| /* |
| * Internet Security and Zone Manager |
| * |
| * Copyright (c) 2004 Huw D M Davies |
| * Copyright 2004 Jacek Caban |
| * Copyright 2009 Detlef Riekenberg |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA |
| */ |
| |
| #include <stdio.h> |
| |
| #include "urlmon_main.h" |
| #include "winreg.h" |
| #include "wininet.h" |
| |
| #include "wine/debug.h" |
| |
| WINE_DEFAULT_DEBUG_CHANNEL(urlmon); |
| |
| static const WCHAR currentlevelW[] = {'C','u','r','r','e','n','t','L','e','v','e','l',0}; |
| static const WCHAR descriptionW[] = {'D','e','s','c','r','i','p','t','i','o','n',0}; |
| static const WCHAR displaynameW[] = {'D','i','s','p','l','a','y','N','a','m','e',0}; |
| static const WCHAR fileW[] = {'f','i','l','e',0}; |
| static const WCHAR flagsW[] = {'F','l','a','g','s',0}; |
| static const WCHAR iconW[] = {'I','c','o','n',0}; |
| static const WCHAR minlevelW[] = {'M','i','n','L','e','v','e','l',0}; |
| static const WCHAR recommendedlevelW[] = {'R','e','c','o','m','m','e','n','d','e','d', |
| 'L','e','v','e','l',0}; |
| static const WCHAR wszZonesKey[] = {'S','o','f','t','w','a','r','e','\\', |
| 'M','i','c','r','o','s','o','f','t','\\', |
| 'W','i','n','d','o','w','s','\\', |
| 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\', |
| 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\', |
| 'Z','o','n','e','s','\\',0}; |
| |
| /******************************************************************** |
| * get_string_from_reg [internal] |
| * |
| * helper to get a string from the reg. |
| * |
| */ |
| static void get_string_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPWSTR out, DWORD maxlen) |
| { |
| DWORD type = REG_SZ; |
| DWORD len = maxlen * sizeof(WCHAR); |
| DWORD res; |
| |
| res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len); |
| |
| if (res && hklm) { |
| len = maxlen * sizeof(WCHAR); |
| type = REG_SZ; |
| res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len); |
| } |
| |
| if (res) { |
| TRACE("%s failed: %d\n", debugstr_w(name), res); |
| *out = '\0'; |
| } |
| } |
| |
| /******************************************************************** |
| * get_dword_from_reg [internal] |
| * |
| * helper to get a dword from the reg. |
| * |
| */ |
| static void get_dword_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPDWORD out) |
| { |
| DWORD type = REG_DWORD; |
| DWORD len = sizeof(DWORD); |
| DWORD res; |
| |
| res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len); |
| |
| if (res && hklm) { |
| len = sizeof(DWORD); |
| type = REG_DWORD; |
| res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len); |
| } |
| |
| if (res) { |
| TRACE("%s failed: %d\n", debugstr_w(name), res); |
| *out = 0; |
| } |
| } |
| |
| static HRESULT get_zone_from_reg(LPCWSTR schema, DWORD *zone) |
| { |
| DWORD res, size; |
| HKEY hkey; |
| |
| static const WCHAR wszZoneMapProtocolKey[] = |
| {'S','o','f','t','w','a','r','e','\\', |
| 'M','i','c','r','o','s','o','f','t','\\', |
| 'W','i','n','d','o','w','s','\\', |
| 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\', |
| 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\', |
| 'Z','o','n','e','M','a','p','\\', |
| 'P','r','o','t','o','c','o','l','D','e','f','a','u','l','t','s',0}; |
| |
| res = RegOpenKeyW(HKEY_CURRENT_USER, wszZoneMapProtocolKey, &hkey); |
| if(res != ERROR_SUCCESS) { |
| ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey)); |
| return E_UNEXPECTED; |
| } |
| |
| size = sizeof(DWORD); |
| res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size); |
| RegCloseKey(hkey); |
| if(res == ERROR_SUCCESS) |
| return S_OK; |
| |
| res = RegOpenKeyW(HKEY_LOCAL_MACHINE, wszZoneMapProtocolKey, &hkey); |
| if(res != ERROR_SUCCESS) { |
| ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey)); |
| return E_UNEXPECTED; |
| } |
| |
| size = sizeof(DWORD); |
| res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size); |
| RegCloseKey(hkey); |
| if(res == ERROR_SUCCESS) |
| return S_OK; |
| |
| *zone = 3; |
| return S_OK; |
| } |
| |
| static HRESULT map_url_to_zone(LPCWSTR url, DWORD *zone, LPWSTR *ret_url) |
| { |
| LPWSTR secur_url; |
| WCHAR schema[64]; |
| DWORD size=0; |
| HRESULT hres; |
| |
| *zone = -1; |
| |
| hres = CoInternetGetSecurityUrl(url, &secur_url, PSU_SECURITY_URL_ONLY, 0); |
| if(hres != S_OK) { |
| size = strlenW(url)*sizeof(WCHAR); |
| |
| secur_url = heap_alloc(size); |
| if(!secur_url) |
| return E_OUTOFMEMORY; |
| |
| memcpy(secur_url, url, size); |
| } |
| |
| hres = CoInternetParseUrl(secur_url, PARSE_SCHEMA, 0, schema, sizeof(schema)/sizeof(WCHAR), &size, 0); |
| if(FAILED(hres) || !*schema) { |
| heap_free(secur_url); |
| return E_INVALIDARG; |
| } |
| |
| /* file protocol is a special case */ |
| if(!strcmpW(schema, fileW)) { |
| WCHAR path[MAX_PATH], root[20]; |
| WCHAR *ptr; |
| |
| hres = CoInternetParseUrl(secur_url, PARSE_PATH_FROM_URL, 0, path, |
| sizeof(path)/sizeof(WCHAR), &size, 0); |
| |
| if(SUCCEEDED(hres) && (ptr = strchrW(path, '\\')) && ptr-path < sizeof(root)/sizeof(WCHAR)) { |
| UINT type; |
| |
| memcpy(root, path, (ptr-path)*sizeof(WCHAR)); |
| root[ptr-path] = 0; |
| |
| type = GetDriveTypeW(root); |
| |
| switch(type) { |
| case DRIVE_UNKNOWN: |
| case DRIVE_NO_ROOT_DIR: |
| break; |
| case DRIVE_REMOVABLE: |
| case DRIVE_FIXED: |
| case DRIVE_CDROM: |
| case DRIVE_RAMDISK: |
| *zone = 0; |
| hres = S_OK; |
| break; |
| case DRIVE_REMOTE: |
| *zone = 3; |
| hres = S_OK; |
| break; |
| default: |
| FIXME("unsupported drive type %d\n", type); |
| } |
| } |
| } |
| |
| if(*zone == -1) { |
| WARN("domains are not yet implemented\n"); |
| hres = get_zone_from_reg(schema, zone); |
| } |
| |
| if(FAILED(hres) || !ret_url) |
| heap_free(secur_url); |
| else |
| *ret_url = secur_url; |
| |
| return hres; |
| } |
| |
| static HRESULT open_zone_key(HKEY parent_key, DWORD zone, HKEY *hkey) |
| { |
| static const WCHAR wszFormat[] = {'%','s','%','l','d',0}; |
| |
| WCHAR key_name[sizeof(wszZonesKey)/sizeof(WCHAR)+8]; |
| DWORD res; |
| |
| wsprintfW(key_name, wszFormat, wszZonesKey, zone); |
| |
| res = RegOpenKeyW(parent_key, key_name, hkey); |
| |
| if(res != ERROR_SUCCESS) { |
| WARN("RegOpenKey failed\n"); |
| return E_INVALIDARG; |
| } |
| |
| return S_OK; |
| } |
| |
| static HRESULT get_action_policy(DWORD zone, DWORD action, BYTE *policy, DWORD size, URLZONEREG zone_reg) |
| { |
| HKEY parent_key; |
| HKEY hkey; |
| LONG res; |
| HRESULT hres; |
| |
| switch(action) { |
| case URLACTION_SCRIPT_OVERRIDE_SAFETY: |
| case URLACTION_ACTIVEX_OVERRIDE_SCRIPT_SAFETY: |
| *(DWORD*)policy = URLPOLICY_DISALLOW; |
| return S_OK; |
| } |
| |
| switch(zone_reg) { |
| case URLZONEREG_DEFAULT: |
| case URLZONEREG_HKCU: |
| parent_key = HKEY_CURRENT_USER; |
| break; |
| case URLZONEREG_HKLM: |
| parent_key = HKEY_LOCAL_MACHINE; |
| break; |
| default: |
| WARN("Unknown URLZONEREG: %d\n", zone_reg); |
| return E_FAIL; |
| }; |
| |
| hres = open_zone_key(parent_key, zone, &hkey); |
| if(SUCCEEDED(hres)) { |
| WCHAR action_str[16]; |
| DWORD len = size; |
| |
| static const WCHAR formatW[] = {'%','X',0}; |
| |
| wsprintfW(action_str, formatW, action); |
| |
| res = RegQueryValueExW(hkey, action_str, NULL, NULL, policy, &len); |
| if(res == ERROR_MORE_DATA) { |
| hres = E_INVALIDARG; |
| }else if(res == ERROR_FILE_NOT_FOUND) { |
| hres = E_FAIL; |
| }else if(res != ERROR_SUCCESS) { |
| ERR("RegQueryValue failed: %d\n", res); |
| hres = E_UNEXPECTED; |
| } |
| |
| RegCloseKey(hkey); |
| } |
| |
| if(FAILED(hres) && zone_reg == URLZONEREG_DEFAULT) |
| return get_action_policy(zone, action, policy, size, URLZONEREG_HKLM); |
| |
| return hres; |
| } |
| |
| /*********************************************************************** |
| * InternetSecurityManager implementation |
| * |
| */ |
| typedef struct { |
| const IInternetSecurityManagerVtbl* lpInternetSecurityManagerVtbl; |
| |
| LONG ref; |
| |
| IInternetSecurityMgrSite *mgrsite; |
| IInternetSecurityManager *custom_manager; |
| } SecManagerImpl; |
| |
| #define SECMGR_THIS(iface) DEFINE_THIS(SecManagerImpl, InternetSecurityManager, iface) |
| |
| static HRESULT WINAPI SecManagerImpl_QueryInterface(IInternetSecurityManager* iface,REFIID riid,void** ppvObject) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| |
| TRACE("(%p)->(%s,%p)\n",This,debugstr_guid(riid),ppvObject); |
| |
| /* Perform a sanity check on the parameters.*/ |
| if ( (This==0) || (ppvObject==0) ) |
| return E_INVALIDARG; |
| |
| /* Initialize the return parameter */ |
| *ppvObject = 0; |
| |
| /* Compare the riid with the interface IDs implemented by this object.*/ |
| if (IsEqualIID(&IID_IUnknown, riid) || |
| IsEqualIID(&IID_IInternetSecurityManager, riid)) |
| *ppvObject = iface; |
| |
| /* Check that we obtained an interface.*/ |
| if (!*ppvObject) { |
| WARN("not supported interface %s\n", debugstr_guid(riid)); |
| return E_NOINTERFACE; |
| } |
| |
| /* Query Interface always increases the reference count by one when it is successful */ |
| IInternetSecurityManager_AddRef(iface); |
| |
| return S_OK; |
| } |
| |
| static ULONG WINAPI SecManagerImpl_AddRef(IInternetSecurityManager* iface) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| ULONG refCount = InterlockedIncrement(&This->ref); |
| |
| TRACE("(%p) ref=%u\n", This, refCount); |
| |
| return refCount; |
| } |
| |
| static ULONG WINAPI SecManagerImpl_Release(IInternetSecurityManager* iface) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| ULONG refCount = InterlockedDecrement(&This->ref); |
| |
| TRACE("(%p) ref=%u\n", This, refCount); |
| |
| /* destroy the object if there's no more reference on it */ |
| if (!refCount){ |
| if(This->mgrsite) |
| IInternetSecurityMgrSite_Release(This->mgrsite); |
| if(This->custom_manager) |
| IInternetSecurityManager_Release(This->custom_manager); |
| |
| heap_free(This); |
| |
| URLMON_UnlockModule(); |
| } |
| |
| return refCount; |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_SetSecuritySite(IInternetSecurityManager *iface, |
| IInternetSecurityMgrSite *pSite) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| |
| TRACE("(%p)->(%p)\n", This, pSite); |
| |
| if(This->mgrsite) |
| IInternetSecurityMgrSite_Release(This->mgrsite); |
| |
| if(This->custom_manager) { |
| IInternetSecurityManager_Release(This->custom_manager); |
| This->custom_manager = NULL; |
| } |
| |
| This->mgrsite = pSite; |
| |
| if(pSite) { |
| IServiceProvider *servprov; |
| HRESULT hres; |
| |
| IInternetSecurityMgrSite_AddRef(pSite); |
| |
| hres = IInternetSecurityMgrSite_QueryInterface(pSite, &IID_IServiceProvider, |
| (void**)&servprov); |
| if(SUCCEEDED(hres)) { |
| IServiceProvider_QueryService(servprov, &SID_SInternetSecurityManager, |
| &IID_IInternetSecurityManager, (void**)&This->custom_manager); |
| IServiceProvider_Release(servprov); |
| } |
| } |
| |
| return S_OK; |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_GetSecuritySite(IInternetSecurityManager *iface, |
| IInternetSecurityMgrSite **ppSite) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| |
| TRACE("(%p)->(%p)\n", This, ppSite); |
| |
| if(!ppSite) |
| return E_INVALIDARG; |
| |
| if(This->mgrsite) |
| IInternetSecurityMgrSite_AddRef(This->mgrsite); |
| |
| *ppSite = This->mgrsite; |
| return S_OK; |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_MapUrlToZone(IInternetSecurityManager *iface, |
| LPCWSTR pwszUrl, DWORD *pdwZone, |
| DWORD dwFlags) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| HRESULT hres; |
| |
| TRACE("(%p)->(%s %p %08x)\n", iface, debugstr_w(pwszUrl), pdwZone, dwFlags); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_MapUrlToZone(This->custom_manager, |
| pwszUrl, pdwZone, dwFlags); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| if(!pwszUrl) { |
| *pdwZone = -1; |
| return E_INVALIDARG; |
| } |
| |
| if(dwFlags) |
| FIXME("not supported flags: %08x\n", dwFlags); |
| |
| return map_url_to_zone(pwszUrl, pdwZone, NULL); |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_GetSecurityId(IInternetSecurityManager *iface, |
| LPCWSTR pwszUrl, BYTE *pbSecurityId, DWORD *pcbSecurityId, DWORD_PTR dwReserved) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| LPWSTR url, ptr, ptr2; |
| DWORD zone, len; |
| HRESULT hres; |
| |
| static const WCHAR wszFile[] = {'f','i','l','e',':'}; |
| |
| TRACE("(%p)->(%s %p %p %08lx)\n", iface, debugstr_w(pwszUrl), pbSecurityId, |
| pcbSecurityId, dwReserved); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_GetSecurityId(This->custom_manager, |
| pwszUrl, pbSecurityId, pcbSecurityId, dwReserved); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| if(!pwszUrl || !pbSecurityId || !pcbSecurityId) |
| return E_INVALIDARG; |
| |
| if(dwReserved) |
| FIXME("dwReserved is not supported\n"); |
| |
| hres = map_url_to_zone(pwszUrl, &zone, &url); |
| if(FAILED(hres)) |
| return hres == 0x80041001 ? E_INVALIDARG : hres; |
| |
| /* file protocol is a special case */ |
| if(strlenW(url) >= sizeof(wszFile)/sizeof(WCHAR) |
| && !memcmp(url, wszFile, sizeof(wszFile)) && strchrW(url, '\\')) { |
| |
| static const BYTE secidFile[] = {'f','i','l','e',':'}; |
| |
| heap_free(url); |
| |
| if(*pcbSecurityId < sizeof(secidFile)+sizeof(zone)) |
| return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER); |
| |
| memcpy(pbSecurityId, secidFile, sizeof(secidFile)); |
| *(DWORD*)(pbSecurityId+sizeof(secidFile)) = zone; |
| |
| *pcbSecurityId = sizeof(secidFile)+sizeof(zone); |
| return S_OK; |
| } |
| |
| ptr = strchrW(url, ':'); |
| ptr2 = ++ptr; |
| while(*ptr2 == '/') |
| ptr2++; |
| if(ptr2 != ptr) |
| memmove(ptr, ptr2, (strlenW(ptr2)+1)*sizeof(WCHAR)); |
| |
| ptr = strchrW(ptr, '/'); |
| if(ptr) |
| *ptr = 0; |
| |
