Home
last modified time | relevance | path

Searched refs:handshake (Results 1 - 9 of 9) sorted by relevance

/developtools/hdc/src/daemon/
H A Ddaemon.cpp422 bool HdcDaemon::HandDaemonAuthInit(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) in InitMod() argument
425 handshake.authType = AUTH_PUBLICKEY; in InitMod()
429 * Notice, before here is "handshake.buf = hSession->tokenRSA", but the server not use it in InitMod()
432 handshake.buf.clear(); in InitMod()
433 Base::TlvAppend(handshake.buf, TAG_AUTH_TYPE, std::to_string(AuthVerifyType::RSA_3072_SHA512)); in InitMod()
436 string bufString = SerialStruct::SerializeToString(handshake); in InitMod()
445 bool HdcDaemon::HandDaemonAuthPubkey(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) in InitMod() argument
451 if (!GetHostPubkeyInfo(handshake.buf, hostname, pubkey)) { in InitMod()
464 std::thread notifymsg([this, &handshake, channelId, sessionId = hSession->sessionId, &confirmmsg]() { in InitMod()
465 this->EchoHandshakeMsg(handshake, channelI in InitMod()
645 HandDaemonAuthSignature(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) InitMod() argument
678 HandDaemonAuth(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) InitMod() argument
715 GetServerCapability(HSession &hSession, SessionHandShake &handshake) InitMod() argument
734 DaemonSessionHandshakeInit(HSession &hSession, SessionHandShake &handshake) InitMod() argument
766 SessionHandShake handshake; InitMod() local
1086 SendAuthOkMsg(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid, string msg, string daemonAuthResult) InitMod() argument
1113 SendAuthSignMsg(SessionHandShake &handshake, uint32_t channelId, uint32_t sessionid, string pubkey, string token) InitMod() argument
1123 EchoHandshakeMsg(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid, string msg) InitMod() argument
1129 AuthRejectLowClient(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid) InitMod() argument
[all...]
H A Ddaemon.h73 bool HandDaemonAuth(HSession hSession, const uint32_t channelId, SessionHandShake &handshake);
78 void DaemonSessionHandshakeInit(HSession &hSession, SessionHandShake &handshake);
79 void GetServerCapability(HSession &hSession, SessionHandShake &handshake);
84 bool HandDaemonAuthInit(HSession hSession, const uint32_t channelId, SessionHandShake &handshake);
85 bool HandDaemonAuthPubkey(HSession hSession, const uint32_t channelId, SessionHandShake &handshake);
86 bool HandDaemonAuthSignature(HSession hSession, const uint32_t channelId, SessionHandShake &handshake);
95 void SendAuthSignMsg(SessionHandShake &handshake,
97 void SendAuthOkMsg(SessionHandShake &handshake, uint32_t channelid,
99 void AuthRejectLowClient(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid);
100 void EchoHandshakeMsg(SessionHandShake &handshake, uint32_
[all...]
/developtools/hdc/hdc_rust/src/host/
H A Dauth.rs39 let handshake = SessionHandShake {
48 send_handshake_to_daemon(&handshake, channel_id).await;
126 hdc::info!("recv handshake: {:#?}", recv);
141 let handshake = SessionHandShake {
149 send_handshake_to_daemon(&handshake, channel_id).await;
154 let handshake = SessionHandShake {
162 send_handshake_to_daemon(&handshake, channel_id).await;
225 async fn send_handshake_to_daemon(handshake: &SessionHandShake, channel_id: u32) {
226 hdc::info!("send handshake: {:#?}", handshake
[all...]
H A Dclient.rs84 if let Err(e) = client.handshake().await {
85 hdc::error!("handshake with server failed: {e:?}");
152 pub async fn handshake(&mut self) -> io::Result<()> {
157 return Err(Error::new(ErrorKind::Other, format!("handshake from_utf8 error : {err}")));
/developtools/hdc/src/host/
H A Dserver.cpp426 void HdcServer::GetDaemonAuthType(HSession hSession, SessionHandShake &handshake) in GetDaemonAuthType() argument
431 * Notice, If deamon is old version 'handshake.buf' will be 'hSession->tokenRSA', in GetDaemonAuthType()
437 if (!Base::TlvToStringMap(handshake.buf, tlvmap)) { in GetDaemonAuthType()
450 bool HdcServer::HandServerAuth(HSession hSession, SessionHandShake &handshake) in HandServerAuth() argument
453 switch (handshake.authType) { in HandServerAuth()
456 GetDaemonAuthType(hSession, handshake); in HandServerAuth()
457 if (!HdcAuth::GetPublicKeyinfo(handshake.buf)) { in HandServerAuth()
461 handshake.authType = AUTH_PUBLICKEY; in HandServerAuth()
462 bufString = SerialStruct::SerializeToString(handshake); in HandServerAuth()
471 if (!HdcAuth::RsaSignAndBase64(handshake in HandServerAuth()
488 UpdateHdiInfo(Hdc::HdcSessionBase::SessionHandShake &handshake, const string &connectKey) UpdateHdiInfo() argument
532 Hdc::HdcSessionBase::SessionHandShake handshake; ServerSessionHandshake() local
[all...]
H A Dserver.h59 bool HandServerAuth(HSession hSession, SessionHandShake &handshake);
60 void GetDaemonAuthType(HSession hSession, SessionHandShake &handshake);
62 void UpdateHdiInfo(Hdc::HdcSessionBase::SessionHandShake &handshake, const string &connectKey);
/developtools/hdc/src/common/
H A Dchannel.cpp43 struct ChannelHandShake handshake = {}; in GetChannelHandshake() local
44 if (strcpy_s(handshake.banner, sizeof(handshake.banner), HANDSHAKE_MESSAGE.c_str()) != EOK) { in GetChannelHandshake()
47 if (strcpy_s(handshake.connectKey, sizeof(handshake.connectKey), connectKey.c_str()) != EOK) { in GetChannelHandshake()
50 ret.insert(ret.begin(), (uint8_t *)&handshake, (uint8_t *)&handshake + sizeof(ChannelHandShake)); in GetChannelHandshake()
H A Dsession.cpp1063 void HdcSessionBase::WorkThreadInitSession(HSession hSession, SessionHandShake &handshake) in WorkThreadInitSession() argument
1065 handshake.banner = HANDSHAKE_MESSAGE; in WorkThreadInitSession()
1066 handshake.sessionId = hSession->sessionId; in WorkThreadInitSession()
1067 handshake.connectKey = hSession->connectKey; in WorkThreadInitSession()
1069 handshake.version = Base::GetVersion() + HDC_MSG_HASH; in WorkThreadInitSession()
1070 WRITE_LOG(LOG_INFO, "set version = %s", handshake.version.c_str()); in WorkThreadInitSession()
1072 handshake.authType = AUTH_NONE; in WorkThreadInitSession()
1074 Base::TlvAppend(handshake.buf, TAG_AUTH_TYPE, std::to_string(AuthVerifyType::RSA_3072_SHA512)); in WorkThreadInitSession()
1111 // session handshake step1 in WorkThreadStartSession()
1112 SessionHandShake handshake in WorkThreadStartSession() local
[all...]
H A Dsession.h208 void WorkThreadInitSession(HSession hSession, SessionHandShake &handshake);

Completed in 9 milliseconds