signature.
The validity is relative to the time stored in the signature’s Signature Creation Time subpacket.
See Section 5.2.3.18 of RFC 9580 for details.
ExportableCertification
Whether a signature should be published.
See Section 5.2.3.19 of RFC 9580 for details.
TrustSignature
Signer asserts that the key is not only valid but also trustworthy at the specified level.
See Section 5.2.3.21 of RFC 9580 for details.
RegularExpression
Used in conjunction with Trust Signature packets (of level > 0) to limit the scope of trust that is extended.
See Section 5.2.3.22 of RFC 9580 for details.
Revocable
Whether a signature can later be revoked.
See Section 5.2.3.20 of RFC 9580 for details.
KeyExpirationTime
The validity period of the key.
The validity period is relative to the key’s (not the signature’s) creation time.
See Section 5.2.3.13 of RFC 9580 for details.
PlaceholderForBackwardCompatibility
Deprecated
PreferredSymmetricAlgorithms
The Symmetric algorithms that the certificate holder prefers.
See Section 5.2.3.14 of RFC 9580 for details.
RevocationKey
Authorizes the specified key to issue revocation signatures for this certificate.
See Section 5.2.3.23 of RFC 9580 for details.
Issuer
The OpenPGP Key ID of the key issuing the signature.
See Section 5.2.3.12 of RFC 9580 for details.
NotationData
A “notation” on the signature.
See Section 5.2.3.24 of RFC 9580 for details.
PreferredHashAlgorithms
The Hash algorithms that the certificate holder prefers.
See Section 5.2.3.16 of RFC 9580 for details.
PreferredCompressionAlgorithms
The compression algorithms that the certificate holder prefers.
See Section 5.2.3.17 of RFC 9580 for details.
KeyServerPreferences
A list of flags that indicate preferences that the certificate holder has about how the key is handled by a key server.
See Section 5.2.3.25 of RFC 9580 for details.
PreferredKeyServer
The URI of a key server where the certificate holder keeps their certificate up to date.
See Section 5.2.3.26 of RFC 9580 for details.
PrimaryUserID
A flag in a User ID’s self-signature that states whether this User ID is the primary User ID for this certificate.
See Section 5.2.3.27 of RFC 9580 for details.
PolicyURI
The URI of a document that describes the policy under which the signature was issued.
See Section 5.2.3.28 of RFC 9580 for details.
KeyFlags
A list of flags that hold information about a key.
See Section 5.2.3.29 of RFC 9580 for details.
SignersUserID
The User ID that is responsible for the signature.
See Section 5.2.3.30 of RFC 9580 for details.
ReasonForRevocation
The reason for a revocation, used in key revocations and certification revocation signatures.
See Section 5.2.3.31 of RFC 9580 for details.
Features
The OpenPGP features a user’s implementation supports.
See Section 5.2.3.32 of RFC 9580 for details.
SignatureTarget
A signature to which this signature refers.
See Section 5.2.3.33 of RFC 9580 for details.
EmbeddedSignature
A complete Signature packet body.
This is used to store a backsig in a subkey binding signature.
See Section 5.2.3.34 of RFC 9580 for details.
IssuerFingerprint
The Fingerprint of the key that issued the signature.
See Section 5.2.3.35 of RFC 9580 for details.
PreferredAEADAlgorithms
Reserved (was: AEAD algorithms that the certificate holder prefers).
IntendedRecipient
Who the signed message was intended for.
See Section 5.2.3.36 of RFC 9580 for details.
ApprovedCertifications
The Approved Certifications subpacket (experimental).
Allows the certificate holder to attest to third party certifications, allowing them to be distributed with the certificate. This can be used to address certificate flooding concerns.
See Section 2.2 of draft-dkg-openpgp-1pa3pc-02 for details.
PreferredAEADCiphersuites
The AEAD Ciphersuites that the certificate holder prefers.
A series of paired algorithm identifiers indicating how the keyholder prefers to receive version 2 Symmetrically Encrypted Integrity Protected Data. Each pair of octets indicates a combination of a symmetric cipher and an AEAD mode that the key holder prefers to use.
It is assumed that only the combinations of algorithms listed are supported by the recipient’s software, with the exception of the mandatory-to-implement combination of AES-128 and OCB. If AES-128 and OCB are not found in the subpacket, it is implicitly listed at the end.
See Section 5.2.3.15 of RFC 9580 for details.
Reserved(u8)
Reserved subpacket tag.
Private(u8)
Private subpacket tag.
Unknown(u8)
Unknown subpacket tag.
Implementations§
Source§impl SubpacketTag
impl SubpacketTag
Sourcepub fn variants() -> impl Iterator<Item = Self>
pub fn variants() -> impl Iterator<Item = Self>
Returns an iterator over all valid variants.
Returns an iterator over all known variants. This does not
include the SubpacketTag::Reserved
,
SubpacketTag::Private
, or SubpacketTag::Unknown
variants.
Trait Implementations§
Source§impl Clone for SubpacketTag
impl Clone for SubpacketTag
Source§fn clone(&self) -> SubpacketTag
fn clone(&self) -> SubpacketTag
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more