| len = WideCharToMultiByte(CP_ACP, 0, url, -1, NULL, 0, NULL, NULL)-1; |
| |
| if(len+sizeof(DWORD) > *pcbSecurityId) { |
| heap_free(url); |
| return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER); |
| } |
| |
| WideCharToMultiByte(CP_ACP, 0, url, -1, (LPSTR)pbSecurityId, len, NULL, NULL); |
| heap_free(url); |
| |
| *(DWORD*)(pbSecurityId+len) = zone; |
| |
| *pcbSecurityId = len+sizeof(DWORD); |
| |
| return S_OK; |
| } |
| |
| |
| static HRESULT WINAPI SecManagerImpl_ProcessUrlAction(IInternetSecurityManager *iface, |
| LPCWSTR pwszUrl, DWORD dwAction, |
| BYTE *pPolicy, DWORD cbPolicy, |
| BYTE *pContext, DWORD cbContext, |
| DWORD dwFlags, DWORD dwReserved) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| DWORD zone, policy; |
| HRESULT hres; |
| |
| TRACE("(%p)->(%s %08x %p %08x %p %08x %08x %08x)\n", iface, debugstr_w(pwszUrl), dwAction, |
| pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_ProcessUrlAction(This->custom_manager, pwszUrl, dwAction, |
| pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| if(dwFlags || dwReserved) |
| FIXME("Unsupported arguments\n"); |
| |
| if(!pwszUrl) |
| return E_INVALIDARG; |
| |
| hres = map_url_to_zone(pwszUrl, &zone, NULL); |
| if(FAILED(hres)) |
| return hres; |
| |
| hres = get_action_policy(zone, dwAction, (BYTE*)&policy, sizeof(policy), URLZONEREG_DEFAULT); |
| if(FAILED(hres)) |
| return hres; |
| |
| TRACE("policy %x\n", policy); |
| if(cbPolicy >= sizeof(DWORD)) |
| *(DWORD*)pPolicy = policy; |
| |
| switch(GetUrlPolicyPermissions(policy)) { |
| case URLPOLICY_ALLOW: |
| case URLPOLICY_CHANNEL_SOFTDIST_PRECACHE: |
| return S_OK; |
| case URLPOLICY_DISALLOW: |
| return S_FALSE; |
| case URLPOLICY_QUERY: |
| FIXME("URLPOLICY_QUERY not implemented\n"); |
| return E_FAIL; |
| default: |
| FIXME("Not implemented policy %x\n", policy); |
| } |
| |
| return E_FAIL; |
| } |
| |
| |
| static HRESULT WINAPI SecManagerImpl_QueryCustomPolicy(IInternetSecurityManager *iface, |
| LPCWSTR pwszUrl, REFGUID guidKey, |
| BYTE **ppPolicy, DWORD *pcbPolicy, |
| BYTE *pContext, DWORD cbContext, |
| DWORD dwReserved) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| HRESULT hres; |
| |
| TRACE("(%p)->(%s %s %p %p %p %08x %08x )\n", iface, debugstr_w(pwszUrl), debugstr_guid(guidKey), |
| ppPolicy, pcbPolicy, pContext, cbContext, dwReserved); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_QueryCustomPolicy(This->custom_manager, pwszUrl, guidKey, |
| ppPolicy, pcbPolicy, pContext, cbContext, dwReserved); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| WARN("Unknown guidKey %s\n", debugstr_guid(guidKey)); |
| return HRESULT_FROM_WIN32(ERROR_NOT_FOUND); |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_SetZoneMapping(IInternetSecurityManager *iface, |
| DWORD dwZone, LPCWSTR pwszPattern, DWORD dwFlags) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| HRESULT hres; |
| |
| TRACE("(%p)->(%08x %s %08x)\n", iface, dwZone, debugstr_w(pwszPattern),dwFlags); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_SetZoneMapping(This->custom_manager, dwZone, |
| pwszPattern, dwFlags); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| FIXME("Default action is not implemented\n"); |
| return E_NOTIMPL; |
| } |
| |
| static HRESULT WINAPI SecManagerImpl_GetZoneMappings(IInternetSecurityManager *iface, |
| DWORD dwZone, IEnumString **ppenumString, DWORD dwFlags) |
| { |
| SecManagerImpl *This = SECMGR_THIS(iface); |
| HRESULT hres; |
| |
| TRACE("(%p)->(%08x %p %08x)\n", iface, dwZone, ppenumString,dwFlags); |
| |
| if(This->custom_manager) { |
| hres = IInternetSecurityManager_GetZoneMappings(This->custom_manager, dwZone, |
| ppenumString, dwFlags); |
| if(hres != INET_E_DEFAULT_ACTION) |
| return hres; |
| } |
| |
| FIXME("Default action is not implemented\n"); |
| return E_NOTIMPL; |
| } |
| |
| static const IInternetSecurityManagerVtbl VT_SecManagerImpl = |
| { |
| SecManagerImpl_QueryInterface, |
| SecManagerImpl_AddRef, |
| SecManagerImpl_Release, |
| SecManagerImpl_SetSecuritySite, |
| SecManagerImpl_GetSecuritySite, |
| SecManagerImpl_MapUrlToZone, |
| SecManagerImpl_GetSecurityId, |
| SecManagerImpl_ProcessUrlAction, |
| SecManagerImpl_QueryCustomPolicy, |
| SecManagerImpl_SetZoneMapping, |
| SecManagerImpl_GetZoneMappings |
| }; |
| |
| HRESULT SecManagerImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj) |
| { |
| SecManagerImpl *This; |
| |
| TRACE("(%p,%p)\n",pUnkOuter,ppobj); |
| This = heap_alloc(sizeof(*This)); |
| |
| /* Initialize the virtual function table. */ |
