2 * Internet Security and Zone Manager
4 * Copyright (c) 2004 Huw D M Davies
5 * Copyright 2004 Jacek Caban
6 * Copyright 2009 Detlef Riekenberg
7 * Copyright 2011 Thomas Mullaly for CodeWeavers
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
26 #include "urlmon_main.h"
30 #define NO_SHLWAPI_REG
33 #include "wine/debug.h"
35 WINE_DEFAULT_DEBUG_CHANNEL(urlmon);
37 static const WCHAR currentlevelW[] = {'C','u','r','r','e','n','t','L','e','v','e','l',0};
38 static const WCHAR descriptionW[] = {'D','e','s','c','r','i','p','t','i','o','n',0};
39 static const WCHAR displaynameW[] = {'D','i','s','p','l','a','y','N','a','m','e',0};
40 static const WCHAR fileW[] = {'f','i','l','e',0};
41 static const WCHAR flagsW[] = {'F','l','a','g','s',0};
42 static const WCHAR iconW[] = {'I','c','o','n',0};
43 static const WCHAR minlevelW[] = {'M','i','n','L','e','v','e','l',0};
44 static const WCHAR recommendedlevelW[] = {'R','e','c','o','m','m','e','n','d','e','d',
45 'L','e','v','e','l',0};
46 static const WCHAR wszZonesKey[] = {'S','o','f','t','w','a','r','e','\\',
47 'M','i','c','r','o','s','o','f','t','\\',
48 'W','i','n','d','o','w','s','\\',
49 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
50 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
51 'Z','o','n','e','s','\\',0};
52 static const WCHAR wszZoneMapDomainsKey[] = {'S','o','f','t','w','a','r','e','\\',
53 'M','i','c','r','o','s','o','f','t','\\',
54 'W','i','n','d','o','w','s','\\',
55 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
56 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
57 'Z','o','n','e','M','a','p','\\',
58 'D','o','m','a','i','n','s',0};
60 static inline BOOL is_drive_path(const WCHAR *path)
62 return isalphaW(*path) && *(path+1) == ':';
65 /* List of schemes types Windows seems to expect to be hierarchical. */
66 static inline BOOL is_hierarchical_scheme(URL_SCHEME type) {
67 return(type == URL_SCHEME_HTTP || type == URL_SCHEME_FTP ||
68 type == URL_SCHEME_GOPHER || type == URL_SCHEME_NNTP ||
69 type == URL_SCHEME_TELNET || type == URL_SCHEME_WAIS ||
70 type == URL_SCHEME_FILE || type == URL_SCHEME_HTTPS ||
71 type == URL_SCHEME_RES);
74 /********************************************************************
75 * get_string_from_reg [internal]
77 * helper to get a string from the reg.
80 static void get_string_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPWSTR out, DWORD maxlen)
83 DWORD len = maxlen * sizeof(WCHAR);
86 res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len);
89 len = maxlen * sizeof(WCHAR);
91 res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len);
95 TRACE("%s failed: %d\n", debugstr_w(name), res);
100 /********************************************************************
101 * get_dword_from_reg [internal]
103 * helper to get a dword from the reg.
106 static void get_dword_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPDWORD out)
108 DWORD type = REG_DWORD;
109 DWORD len = sizeof(DWORD);
112 res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len);
117 res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len);
121 TRACE("%s failed: %d\n", debugstr_w(name), res);
126 static HRESULT get_zone_from_reg(LPCWSTR schema, DWORD *zone)
131 static const WCHAR wszZoneMapProtocolKey[] =
132 {'S','o','f','t','w','a','r','e','\\',
133 'M','i','c','r','o','s','o','f','t','\\',
134 'W','i','n','d','o','w','s','\\',
135 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
136 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
137 'Z','o','n','e','M','a','p','\\',
138 'P','r','o','t','o','c','o','l','D','e','f','a','u','l','t','s',0};
140 res = RegOpenKeyW(HKEY_CURRENT_USER, wszZoneMapProtocolKey, &hkey);
141 if(res != ERROR_SUCCESS) {
142 ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey));
146 size = sizeof(DWORD);
147 res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size);
149 if(res == ERROR_SUCCESS)
152 res = RegOpenKeyW(HKEY_LOCAL_MACHINE, wszZoneMapProtocolKey, &hkey);
153 if(res != ERROR_SUCCESS) {
154 ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey));
158 size = sizeof(DWORD);
159 res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size);
161 if(res == ERROR_SUCCESS)
168 /********************************************************************
169 * matches_domain_pattern [internal]
171 * Checks if the given string matches the specified domain pattern.
