From eea58228eabec225cfec49932ae0c7b0d79fdc7f Mon Sep 17 00:00:00 2001 From: Thorsten Behrens Date: Thu, 11 Jan 2018 23:35:54 +0100 Subject: tdf#114550 use 32 bit random session key for gpg encryption Otherwise we'd need to pointlessly spread it to 32 bit down the road for AES. Change-Id: I7303be71fd855aa454d07fcae04d7f42e3c9cd9c Reviewed-on: https://gerrit.libreoffice.org/47781 Reviewed-by: Thorsten Behrens Tested-by: Thorsten Behrens --- comphelper/source/misc/storagehelper.cxx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'comphelper') diff --git a/comphelper/source/misc/storagehelper.cxx b/comphelper/source/misc/storagehelper.cxx index dd52b7f6181a..c312b397974f 100644 --- a/comphelper/source/misc/storagehelper.cxx +++ b/comphelper/source/misc/storagehelper.cxx @@ -448,8 +448,8 @@ uno::Sequence< beans::NamedValue > OStorageHelper::CreateGpgPackageEncryptionDat rtlRandomPool aRandomPool = rtl_random_createPool(); - // get 16 random chars out of it - uno::Sequence < sal_Int8 > aVector(16); + // get 32 random chars out of it + uno::Sequence < sal_Int8 > aVector(32); rtl_random_getBytes( aRandomPool, aVector.getArray(), aVector.getLength() ); rtl_random_destroyPool(aRandomPool); -- cgit