@@ -757,12 +757,12 @@ std::optional<QByteArray> decryptStringAsymmetric(ENGINE *sslEngine,
757
757
return {};
758
758
}
759
759
760
- if (pad_mode != RSA_PKCS1_PADDING && EVP_PKEY_CTX_set_rsa_oaep_md (ctx, EVP_sha1 ()) <= 0 ) {
760
+ if (pad_mode != RSA_PKCS1_PADDING && EVP_PKEY_CTX_set_rsa_oaep_md (ctx, EVP_sha256 ()) <= 0 ) {
761
761
qCInfo (lcCseDecryption ()) << " Error setting OAEP SHA 256" << handleErrors ();
762
762
return {};
763
763
}
764
764
765
- if (pad_mode != RSA_PKCS1_PADDING && EVP_PKEY_CTX_set_rsa_mgf1_md (ctx, EVP_sha1 ()) <= 0 ) {
765
+ if (pad_mode != RSA_PKCS1_PADDING && EVP_PKEY_CTX_set_rsa_mgf1_md (ctx, EVP_sha256 ()) <= 0 ) {
766
766
qCInfo (lcCseDecryption ()) << " Error setting MGF1 padding" << handleErrors ();
767
767
return {};
768
768
}
@@ -902,7 +902,11 @@ CertificateInformation ClientSideEncryption::getCertificateInformationByFingerpr
902
902
903
903
int ClientSideEncryption::paddingMode () const
904
904
{
905
- return RSA_PKCS1_PADDING;
905
+ if (useTokenBasedEncryption ()) {
906
+ return RSA_PKCS1_PADDING;
907
+ } else {
908
+ return RSA_PKCS1_OAEP_PADDING;
909
+ }
906
910
}
907
911
908
912
CertificateInformation ClientSideEncryption::getTokenCertificateByFingerprint (const QByteArray &expectedFingerprint) const
@@ -2714,7 +2718,7 @@ bool EncryptionHelper::dataDecryption(const QByteArray &key, const QByteArray &i
2714
2718
}
2715
2719
2716
2720
if (1 != EVP_DecryptFinal_ex (ctx, unsignedData (out), &len)) {
2717
- qCInfo (lcCse ()) << " Could finalize decryption" ;
2721
+ qCInfo (lcCse ()) << " Could not finalize decryption" ;
2718
2722
return false ;
2719
2723
}
2720
2724
outputBuffer.write (out, len);
0 commit comments