| This->lpInternetSecurityManagerVtbl = &VT_SecManagerImpl; |
| |
| This->ref = 1; |
| This->mgrsite = NULL; |
| This->custom_manager = NULL; |
| |
| *ppobj = This; |
| |
| URLMON_LockModule(); |
| |
| return S_OK; |
| } |
| |
| /*********************************************************************** |
| * InternetZoneManager implementation |
| * |
| */ |
| typedef struct { |
| const IInternetZoneManagerEx2Vtbl* lpVtbl; |
| LONG ref; |
| LPDWORD *zonemaps; |
| DWORD zonemap_count; |
| } ZoneMgrImpl; |
| |
| |
| /*********************************************************************** |
| * build_zonemap_from_reg [internal] |
| * |
| * Enumerate the Zones in the Registry and return the Zones in a DWORD-array |
| * The number of the Zones is returned in data[0] |
| */ |
| static LPDWORD build_zonemap_from_reg(void) |
| { |
| WCHAR name[32]; |
| HKEY hkey; |
| LPDWORD data = NULL; |
| DWORD allocated = 6; /* space for the zonecount and Zone "0" up to Zone "4" */ |
| DWORD used = 0; |
| DWORD res; |
| DWORD len; |
| |
| |
| res = RegOpenKeyW(HKEY_CURRENT_USER, wszZonesKey, &hkey); |
| if (res) |
| return NULL; |
| |
| data = heap_alloc(allocated * sizeof(DWORD)); |
| if (!data) |
| goto cleanup; |
| |
| while (!res) { |
| name[0] = '\0'; |
| len = sizeof(name) / sizeof(name[0]); |
| res = RegEnumKeyExW(hkey, used, name, &len, NULL, NULL, NULL, NULL); |
| |
| if (!res) { |
| used++; |
| if (used == allocated) { |
| LPDWORD new_data; |
| |
| allocated *= 2; |
| new_data = heap_realloc_zero(data, allocated * sizeof(DWORD)); |
| if (!new_data) |
| goto cleanup; |
| |
| data = new_data; |
| } |
| data[used] = atoiW(name); |
| } |
| } |
| if (used) { |
| RegCloseKey(hkey); |
| data[0] = used; |
| return data; |
| } |
| |
| cleanup: |
| /* something failed */ |
| RegCloseKey(hkey); |
| heap_free(data); |
| return NULL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_QueryInterface |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_QueryInterface(IInternetZoneManagerEx2* iface, REFIID riid, void** ppvObject) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| |
| TRACE("(%p)->(%s,%p)\n", This, debugstr_guid(riid), ppvObject); |
| |
| if(!This || !ppvObject) |
| return E_INVALIDARG; |
| |
| if(IsEqualIID(&IID_IUnknown, riid)) { |
| TRACE("(%p)->(IID_IUnknown %p)\n", This, ppvObject); |
| }else if(IsEqualIID(&IID_IInternetZoneManager, riid)) { |
| TRACE("(%p)->(IID_InternetZoneManager %p)\n", This, ppvObject); |
| }else if(IsEqualIID(&IID_IInternetZoneManagerEx, riid)) { |
| TRACE("(%p)->(IID_InternetZoneManagerEx %p)\n", This, ppvObject); |
| }else if(IsEqualIID(&IID_IInternetZoneManagerEx2, riid)) { |
| TRACE("(%p)->(IID_InternetZoneManagerEx2 %p)\n", This, ppvObject); |
| } |
| else |
| { |
| FIXME("Unknown interface: %s\n", debugstr_guid(riid)); |
| *ppvObject = NULL; |
| return E_NOINTERFACE; |
| } |
| |
| *ppvObject = iface; |
| IInternetZoneManager_AddRef(iface); |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_AddRef |
| */ |
| static ULONG WINAPI ZoneMgrImpl_AddRef(IInternetZoneManagerEx2* iface) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| ULONG refCount = InterlockedIncrement(&This->ref); |
| |
| TRACE("(%p)->(ref before=%u)\n",This, refCount - 1); |
| |
| return refCount; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_Release |
| */ |
| static ULONG WINAPI ZoneMgrImpl_Release(IInternetZoneManagerEx2* iface) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| ULONG refCount = InterlockedDecrement(&This->ref); |
| |
| TRACE("(%p)->(ref before=%u)\n",This, refCount + 1); |
| |
| if(!refCount) { |
| while (This->zonemap_count) heap_free(This->zonemaps[--This->zonemap_count]); |
| heap_free(This->zonemaps); |
| heap_free(This); |
| URLMON_UnlockModule(); |
| } |
| |
| return refCount; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_GetZoneAttributes |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneAttributes(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| ZONEATTRIBUTES* pZoneAttributes) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| HRESULT hr; |
| HKEY hcu; |
| HKEY hklm = NULL; |
| |
| TRACE("(%p)->(%d %p)\n", This, dwZone, pZoneAttributes); |
| |
| if (!pZoneAttributes) |
| return E_INVALIDARG; |
| |
| hr = open_zone_key(HKEY_CURRENT_USER, dwZone, &hcu); |
| if (FAILED(hr)) |
| return S_OK; /* IE6 and older returned E_FAIL here */ |
| |
| hr = open_zone_key(HKEY_LOCAL_MACHINE, dwZone, &hklm); |
| if (FAILED(hr)) |
| TRACE("Zone %d not in HKLM\n", dwZone); |
| |
| get_string_from_reg(hcu, hklm, displaynameW, pZoneAttributes->szDisplayName, MAX_ZONE_PATH); |
