From c5a6b0ab27c30e3da3ab2262ee1cd9eabd564916 Mon Sep 17 00:00:00 2001 From: Matthieu Gallien Date: Wed, 5 Feb 2025 13:01:16 +0100 Subject: [PATCH] remove wrong conversions from or to base64 Signed-off-by: Matthieu Gallien --- src/libsync/foldermetadata.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/libsync/foldermetadata.cpp b/src/libsync/foldermetadata.cpp index 36ecd91cb..bef57f92e 100644 --- a/src/libsync/foldermetadata.cpp +++ b/src/libsync/foldermetadata.cpp @@ -161,7 +161,7 @@ void FolderMetadata::setupExistingMetadata(const QByteArray &metadata) /* TODO: does it make sense to store each certificatePem that has been successfuly verified? Is this secure? / Can the attacker use outdated certificate as an attack vector?*/ folderUser.certificatePem = folderUserObject.value(usersCertificateKey).toString().toUtf8(); - folderUser.encryptedMetadataKey = QByteArray::fromBase64(folderUserObject.value(usersEncryptedMetadataKey).toString().toUtf8()); + folderUser.encryptedMetadataKey = folderUserObject.value(usersEncryptedMetadataKey).toString().toUtf8(); _folderUsers[userId] = folderUser; } @@ -668,7 +668,7 @@ QByteArray FolderMetadata::encryptedMetadata() const QJsonObject folderUserJson{{usersUserIdKey, folderUser.userId}, {usersCertificateKey, QJsonValue::fromVariant(folderUser.certificatePem)}, - {usersEncryptedMetadataKey, QJsonValue::fromVariant(folderUser.encryptedMetadataKey.toBase64())}}; + {usersEncryptedMetadataKey, QJsonValue::fromVariant(folderUser.encryptedMetadataKey)}}; folderUsers.push_back(folderUserJson); } } -- 2.30.2