173 * This function looks for explicit wildcard domain components iff
174 * they appear at the very beginning of the 'pattern' string
176 * pattern = "*.google.com"
178 static BOOL matches_domain_pattern(LPCWSTR pattern, LPCWSTR str, BOOL implicit_wildcard, LPCWSTR *matched)
180 BOOL matches = FALSE;
181 DWORD pattern_len = strlenW(pattern);
182 DWORD str_len = strlenW(str);
184 TRACE("(%d) Checking if %s matches %s\n", implicit_wildcard, debugstr_w(str), debugstr_w(pattern));
187 if(str_len >= pattern_len) {
188 /* Check if there's an explicit wildcard in the pattern. */
189 if(pattern[0] == '*' && pattern[1] == '.') {
190 /* Make sure that 'str' matches the wildcard pattern.
193 * pattern = "*.google.com"
195 * So in this case 'str' would have to end with ".google.com" in order
196 * to map to this pattern.
198 if(str_len >= pattern_len+1 && !strcmpiW(str+(str_len-pattern_len+1), pattern+1)) {
199 /* Check if there's another '.' inside of the "unmatched" portion
203 * pattern = "*.google.com"
204 * str = "test.testing.google.com"
206 * The currently matched portion is ".google.com" in 'str', we need
207 * see if there's a '.' inside of the unmatched portion ("test.testing"), because
208 * if there is and 'implicit_wildcard' isn't set, then this isn't
212 if(str_len > pattern_len+1 && (ptr = memrchrW(str, '.', str_len-pattern_len-2))) {
213 if(implicit_wildcard) {
222 } else if(implicit_wildcard && str_len > pattern_len) {
223 /* When the pattern has an implicit wildcard component, it means
224 * that anything goes in 'str' as long as it ends with the pattern
225 * and that the beginning of the match has a '.' before it.
228 * pattern = "google.com"
229 * str = "www.google.com"
231 * Implicitly matches the pattern, where as:
233 * pattern = "google.com"
234 * str = "wwwgoogle.com"
236 * Doesn't match the pattern.
238 if(str_len > pattern_len) {
239 if(str[str_len-pattern_len-1] == '.' && !strcmpiW(str+(str_len-pattern_len), pattern)) {
241 *matched = str+(str_len-pattern_len);
245 /* The pattern doesn't have an implicit wildcard, or an explicit wildcard,
246 * so 'str' has to be an exact match to the 'pattern'.
248 if(!strcmpiW(str, pattern)) {
256 TRACE("Found a match: matched=%s\n", debugstr_w(*matched));
258 TRACE("No match found\n");
263 static BOOL get_zone_for_scheme(HKEY key, LPCWSTR schema, DWORD *zone)
265 static const WCHAR wildcardW[] = {'*',0};
268 DWORD size = sizeof(DWORD);
271 /* See if the key contains a value for the scheme first. */
272 res = RegQueryValueExW(key, schema, NULL, &type, (BYTE*)zone, &size);
273 if(res == ERROR_SUCCESS) {
274 if(type == REG_DWORD)
276 WARN("Unexpected value type %d for value %s, expected REG_DWORD\n", type, debugstr_w(schema));
279 /* Try to get the zone for the wildcard scheme. */
280 size = sizeof(DWORD);
281 res = RegQueryValueExW(key, wildcardW, NULL, &type, (BYTE*)zone, &size);
282 if(res != ERROR_SUCCESS)
285 if(type != REG_DWORD) {
286 WARN("Unexpected value type %d for value %s, expected REG_DWORD\n", type, debugstr_w(wildcardW));
293 /********************************************************************
294 * search_domain_for_zone [internal]
296 * Searches the specified 'domain' registry key to see if 'host' maps into it, or any
297 * of it's subdomain registry keys.
299 * Returns S_OK if a match is found, S_FALSE if no matches were found, or an error code.
