Bug 131734

Summary: [EFL][WK1] SSL Strict is set according to input parameter.
Product: WebKit Reporter: Jeongeun Kim <je_julie.kim>
Component: WebKit EFLAssignee: Nobody <webkit-unassigned>
Status: RESOLVED FIXED    
Severity: Normal CC: bunhere, cdumez, commit-queue, gyuyoung.kim, gyuyoung.kim, lucas.de.marchi, sergio
Priority: P2    
Version: 528+ (Nightly build)   
Hardware: All   
OS: Linux   
Attachments:
Description Flags
Patch
none
Patch none

Jeongeun Kim
Reported 2014-04-16 08:40:58 PDT
SSL-Strict is set regardless of input param from ewk_network_tls_certificate_check_set. It should be set with input param, 'checkCertificates'.
Attachments
Patch (1.80 KB, patch)
2014-04-16 08:50 PDT, Jeongeun Kim
no flags
Patch (2.01 KB, patch)
2014-04-17 06:49 PDT, Jeongeun Kim
no flags
Jeongeun Kim
Comment 1 2014-04-16 08:43:15 PDT
For information, ewk_network_tls_certificate_check_set/get APIs were added at https://bugs.webkit.org/show_bug.cgi?id=74299.
Jeongeun Kim
Comment 2 2014-04-16 08:50:28 PDT
Gyuyoung Kim
Comment 3 2014-04-16 16:20:22 PDT
Comment on attachment 229445 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=229445&action=review > Source/WebKit/efl/ChangeLog:10 > + Otherwise, SSLStrict is unset. Unneeded line break. > Source/WebKit/efl/ewk/ewk_network.cpp:56 > void ewk_network_tls_certificate_check_set(Eina_Bool checkCertificates) BTW, parameter name is different with public header. Public header has used *enable* EAPI void ewk_network_tls_certificate_check_set(Eina_Bool enable); > Source/WebKit/efl/ewk/ewk_network.cpp:58 > unsigned policy = WebCore::SoupNetworkSession::defaultSession().sslPolicy(); Now I understand this API behavior is to enable soup SSL policy if checkCertificates is enabled. However, it looks this API is getting current ssl policy value unnecessary because you set *policy* value only depends on *checkCertificates*. I think there are two choices. One is just to set the policy regardless of current policy value. The other is to enable only both when *checkCertificates* is enabled and *current policy value* is disabled. Below may be one of examples for first one. void ewk_network_tls_certificate_check_set(Eina_Bool checkCertificates) { if (checkCertificates) policy = WebCore::SoupNetworkSession::SSLStrict; else policy = ~WebCore::SoupNetworkSession::SSLStrict; WebCore::SoupNetworkSession::defaultSession().setSSLPolicy(policy); }
Jeongeun Kim
Comment 4 2014-04-16 22:33:05 PDT
(In reply to comment #3) > EAPI void ewk_network_tls_certificate_check_set(Eina_Bool enable); > > > Source/WebKit/efl/ewk/ewk_network.cpp:58 > > unsigned policy = WebCore::SoupNetworkSession::defaultSession().sslPolicy(); > > Now I understand this API behavior is to enable soup SSL policy if checkCertificates is enabled. However, it looks this API is getting current ssl policy value unnecessary because you set *policy* value only depends on *checkCertificates*. I think there are two choices. One is just to set the policy regardless of current policy value. The other is to enable only both when *checkCertificates* is enabled and *current policy value* is disabled. > > Below may be one of examples for first one. > > void ewk_network_tls_certificate_check_set(Eina_Bool checkCertificates) { > if (checkCertificates) > policy = WebCore::SoupNetworkSession::SSLStrict; > else > policy = ~WebCore::SoupNetworkSession::SSLStrict; > > WebCore::SoupNetworkSession::defaultSession().setSSLPolicy(policy); > } Thanks, Gyuyoung. SoupNetworkSession::SSLPolicy SoupNetworkSession::sslPolicy() includes two options, SOUP_SESSION_SSL_USE_SYSTEM_CA_FILE and SOUP_SESSION_SSL_STRICT. We can set both of them using setSSLPolicy. That's why I'm getting current value. Originally, ewk_network_tls_certificate_check_set is only related to SSL-Strict. As to the second suggestion, It means that if (checkCertificates && !(policy | WebCore::SoupNetworkSession::SSLStrict)) policy |= WebCore::SoupNetworkSession::SSLStrict; else if (!checkCertificates && (policy | WebCore::SoupNetworkSession::SSLStrict)) policy &= ~WebCore::SoupNetworkSession::SSLStrict; So, your suggestion is that?