| get_string_from_reg(hcu, hklm, descriptionW, pZoneAttributes->szDescription, MAX_ZONE_DESCRIPTION); |
| get_string_from_reg(hcu, hklm, iconW, pZoneAttributes->szIconPath, MAX_ZONE_PATH); |
| get_dword_from_reg(hcu, hklm, minlevelW, &pZoneAttributes->dwTemplateMinLevel); |
| get_dword_from_reg(hcu, hklm, currentlevelW, &pZoneAttributes->dwTemplateCurrentLevel); |
| get_dword_from_reg(hcu, hklm, recommendedlevelW, &pZoneAttributes->dwTemplateRecommended); |
| get_dword_from_reg(hcu, hklm, flagsW, &pZoneAttributes->dwFlags); |
| |
| RegCloseKey(hklm); |
| RegCloseKey(hcu); |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_SetZoneAttributes |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_SetZoneAttributes(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| ZONEATTRIBUTES* pZoneAttributes) |
| { |
| FIXME("(%p)->(%08x %p) stub\n", iface, dwZone, pZoneAttributes); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_GetZoneCustomPolicy |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneCustomPolicy(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| REFGUID guidKey, |
| BYTE** ppPolicy, |
| DWORD* pcbPolicy, |
| URLZONEREG ulrZoneReg) |
| { |
| FIXME("(%p)->(%08x %s %p %p %08x) stub\n", iface, dwZone, debugstr_guid(guidKey), |
| ppPolicy, pcbPolicy, ulrZoneReg); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_SetZoneCustomPolicy |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_SetZoneCustomPolicy(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| REFGUID guidKey, |
| BYTE* ppPolicy, |
| DWORD cbPolicy, |
| URLZONEREG ulrZoneReg) |
| { |
| FIXME("(%p)->(%08x %s %p %08x %08x) stub\n", iface, dwZone, debugstr_guid(guidKey), |
| ppPolicy, cbPolicy, ulrZoneReg); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_GetZoneActionPolicy |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneActionPolicy(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, DWORD dwAction, BYTE* pPolicy, DWORD cbPolicy, URLZONEREG urlZoneReg) |
| { |
| TRACE("(%p)->(%d %08x %p %d %d)\n", iface, dwZone, dwAction, pPolicy, |
| cbPolicy, urlZoneReg); |
| |
| if(!pPolicy) |
| return E_INVALIDARG; |
| |
| return get_action_policy(dwZone, dwAction, pPolicy, cbPolicy, urlZoneReg); |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_SetZoneActionPolicy |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_SetZoneActionPolicy(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| DWORD dwAction, |
| BYTE* pPolicy, |
| DWORD cbPolicy, |
| URLZONEREG urlZoneReg) |
| { |
| FIXME("(%p)->(%08x %08x %p %08x %08x) stub\n", iface, dwZone, dwAction, pPolicy, |
| cbPolicy, urlZoneReg); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_PromptAction |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_PromptAction(IInternetZoneManagerEx2* iface, |
| DWORD dwAction, |
| HWND hwndParent, |
| LPCWSTR pwszUrl, |
| LPCWSTR pwszText, |
| DWORD dwPromptFlags) |
| { |
| FIXME("%p %08x %p %s %s %08x\n", iface, dwAction, hwndParent, |
| debugstr_w(pwszUrl), debugstr_w(pwszText), dwPromptFlags ); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_LogAction |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_LogAction(IInternetZoneManagerEx2* iface, |
| DWORD dwAction, |
| LPCWSTR pwszUrl, |
| LPCWSTR pwszText, |
| DWORD dwLogFlags) |
| { |
| FIXME("(%p)->(%08x %s %s %08x) stub\n", iface, dwAction, debugstr_w(pwszUrl), |
| debugstr_w(pwszText), dwLogFlags); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_CreateZoneEnumerator |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_CreateZoneEnumerator(IInternetZoneManagerEx2* iface, |
| DWORD* pdwEnum, |
| DWORD* pdwCount, |
| DWORD dwFlags) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| LPDWORD * new_maps; |
| LPDWORD data; |
| DWORD i; |
| |
| TRACE("(%p)->(%p, %p, 0x%08x)\n", This, pdwEnum, pdwCount, dwFlags); |
| if (!pdwEnum || !pdwCount || (dwFlags != 0)) |
| return E_INVALIDARG; |
| |
| data = build_zonemap_from_reg(); |
| TRACE("found %d zones\n", data ? data[0] : -1); |
| |
| if (!data) |
| return E_FAIL; |
| |
| for (i = 0; i < This->zonemap_count; i++) { |
| if (This->zonemaps && !This->zonemaps[i]) { |
| This->zonemaps[i] = data; |
| *pdwEnum = i; |
| *pdwCount = data[0]; |
| return S_OK; |
| } |
| } |
| |
| if (This->zonemaps) { |
| /* try to double the nr. of pointers in the array */ |
| new_maps = heap_realloc_zero(This->zonemaps, This->zonemap_count * 2 * sizeof(LPDWORD)); |
| if (new_maps) |
| This->zonemap_count *= 2; |
| } |
| else |
| { |
| This->zonemap_count = 2; |