301 static HRESULT search_domain_for_zone(HKEY domains, LPCWSTR domain, DWORD domain_len, LPCWSTR schema,
302 LPCWSTR host, DWORD host_len, DWORD *zone)
309 if(host_len >= domain_len && matches_domain_pattern(domain, host, TRUE, &matched)) {
310 res = RegOpenKeyW(domains, domain, &domain_key);
311 if(res != ERROR_SUCCESS) {
312 ERR("Failed to open domain key %s: %d\n", debugstr_w(domain), res);
317 found = get_zone_for_scheme(domain_key, schema, zone);
320 DWORD subdomain_count, subdomain_len;
321 BOOL check_domain = TRUE;
323 find_domain_name(domain, domain_len, &domain_offset);
325 res = RegQueryInfoKeyW(domain_key, NULL, NULL, NULL, &subdomain_count, &subdomain_len,
326 NULL, NULL, NULL, NULL, NULL, NULL);
327 if(res != ERROR_SUCCESS) {
328 ERR("Unable to query info for key %s: %d\n", debugstr_w(domain), res);
329 RegCloseKey(domain_key);
333 if(subdomain_count) {
338 subdomain = heap_alloc((subdomain_len+1)*sizeof(WCHAR));
340 RegCloseKey(domain_key);
341 return E_OUTOFMEMORY;
344 component = heap_strndupW(host, matched-host-1);
346 heap_free(subdomain);
347 RegCloseKey(domain_key);
348 return E_OUTOFMEMORY;
351 for(i = 0; i < subdomain_count; ++i) {
352 DWORD len = subdomain_len+1;
353 const WCHAR *sub_matched;
355 res = RegEnumKeyExW(domain_key, i, subdomain, &len, NULL, NULL, NULL, NULL);
356 if(res != ERROR_SUCCESS) {
357 heap_free(component);
358 heap_free(subdomain);
359 RegCloseKey(domain_key);
363 if(matches_domain_pattern(subdomain, component, FALSE, &sub_matched)) {
366 res = RegOpenKeyW(domain_key, subdomain, &subdomain_key);
367 if(res != ERROR_SUCCESS) {
368 ERR("Unable to open subdomain key %s of %s: %d\n", debugstr_w(subdomain),
369 debugstr_w(domain), res);
370 heap_free(component);
371 heap_free(subdomain);
372 RegCloseKey(domain_key);
376 found = get_zone_for_scheme(subdomain_key, schema, zone);
377 check_domain = FALSE;
378 RegCloseKey(subdomain_key);
382 heap_free(subdomain);
383 heap_free(component);
386 /* There's a chance that 'host' implicitly mapped into 'domain', in
387 * which case we check to see if 'domain' contains zone information.
389 * This can only happen if 'domain' is it's own domain name.
391 * "google.com" (domain name = "google.com")
394 * host = "www.google.com"
396 * Then host would map directly into the "google.com" domain key.
398 * If 'domain' has more than just it's domain name, or it does not
399 * have a domain name, then we don't perform the check. The reason
400 * for this is that these domains don't allow implicit mappings.
402 * domain = "org" (has no domain name)
405 * The mapping would only happen if the "org" key had an explicit subkey
408 if(check_domain && !domain_offset && !strchrW(host, matched-host-1))
409 found = get_zone_for_scheme(domain_key, schema, zone);
411 RegCloseKey(domain_key);
414 return found ? S_OK : S_FALSE;
417 static HRESULT search_for_domain_mapping(HKEY domains, LPCWSTR schema, LPCWSTR host, DWORD host_len, DWORD *zone)
420 DWORD domain_count, domain_len, i;
422 HRESULT hres = S_FALSE;
424 res = RegQueryInfoKeyW(domains, NULL, NULL, NULL, &domain_count, &domain_len,
425 NULL, NULL, NULL, NULL, NULL, NULL);
426 if(res != ERROR_SUCCESS) {
427 WARN("Failed to retrieve information about key\n");
434 domain = heap_alloc((domain_len+1)*sizeof(WCHAR));
436 return E_OUTOFMEMORY;
438 for(i = 0; i < domain_count; ++i) {
439 DWORD len = domain_len+1;
441 res = RegEnumKeyExW(domains, i, domain, &len, NULL, NULL, NULL, NULL);
442 if(res != ERROR_SUCCESS) {
447 hres = search_domain_for_zone(domains, domain, len, schema, host, host_len, zone);
448 if(FAILED(hres) || hres == S_OK)
456 static HRESULT get_zone_from_domains(IUri *uri, DWORD *zone)
464 hres = IUri_GetScheme(uri, &scheme_type);
468 /* Windows doesn't play nice with unknown scheme types when it tries
469 * to check if a host name maps into any domains.
471 if(scheme_type == URL_SCHEME_UNKNOWN)
474 hres = IUri_GetHost(uri, &host);
478 /* Known hierarchical scheme types must have a host. If they don't Windows
479 * assigns URLZONE_INVALID to the zone.
