From: Matthieu Gallien Date: Wed, 5 Feb 2025 12:01:16 +0000 (+0100) Subject: remove wrong conversions from or to base64 X-Git-Tag: archive/raspbian/3.16.7-1_deb13u1+rpi1~1^2~12^2~2^2~87^2~2 X-Git-Url: https://dgit.raspbian.org/%22http:/www.example.com/cgi/%22https:/www.github.com/%22bookmarks:///%22http:/www.example.com/cgi/%22https:/www.github.com/%22bookmarks:/?a=commitdiff_plain;h=c5a6b0ab27c30e3da3ab2262ee1cd9eabd564916;p=nextcloud-desktop.git remove wrong conversions from or to base64 Signed-off-by: Matthieu Gallien --- diff --git a/src/libsync/foldermetadata.cpp b/src/libsync/foldermetadata.cpp index 36ecd91cb..bef57f92e 100644 --- a/src/libsync/foldermetadata.cpp +++ b/src/libsync/foldermetadata.cpp @@ -161,7 +161,7 @@ void FolderMetadata::setupExistingMetadata(const QByteArray &metadata) /* TODO: does it make sense to store each certificatePem that has been successfuly verified? Is this secure? / Can the attacker use outdated certificate as an attack vector?*/ folderUser.certificatePem = folderUserObject.value(usersCertificateKey).toString().toUtf8(); - folderUser.encryptedMetadataKey = QByteArray::fromBase64(folderUserObject.value(usersEncryptedMetadataKey).toString().toUtf8()); + folderUser.encryptedMetadataKey = folderUserObject.value(usersEncryptedMetadataKey).toString().toUtf8(); _folderUsers[userId] = folderUser; } @@ -668,7 +668,7 @@ QByteArray FolderMetadata::encryptedMetadata() const QJsonObject folderUserJson{{usersUserIdKey, folderUser.userId}, {usersCertificateKey, QJsonValue::fromVariant(folderUser.certificatePem)}, - {usersEncryptedMetadataKey, QJsonValue::fromVariant(folderUser.encryptedMetadataKey.toBase64())}}; + {usersEncryptedMetadataKey, QJsonValue::fromVariant(folderUser.encryptedMetadataKey)}}; folderUsers.push_back(folderUserJson); } }