Kaydet (Commit) eea58228 authored tarafından Thorsten Behrens's avatar Thorsten Behrens

tdf#114550 use 32 bit random session key for gpg encryption

Otherwise we'd need to pointlessly spread it to 32 bit down the
road for AES.

Change-Id: I7303be71fd855aa454d07fcae04d7f42e3c9cd9c
Reviewed-on: https://gerrit.libreoffice.org/47781Reviewed-by: 's avatarThorsten Behrens <Thorsten.Behrens@CIB.de>
Tested-by: 's avatarThorsten Behrens <Thorsten.Behrens@CIB.de>
üst ca6f3d7a
...@@ -448,8 +448,8 @@ uno::Sequence< beans::NamedValue > OStorageHelper::CreateGpgPackageEncryptionDat ...@@ -448,8 +448,8 @@ uno::Sequence< beans::NamedValue > OStorageHelper::CreateGpgPackageEncryptionDat
rtlRandomPool aRandomPool = rtl_random_createPool(); rtlRandomPool aRandomPool = rtl_random_createPool();
// get 16 random chars out of it // get 32 random chars out of it
uno::Sequence < sal_Int8 > aVector(16); uno::Sequence < sal_Int8 > aVector(32);
rtl_random_getBytes( aRandomPool, aVector.getArray(), aVector.getLength() ); rtl_random_getBytes( aRandomPool, aVector.getArray(), aVector.getLength() );
rtl_random_destroyPool(aRandomPool); rtl_random_destroyPool(aRandomPool);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment