Trait csrf::CsrfProtection
[−]
[src]
pub trait CsrfProtection: Send + Sync { fn from_password(password: &[u8]) -> Self; fn verify_token_pair(&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie)
-> bool; fn generate_cookie(&self,
token: &[u8],
ttl_seconds: i64)
-> Result<CsrfCookie, CsrfError>; fn generate_token(&self, token: &[u8]) -> Result<CsrfToken, CsrfError>; fn parse_cookie(&self,
cookie: &[u8])
-> Result<UnencryptedCsrfCookie, CsrfError>; fn parse_token(&self,
token: &[u8])
-> Result<UnencryptedCsrfToken, CsrfError>; fn rng(&self) -> &SystemRandom; fn random_bytes(&self, buf: &mut [u8]) -> Result<(), CsrfError> { ... } fn generate_token_pair(&self,
previous_token: Option<Vec<u8>>,
ttl_seconds: i64)
-> Result<(CsrfToken, CsrfCookie), CsrfError> { ... } }
Required Methods
fn from_password(password: &[u8]) -> Self
Use a key derivation function (KDF) to generate key material.
Panics
This function may panic if the underlying crypto library fails catastrophically.
fn verify_token_pair(&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie)
-> bool
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie)
-> bool
fn generate_token(&self, token: &[u8]) -> Result<CsrfToken, CsrfError>
fn parse_token(&self, token: &[u8]) -> Result<UnencryptedCsrfToken, CsrfError>
fn rng(&self) -> &SystemRandom
Provided Methods
fn random_bytes(&self, buf: &mut [u8]) -> Result<(), CsrfError>
fn generate_token_pair(&self,
previous_token: Option<Vec<u8>>,
ttl_seconds: i64)
-> Result<(CsrfToken, CsrfCookie), CsrfError>
previous_token: Option<Vec<u8>>,
ttl_seconds: i64)
-> Result<(CsrfToken, CsrfCookie), CsrfError>
Implementors
impl CsrfProtection for AesGcmCsrfProtection