Gyuyoung Kim
Comment 5 2014-04-16 22:39:18 PDT
(In reply to comment #4) > (In reply to comment #3) > > EAPI void ewk_network_tls_certificate_check_set(Eina_Bool enable); > > > > > Source/WebKit/efl/ewk/ewk_network.cpp:58 > > > unsigned policy = WebCore::SoupNetworkSession::defaultSession().sslPolicy(); > > > > Now I understand this API behavior is to enable soup SSL policy if checkCertificates is enabled. However, it looks this API is getting current ssl policy value unnecessary because you set *policy* value only depends on *checkCertificates*. I think there are two choices. One is just to set the policy regardless of current policy value. The other is to enable only both when *checkCertificates* is enabled and *current policy value* is disabled. > > > > Below may be one of examples for first one. > > > > void ewk_network_tls_certificate_check_set(Eina_Bool checkCertificates) { > > if (checkCertificates) > > policy = WebCore::SoupNetworkSession::SSLStrict; > > else > > policy = ~WebCore::SoupNetworkSession::SSLStrict; > > > > WebCore::SoupNetworkSession::defaultSession().setSSLPolicy(policy); > > } > > Thanks, Gyuyoung. > SoupNetworkSession::SSLPolicy SoupNetworkSession::sslPolicy() includes two options, SOUP_SESSION_SSL_USE_SYSTEM_CA_FILE and SOUP_SESSION_SSL_STRICT. > We can set both of them using setSSLPolicy. That's why I'm getting current value. > Originally, ewk_network_tls_certificate_check_set is only related to SSL-Strict. > As to the second suggestion, It means that > if (checkCertificates && !(policy | WebCore::SoupNetworkSession::SSLStrict)) > policy |= WebCore::SoupNetworkSession::SSLStrict; > else if (!checkCertificates && (policy | WebCore::SoupNetworkSession::SSLStrict)) > policy &= ~WebCore::SoupNetworkSession::SSLStrict; > So, your suggestion is that? Looks like my second suggestion. My point is that we don't need to get current policy value in your uploaded patch, because your patch sets the policy value by using *checkCertificates* regardless current policy value. So, when the policy was already set to SSLStrict, we don't need to set it to SSLStrict again.
Jeongeun Kim
Comment 6 2014-04-17 06:49:46 PDT
Jeongeun Kim
Comment 7 2014-04-17 07:11:12 PDT
(In reply to comment #5) > Looks like my second suggestion. My point is that we don't need to get current policy value in your uploaded patch, because your patch sets the policy value by using *checkCertificates* regardless current policy value. So, when the policy was already set to SSLStrict, we don't need to set it to SSLStrict again. Hi Gyuyoung, Thank you for your comment. I updated patch. If you are available, please look into it. Thanks,
Gyuyoung Kim
Comment 8 2014-04-17 07:21:53 PDT
Comment on attachment 229539 [details] Patch LGTM.
WebKit Commit Bot
Comment 9 2014-04-17 18:11:22 PDT
Comment on attachment 229539 [details] Patch Clearing flags on attachment: 229539 Committed r167475: <http://trac.webkit.org/changeset/167475>
WebKit Commit Bot
Comment 10 2014-04-17 18:11:30 PDT
All reviewed patches have been landed. Closing bug.
Note You need to log in before you can comment on or make changes to this bug.