H A D | daemon.cpp | 422 bool HdcDaemon::HandDaemonAuthInit(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) in InitMod() argument 425 handshake.authType = AUTH_PUBLICKEY; in InitMod() 429 * Notice, before here is "handshake.buf = hSession->tokenRSA", but the server not use it in InitMod() 432 handshake.buf.clear(); in InitMod() 433 Base::TlvAppend(handshake.buf, TAG_AUTH_TYPE, std::to_string(AuthVerifyType::RSA_3072_SHA512)); in InitMod() 436 string bufString = SerialStruct::SerializeToString(handshake); in InitMod() 445 bool HdcDaemon::HandDaemonAuthPubkey(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) in InitMod() argument 451 if (!GetHostPubkeyInfo(handshake.buf, hostname, pubkey)) { in InitMod() 464 std::thread notifymsg([this, &handshake, channelId, sessionId = hSession->sessionId, &confirmmsg]() { in InitMod() 465 this->EchoHandshakeMsg(handshake, channelI in InitMod() 645 HandDaemonAuthSignature(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) InitMod() argument 678 HandDaemonAuth(HSession hSession, const uint32_t channelId, SessionHandShake &handshake) InitMod() argument 715 GetServerCapability(HSession &hSession, SessionHandShake &handshake) InitMod() argument 734 DaemonSessionHandshakeInit(HSession &hSession, SessionHandShake &handshake) InitMod() argument 766 SessionHandShake handshake; InitMod() local 1086 SendAuthOkMsg(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid, string msg, string daemonAuthResult) InitMod() argument 1113 SendAuthSignMsg(SessionHandShake &handshake, uint32_t channelId, uint32_t sessionid, string pubkey, string token) InitMod() argument 1123 EchoHandshakeMsg(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid, string msg) InitMod() argument 1129 AuthRejectLowClient(SessionHandShake &handshake, uint32_t channelid, uint32_t sessionid) InitMod() argument [all...] |