Lines Matching defs:token
497 * token is the source data same of server for signing
499 bool HdcDaemon::RsaSignVerify(HSession hSession, EVP_PKEY_CTX *ctx, const string &tokenSignBase64, const string &token)
504 // Get the real token sign
508 WRITE_LOG(LOG_FATAL, "base64 decode token sign failed for session %u", hSession->sessionId);
511 SHA512(reinterpret_cast<const unsigned char *>(token.c_str()), token.size(), tokenSha512);
525 bool HdcDaemon::AuthVerifyRsaSign(HSession hSession, const string &tokenSign, const string &token, RSA *rsa)
564 signRet = RsaSignVerify(hSession, ctx, tokenSign, token);
576 bool HdcDaemon::AuthVerify(HSession hSession, const string &encryptToken, const string &token, const string &pubkey)
600 verifyResult = AuthVerifyRsaSign(hSession, encryptToken, token, rsa);
602 verifyResult = AuthVerifyRsa(hSession, encryptToken, token, rsa);
616 bool HdcDaemon::AuthVerifyRsa(HSession hSession, const string &encryptToken, const string &token, RSA *rsa)
638 if (sdecryptToken != token) {
654 string token = GetSessionAuthToken(hSession->sessionId);
656 if (!AuthVerify(hSession, handshake.buf, token, pubkey)) {
997 void HdcDaemon::InitSessionAuthInfo(uint32_t sessionid, string token)
1001 token,
1015 info.token = "";
1064 return info.token;
1114 uint32_t channelId, uint32_t sessionid, string pubkey, string token)
1118 handshake.buf = token;