summaryrefslogtreecommitdiff
path: root/officecfg
diff options
context:
space:
mode:
authorMichael Stahl <mstahl@redhat.com>2018-01-11 15:55:25 +0100
committerMichael Stahl <mstahl@redhat.com>2018-01-12 23:31:43 +0100
commit0b7c3b7d9fa71f59eed75c3e80e5e12245c5e1c5 (patch)
tree2f29a16b67ce118c5eb7ab3579c469e2cf0915cf /officecfg
parent42e90b44ee9de1c5e0b324e492949ff6f345461b (diff)
tdf#114939 officecfg,sfx2: always use AES/SHA256 in ODF 1.2
The setting ODFVER_012_EXT_COMPAT "1.2 Extended (compatibility mode)" no longer has an effect on the encryption algorithms. API CHANGE: Remove the configuration settings: Office.Common.Save.ODF.UseSHA1InODF12 Office.Common.Save.ODF.UseBlowfishInODF12 Rationale: * Every release since 2012, from LO >= 3.4 and AOO >= 3.4, can read AES/SHA256 encrypted files. * SHA1 is broken anyway * tdf#114939 causes SHA1 interop issues Retain SHA1/Blowfish only for ODF 1.1 export. Change-Id: I007511d4830a90121e38bf5bb4534df5695621e9
Diffstat (limited to 'officecfg')
-rw-r--r--officecfg/registry/schema/org/openoffice/Office/Common.xcs15
1 files changed, 0 insertions, 15 deletions
diff --git a/officecfg/registry/schema/org/openoffice/Office/Common.xcs b/officecfg/registry/schema/org/openoffice/Office/Common.xcs
index 2884179d0800..2901733cabc0 100644
--- a/officecfg/registry/schema/org/openoffice/Office/Common.xcs
+++ b/officecfg/registry/schema/org/openoffice/Office/Common.xcs
@@ -2409,21 +2409,6 @@
</constraints>
<value>3</value>
</prop>
- <prop oor:name="UseSHA1InODF12" oor:type="xs:boolean" oor:nillable="false">
- <info>
- <desc>Specifies whether SHA1 algorithm instead of SHA256 should be
- used in ODF12 for StartKey and Checksum generation during
- encryption.</desc>
- </info>
- <value>false</value>
- </prop>
- <prop oor:name="UseBlowfishInODF12" oor:type="xs:boolean" oor:nillable="false">
- <info>
- <desc>Specifies whether Blowfish algorithm instead of AES should be
- used in ODF12 for encryption.</desc>
- </info>
- <value>false</value>
- </prop>
</group>
</group>
<group oor:name="Load">