... instead of MD5.
The known MD5 vulnerabilities shoulnd't matter for Privoxy's use case
but it doesn't hurt to use a hash algorithm that isn't deprecated.
Sponsored by: Robert Klemme
#include <openssl/bn.h>
#include <openssl/opensslv.h>
#include <openssl/pem.h>
-#include <openssl/md5.h>
+#include <openssl/sha.h>
#include <openssl/x509v3.h>
#ifdef _WIN32
/* https://www.openssl.org/docs/faq.html
*
* Function : host_to_hash
*
- * Description : Creates MD5 hash from host name. Host name is loaded
- * from structure csp and saved again into it.
+ * Description : Creates a sha256 hash from host name. The host name
+ * is taken from the csp structure and stored into it.
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
static int host_to_hash(struct client_state *csp)
{
int ret = 0;
+ size_t i;
- memset(csp->http->hash_of_host, 0, sizeof(csp->http->hash_of_host));
- MD5((unsigned char *)csp->http->host, strlen(csp->http->host),
+ SHA256((unsigned char *)csp->http->host, strlen(csp->http->host),
csp->http->hash_of_host);
/* Converting hash into string with hex */
- size_t i = 0;
- for (; i < 16; i++)
+ for (i = 0; i < HASH_OF_HOST_BUF_SIZE; i++)
{
if ((ret = sprintf((char *)csp->http->hash_of_host_hex + 2 * i, "%02x",
csp->http->hash_of_host[i])) < 0)
*/
#define CERT_INFO_BUF_SIZE 4096
#define ISSUER_NAME_BUF_SIZE 2048
-#define HASH_OF_HOST_BUF_SIZE 16
+#define HASH_OF_HOST_BUF_SIZE 32
#endif /* FEATURE_HTTPS_INSPECTION */
#ifdef FEATURE_HTTPS_INSPECTION_MBEDTLS
# include MBEDTLS_CONFIG_FILE
#endif
-#include "mbedtls/md5.h"
+#include "mbedtls/sha256.h"
#include "mbedtls/pem.h"
#include "mbedtls/base64.h"
#include "mbedtls/error.h"
*
* Function : host_to_hash
*
- * Description : Creates MD5 hash from host name. Host name is loaded
- * from structure csp and saved again into it.
+ * Description : Creates a sha256 hash from host name. The host name
+ * is taken from the csp structure and stored into it.
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
*********************************************************************/
static int host_to_hash(struct client_state *csp)
{
- int ret = 0;
+ int ret;
+ size_t i;
-#if !defined(MBEDTLS_MD5_C)
-#error mbedTLS needs to be compiled with md5 support
-#else
- memset(csp->http->hash_of_host, 0, sizeof(csp->http->hash_of_host));
- ret = mbedtls_md5_ret((unsigned char *)csp->http->host,
- strlen(csp->http->host), csp->http->hash_of_host);
- if (ret != 0)
- {
- log_error(LOG_LEVEL_ERROR,
- "Failed to generate md5 hash of host %s: %d",
- csp->http->host, ret);
- return -1;
- }
+ mbedtls_sha256((unsigned char *)csp->http->host,
+ strlen(csp->http->host), csp->http->hash_of_host, 0);
/* Converting hash into string with hex */
- size_t i = 0;
- for (; i < 16; i++)
+ for (i = 0; i < HASH_OF_HOST_BUF_SIZE; i++)
{
if ((ret = sprintf((char *)csp->http->hash_of_host_hex + 2 * i, "%02x",
csp->http->hash_of_host[i])) < 0)
}
return 0;
-#endif /* MBEDTLS_MD5_C */
+
}
/*********************************************************************
*
* Function : host_to_hash
*
- * Description : Creates MD5 hash from host name. Host name is loaded
- * from structure csp and saved again into it.
+ * Description : Creates a sha256 hash from host name. The host name
+ * is taken from the csp structure and stored into it.
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
*********************************************************************/
static int host_to_hash(struct client_state *csp)
{
- wc_Md5 md5;
int ret;
size_t i;
- ret = wc_InitMd5(&md5);
+ ret = wc_Sha256Hash((const byte *)csp->http->host,
+ (word32)strlen(csp->http->host), (byte *)csp->http->hash_of_host);
if (ret != 0)
{
- return -1;
+ return -1;
}
- ret = wc_Md5Update(&md5, (const byte *)csp->http->host,
- (word32)strlen(csp->http->host));
- if (ret != 0)
- {
- return -1;
- }
-
- ret = wc_Md5Final(&md5, csp->http->hash_of_host);
- if (ret != 0)
- {
- return -1;
- }
-
- wc_Md5Free(&md5);
-
/* Converting hash into string with hex */
- for (i = 0; i < 16; i++)
+ for (i = 0; i < HASH_OF_HOST_BUF_SIZE; i++)
{
ret = snprintf((char *)csp->http->hash_of_host_hex + 2 * i,
sizeof(csp->http->hash_of_host_hex) - 2 * i,
}
return 0;
+
}