| new_maps = heap_alloc_zero(This->zonemap_count * sizeof(LPDWORD)); |
| } |
| |
| if (!new_maps) { |
| heap_free(data); |
| return E_FAIL; |
| } |
| This->zonemaps = new_maps; |
| This->zonemaps[i] = data; |
| *pdwEnum = i; |
| *pdwCount = data[0]; |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_GetZoneAt |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneAt(IInternetZoneManagerEx2* iface, |
| DWORD dwEnum, |
| DWORD dwIndex, |
| DWORD* pdwZone) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| LPDWORD data; |
| |
| TRACE("(%p)->(0x%08x, %d, %p)\n", This, dwEnum, dwIndex, pdwZone); |
| |
| /* make sure, that dwEnum and dwIndex are in the valid range */ |
| if (dwEnum < This->zonemap_count) { |
| if ((data = This->zonemaps[dwEnum])) { |
| if (dwIndex < data[0]) { |
| *pdwZone = data[dwIndex + 1]; |
| return S_OK; |
| } |
| } |
| } |
| return E_INVALIDARG; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_DestroyZoneEnumerator |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_DestroyZoneEnumerator(IInternetZoneManagerEx2* iface, |
| DWORD dwEnum) |
| { |
| ZoneMgrImpl* This = (ZoneMgrImpl*)iface; |
| LPDWORD data; |
| |
| TRACE("(%p)->(0x%08x)\n", This, dwEnum); |
| /* make sure, that dwEnum is valid */ |
| if (dwEnum < This->zonemap_count) { |
| if ((data = This->zonemaps[dwEnum])) { |
| This->zonemaps[dwEnum] = NULL; |
| heap_free(data); |
| return S_OK; |
| } |
| } |
| return E_INVALIDARG; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_CopyTemplatePoliciesToZone |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_CopyTemplatePoliciesToZone(IInternetZoneManagerEx2* iface, |
| DWORD dwTemplate, |
| DWORD dwZone, |
| DWORD dwReserved) |
| { |
| FIXME("(%p)->(%08x %08x %08x) stub\n", iface, dwTemplate, dwZone, dwReserved); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx_GetZoneActionPolicyEx |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneActionPolicyEx(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| DWORD dwAction, |
| BYTE* pPolicy, |
| DWORD cbPolicy, |
| URLZONEREG urlZoneReg, |
| DWORD dwFlags) |
| { |
| TRACE("(%p)->(%d, 0x%x, %p, %d, %d, 0x%x)\n", iface, dwZone, |
| dwAction, pPolicy, cbPolicy, urlZoneReg, dwFlags); |
| |
| if(!pPolicy) |
| return E_INVALIDARG; |
| |
| if (dwFlags) |
| FIXME("dwFlags 0x%x ignored\n", dwFlags); |
| |
| return get_action_policy(dwZone, dwAction, pPolicy, cbPolicy, urlZoneReg); |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx_SetZoneActionPolicyEx |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_SetZoneActionPolicyEx(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| DWORD dwAction, |
| BYTE* pPolicy, |
| DWORD cbPolicy, |
| URLZONEREG urlZoneReg, |
| DWORD dwFlags) |
| { |
| FIXME("(%p)->(%d, 0x%x, %p, %d, %d, 0x%x) stub\n", iface, dwZone, dwAction, pPolicy, |
| cbPolicy, urlZoneReg, dwFlags); |
| return E_NOTIMPL; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx2_GetZoneAttributesEx |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneAttributesEx(IInternetZoneManagerEx2* iface, |
| DWORD dwZone, |
| ZONEATTRIBUTES* pZoneAttributes, |
| DWORD dwFlags) |
| { |
| TRACE("(%p)->(%d, %p, 0x%x)\n", iface, dwZone, pZoneAttributes, dwFlags); |
| |
| if (dwFlags) |
| FIXME("dwFlags 0x%x ignored\n", dwFlags); |
| |
| return IInternetZoneManager_GetZoneAttributes(iface, dwZone, pZoneAttributes); |
| } |
| |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx2_GetZoneSecurityState |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetZoneSecurityState(IInternetZoneManagerEx2* iface, |
| DWORD dwZoneIndex, |
| BOOL fRespectPolicy, |
| LPDWORD pdwState, |
| BOOL *pfPolicyEncountered) |
| { |
| FIXME("(%p)->(%d, %d, %p, %p) stub\n", iface, dwZoneIndex, fRespectPolicy, |
| pdwState, pfPolicyEncountered); |
| |
| *pdwState = SECURITY_IE_STATE_GREEN; |
| |
| if (pfPolicyEncountered) |
| *pfPolicyEncountered = FALSE; |
| |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx2_GetIESecurityState |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_GetIESecurityState(IInternetZoneManagerEx2* iface, |
| BOOL fRespectPolicy, |
| LPDWORD pdwState, |
| BOOL *pfPolicyEncountered, |
| BOOL fNoCache) |
| { |
| FIXME("(%p)->(%d, %p, %p, %d) stub\n", iface, fRespectPolicy, pdwState, |
| pfPolicyEncountered, fNoCache); |
| |
| *pdwState = SECURITY_IE_STATE_GREEN; |
| |
| if (pfPolicyEncountered) |
| *pfPolicyEncountered = FALSE; |
| |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManagerEx2_FixInsecureSettings |
| */ |
| static HRESULT WINAPI ZoneMgrImpl_FixInsecureSettings(IInternetZoneManagerEx2* iface) |
