Trait csrf::CsrfProtection
[−]
[src]
pub trait CsrfProtection: Send + Sync { fn from_password(password: &[u8]) -> Self; fn generate_cookie(
&self,
token_value: &[u8; 64],
ttl_seconds: i64
) -> Result<CsrfCookie, CsrfError>; fn generate_token(
&self,
token_value: &[u8; 64]
) -> Result<CsrfToken, CsrfError>; fn parse_cookie(
&self,
cookie: &[u8]
) -> Result<UnencryptedCsrfCookie, CsrfError>; fn parse_token(
&self,
token: &[u8]
) -> Result<UnencryptedCsrfToken, CsrfError>; fn rng(&self) -> &SystemRandom; fn verify_token_pair(
&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie
) -> bool { ... } fn random_bytes(&self, buf: &mut [u8]) -> Result<(), CsrfError> { ... } fn generate_token_pair(
&self,
previous_token_value: Option<&[u8; 64]>,
ttl_seconds: i64
) -> Result<(CsrfToken, CsrfCookie), CsrfError> { ... } }
The base trait that allows a developer to add CSRF protection to an application.
Required Methods
fn from_password(password: &[u8]) -> Self
Use a key derivation function (KDF) to generate key material.
Panics
This function may panic if the underlying crypto library fails catastrophically.
Given a nonce and a time to live (TTL), create a cookie to send to the end user.
fn generate_token(&self, token_value: &[u8; 64]) -> Result<CsrfToken, CsrfError>
Given a nonce, create a token to send to the end user.
Given a decoded byte array, deserialize, decrypt, and verify the cookie.
fn parse_token(&self, token: &[u8]) -> Result<UnencryptedCsrfToken, CsrfError>
Given a decoded byte array, deserialize, decrypt, and verify the token.
fn rng(&self) -> &SystemRandom
Provide a random number generator for other functions.
Provided Methods
fn verify_token_pair(
&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie
) -> bool
&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie
) -> bool
Given a token pair that has been parsed, decoded, decrypted, and verified, return whether or not the token matches the cookie and they have not expired.
fn random_bytes(&self, buf: &mut [u8]) -> Result<(), CsrfError>
Given a buffer, fill it with random bytes or error if this is not possible.
fn generate_token_pair(
&self,
previous_token_value: Option<&[u8; 64]>,
ttl_seconds: i64
) -> Result<(CsrfToken, CsrfCookie), CsrfError>
&self,
previous_token_value: Option<&[u8; 64]>,
ttl_seconds: i64
) -> Result<(CsrfToken, CsrfCookie), CsrfError>
Given an optional previous token and a TTL, generate a matching token and cookie pair.
Implementors
impl CsrfProtection for HmacCsrfProtection
impl CsrfProtection for AesGcmCsrfProtection
impl CsrfProtection for ChaCha20Poly1305CsrfProtection