Struct csrf::AesGcmCsrfProtection
[−]
[src]
pub struct AesGcmCsrfProtection { /* fields omitted */ }
Uses AES-GCM to provide signed, encrypted CSRF tokens and cookies.
Methods
impl AesGcmCsrfProtection
[src]
fn from_key(aead_key: [u8; 32]) -> Self
[src]
Given an AES256 key, return an AesGcmCsrfProtection
instance.
Trait Implementations
impl CsrfProtection for AesGcmCsrfProtection
[src]
[src]
Given a nonce and a time to live (TTL), create a cookie to send to the end user.
fn generate_token(&self, token_value: &[u8; 64]) -> Result<CsrfToken, CsrfError>
[src]
Given a nonce, create a token to send to the end user.
[src]
Given a decoded byte array, deserialize, decrypt, and verify the cookie.
fn parse_token(&self, token: &[u8]) -> Result<UnencryptedCsrfToken, CsrfError>
[src]
Given a decoded byte array, deserialize, decrypt, and verify the token.
fn verify_token_pair(
&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie
) -> bool
[src]
&self,
token: &UnencryptedCsrfToken,
cookie: &UnencryptedCsrfCookie
) -> bool
Given a token pair that has been parsed, decoded, decrypted, and verified, return whether or not the token matches the cookie and they have not expired. Read more
fn random_bytes(&self, buf: &mut [u8]) -> Result<(), CsrfError>
[src]
Given a buffer, fill it with random bytes or error if this is not possible.
fn generate_token_pair(
&self,
previous_token_value: Option<&[u8; 64]>,
ttl_seconds: i64
) -> Result<(CsrfToken, CsrfCookie), CsrfError>
[src]
&self,
previous_token_value: Option<&[u8; 64]>,
ttl_seconds: i64
) -> Result<(CsrfToken, CsrfCookie), CsrfError>
Given an optional previous token and a TTL, generate a matching token and cookie pair.