});
}
).then([this] {
- ceph_assert(!session_stream_handlers.rx);
return read_exactly(rx_frame_asm.get_epilogue_onwire_len());
}).then([this] (auto bl) {
logger().trace("{} RECV({}) frame epilogue", conn, bl.size());
abort_in_fault();
}
auth_meta->con_mode = auth_done.con_mode();
- // TODO
- ceph_assert(!auth_meta->is_mode_secure());
- session_stream_handlers = { nullptr, nullptr };
+ session_stream_handlers = ceph::crypto::onwire::rxtx_t::create_handler_pair(
+ nullptr, *auth_meta, tx_frame_asm.get_is_rev1(), false);
return finish_auth();
});
default: {
ceph_con_mode_name(auth_meta->con_mode), reply.length());
return write_frame(auth_done).then([this] {
ceph_assert(auth_meta);
- // TODO
- ceph_assert(!auth_meta->is_mode_secure());
- session_stream_handlers = { nullptr, nullptr };
+ session_stream_handlers = ceph::crypto::onwire::rxtx_t::create_handler_pair(
+ nullptr, *auth_meta, tx_frame_asm.get_is_rev1(), true);
return finish_auth();
});
}
}
~AES128GCM_OnWireTxHandler() override {
- ::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce));
- ::ceph::crypto::zeroize_for_security(&initial_nonce, sizeof(initial_nonce));
+ ::TOPNSPC::crypto::zeroize_for_security(&nonce, sizeof(nonce));
+ ::TOPNSPC::crypto::zeroize_for_security(&initial_nonce, sizeof(initial_nonce));
}
void reset_tx_handler(const uint32_t* first, const uint32_t* last) override;
}
~AES128GCM_OnWireRxHandler() override {
- ::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce));
+ ::TOPNSPC::crypto::zeroize_for_security(&nonce, sizeof(nonce));
}
std::uint32_t get_extra_size_at_final() override {