| { |
| FIXME("(%p) stub\n", iface); |
| return S_OK; |
| } |
| |
| /******************************************************************** |
| * IInternetZoneManager_Construct |
| */ |
| static const IInternetZoneManagerEx2Vtbl ZoneMgrImplVtbl = { |
| ZoneMgrImpl_QueryInterface, |
| ZoneMgrImpl_AddRef, |
| ZoneMgrImpl_Release, |
| /* IInternetZoneManager */ |
| ZoneMgrImpl_GetZoneAttributes, |
| ZoneMgrImpl_SetZoneAttributes, |
| ZoneMgrImpl_GetZoneCustomPolicy, |
| ZoneMgrImpl_SetZoneCustomPolicy, |
| ZoneMgrImpl_GetZoneActionPolicy, |
| ZoneMgrImpl_SetZoneActionPolicy, |
| ZoneMgrImpl_PromptAction, |
| ZoneMgrImpl_LogAction, |
| ZoneMgrImpl_CreateZoneEnumerator, |
| ZoneMgrImpl_GetZoneAt, |
| ZoneMgrImpl_DestroyZoneEnumerator, |
| ZoneMgrImpl_CopyTemplatePoliciesToZone, |
| /* IInternetZoneManagerEx */ |
| ZoneMgrImpl_GetZoneActionPolicyEx, |
| ZoneMgrImpl_SetZoneActionPolicyEx, |
| /* IInternetZoneManagerEx2 */ |
| ZoneMgrImpl_GetZoneAttributesEx, |
| ZoneMgrImpl_GetZoneSecurityState, |
| ZoneMgrImpl_GetIESecurityState, |
| ZoneMgrImpl_FixInsecureSettings, |
| }; |
| |
| HRESULT ZoneMgrImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj) |
| { |
| ZoneMgrImpl* ret = heap_alloc_zero(sizeof(ZoneMgrImpl)); |
| |
| TRACE("(%p %p)\n", pUnkOuter, ppobj); |
| ret->lpVtbl = &ZoneMgrImplVtbl; |
| ret->ref = 1; |
| *ppobj = (IInternetZoneManagerEx*)ret; |
| |
| URLMON_LockModule(); |
| |
| return S_OK; |
| } |
| |
| /*********************************************************************** |
| * CoInternetCreateSecurityManager (URLMON.@) |
| * |
| */ |
| HRESULT WINAPI CoInternetCreateSecurityManager( IServiceProvider *pSP, |
| IInternetSecurityManager **ppSM, DWORD dwReserved ) |
| { |
| TRACE("%p %p %d\n", pSP, ppSM, dwReserved ); |
| |
| if(pSP) |
| FIXME("pSP not supported\n"); |
| |
| return SecManagerImpl_Construct(NULL, (void**) ppSM); |
| } |
| |
| /******************************************************************** |
| * CoInternetCreateZoneManager (URLMON.@) |
| */ |
| HRESULT WINAPI CoInternetCreateZoneManager(IServiceProvider* pSP, IInternetZoneManager** ppZM, DWORD dwReserved) |
| { |
| TRACE("(%p %p %x)\n", pSP, ppZM, dwReserved); |
| return ZoneMgrImpl_Construct(NULL, (void**)ppZM); |
| } |
| |
| /******************************************************************** |
| * CoInternetGetSecurityUrl (URLMON.@) |
| */ |
| HRESULT WINAPI CoInternetGetSecurityUrl(LPCWSTR pwzUrl, LPWSTR *ppwzSecUrl, PSUACTION psuAction, DWORD dwReserved) |
| { |
| WCHAR buf1[INTERNET_MAX_URL_LENGTH], buf2[INTERNET_MAX_URL_LENGTH]; |
| LPWSTR url, domain; |
| DWORD len; |
| HRESULT hres; |
| |
| TRACE("(%p,%p,%u,%u)\n", pwzUrl, ppwzSecUrl, psuAction, dwReserved); |
| |
| url = buf1; |
| domain = buf2; |
| strcpyW(url, pwzUrl); |
| |
| while(1) { |
| hres = CoInternetParseUrl(url, PARSE_SECURITY_URL, 0, domain, INTERNET_MAX_URL_LENGTH, &len, 0); |
| if(hres!=S_OK || !strcmpW(url, domain)) |
| break; |
| |
| if(url == buf1) { |
| url = buf2; |
| domain = buf1; |
| } else { |
| url = buf1; |
| domain = buf2; |
| } |
| } |
| |
| if(psuAction==PSU_SECURITY_URL_ONLY) { |
| len = lstrlenW(url)+1; |
| *ppwzSecUrl = CoTaskMemAlloc(len*sizeof(WCHAR)); |
| if(!*ppwzSecUrl) |
| return E_OUTOFMEMORY; |
| |
| memcpy(*ppwzSecUrl, url, len*sizeof(WCHAR)); |
| return S_OK; |
| } |
| |
| hres = CoInternetParseUrl(url, PARSE_SECURITY_DOMAIN, 0, domain, |
| INTERNET_MAX_URL_LENGTH, &len, 0); |
| if(SUCCEEDED(hres)) { |
| len++; |
| *ppwzSecUrl = CoTaskMemAlloc(len*sizeof(WCHAR)); |
| if(!*ppwzSecUrl) |
| return E_OUTOFMEMORY; |
| |
| memcpy(*ppwzSecUrl, domain, len*sizeof(WCHAR)); |
| return S_OK; |
| } |
| |
| hres = CoInternetParseUrl(url, PARSE_SCHEMA, 0, domain, |
| INTERNET_MAX_URL_LENGTH, &len, 0); |
| if(hres == S_OK){ |
| const WCHAR fileW[] = {'f','i','l','e',0}; |
| if(!strcmpW(domain, fileW)){ |
| hres = CoInternetParseUrl(url, PARSE_ROOTDOCUMENT, 0, domain, INTERNET_MAX_URL_LENGTH, &len, 0); |
| }else{ |
| domain[len] = ':'; |
| hres = CoInternetParseUrl(url, PARSE_DOMAIN, 0, domain+len+1, |
| INTERNET_MAX_URL_LENGTH-len-1, &len, 0); |
| if(hres == S_OK) { |
| len = lstrlenW(domain)+1; |
| *ppwzSecUrl = CoTaskMemAlloc(len*sizeof(WCHAR)); |
| if(!*ppwzSecUrl) |
| return E_OUTOFMEMORY; |
| |
| memcpy(*ppwzSecUrl, domain, len*sizeof(WCHAR)); |
| return S_OK; |
| } |
| } |
| }else |
| return hres; |
| |
| len = lstrlenW(url)+1; |
| *ppwzSecUrl = CoTaskMemAlloc(len*sizeof(WCHAR)); |
| if(!*ppwzSecUrl) |
| return E_OUTOFMEMORY; |
| |
| memcpy(*ppwzSecUrl, url, len*sizeof(WCHAR)); |
| return S_OK; |
| } |