481 if((scheme_type != URL_SCHEME_UNKNOWN && scheme_type != URL_SCHEME_FILE)
482 && is_hierarchical_scheme(scheme_type) && !*host) {
483 *zone = URLZONE_INVALID;
487 /* The MapUrlToZone functions return S_OK when this condition occurs. */
491 hres = IUri_GetSchemeName(uri, &scheme);
497 /* First try CURRENT_USER. */
498 res = RegOpenKeyW(HKEY_CURRENT_USER, wszZoneMapDomainsKey, &domains);
499 if(res == ERROR_SUCCESS) {
500 hres = search_for_domain_mapping(domains, scheme, host, SysStringLen(host), zone);
501 RegCloseKey(domains);
503 WARN("Failed to open HKCU's %s key\n", debugstr_w(wszZoneMapDomainsKey));
505 /* If that doesn't work try LOCAL_MACHINE. */
506 if(hres == S_FALSE) {
507 res = RegOpenKeyW(HKEY_LOCAL_MACHINE, wszZoneMapDomainsKey, &domains);
508 if(res == ERROR_SUCCESS) {
509 hres = search_for_domain_mapping(domains, scheme, host, SysStringLen(host), zone);
510 RegCloseKey(domains);
512 WARN("Failed to open HKLM's %s key\n", debugstr_w(wszZoneMapDomainsKey));
516 SysFreeString(scheme);
520 static HRESULT map_security_uri_to_zone(IUri *uri, DWORD *zone)
525 *zone = URLZONE_INVALID;
527 hres = IUri_GetSchemeName(uri, &scheme);
531 if(!strcmpiW(scheme, fileW)) {
533 WCHAR *ptr, *path_start, root[20];
535 hres = IUri_GetPath(uri, &path);
537 SysFreeString(scheme);
541 if(*path == '/' && is_drive_path(path+1))
546 if((ptr = strchrW(path_start, ':')) && ptr-path_start+1 < sizeof(root)/sizeof(WCHAR)) {
549 memcpy(root, path_start, (ptr-path_start+1)*sizeof(WCHAR));
550 root[ptr-path_start+1] = 0;
552 type = GetDriveTypeW(root);
556 case DRIVE_NO_ROOT_DIR:
558 case DRIVE_REMOVABLE:
562 *zone = URLZONE_LOCAL_MACHINE;
566 *zone = URLZONE_INTERNET;
570 FIXME("unsupported drive type %d\n", type);
576 if(*zone == URLZONE_INVALID) {
577 hres = get_zone_from_domains(uri, zone);
579 hres = get_zone_from_reg(scheme, zone);
582 SysFreeString(scheme);
586 static HRESULT map_url_to_zone(LPCWSTR url, DWORD *zone, LPWSTR *ret_url)
592 *zone = URLZONE_INVALID;
594 hres = CoInternetGetSecurityUrl(url, &secur_url, PSU_SECURITY_URL_ONLY, 0);
596 DWORD size = strlenW(url)*sizeof(WCHAR);
598 secur_url = CoTaskMemAlloc(size);
600 return E_OUTOFMEMORY;
602 memcpy(secur_url, url, size);
605 hres = CreateUri(secur_url, Uri_CREATE_ALLOW_IMPLICIT_FILE_SCHEME, 0, &secur_uri);
607 CoTaskMemFree(secur_url);
611 hres = map_security_uri_to_zone(secur_uri, zone);
612 IUri_Release(secur_uri);
614 if(FAILED(hres) || !ret_url)
615 CoTaskMemFree(secur_url);
617 *ret_url = secur_url;
622 static HRESULT map_uri_to_zone(IUri *uri, DWORD *zone, IUri **ret_uri)
627 hres = CoInternetGetSecurityUrlEx(uri, &secur_uri, PSU_SECURITY_URL_ONLY, 0);
631 hres = map_security_uri_to_zone(secur_uri, zone);
632 if(FAILED(hres) || !ret_uri)
633 IUri_Release(secur_uri);
635 *ret_uri = secur_uri;
640 static HRESULT open_zone_key(HKEY parent_key, DWORD zone, HKEY *hkey)
642 static const WCHAR wszFormat[] = {'%','s','%','u',0};
644 WCHAR key_name[sizeof(wszZonesKey)/sizeof(WCHAR)+12];
647 wsprintfW(key_name, wszFormat, wszZonesKey, zone);
649 res = RegOpenKeyW(parent_key, key_name, hkey);
651 if(res != ERROR_SUCCESS) {
652 WARN("RegOpenKey failed\n");
659 static HRESULT get_action_policy(DWORD zone, DWORD action, BYTE *policy, DWORD size, URLZONEREG zone_reg)
667 case URLACTION_SCRIPT_OVERRIDE_SAFETY:
668 case URLACTION_ACTIVEX_OVERRIDE_SCRIPT_SAFETY:
669 *(DWORD*)policy = URLPOLICY_DISALLOW;
674 case URLZONEREG_DEFAULT:
675 case URLZONEREG_HKCU:
676 parent_key = HKEY_CURRENT_USER;
678 case URLZONEREG_HKLM:
679 parent_key = HKEY_LOCAL_MACHINE;
682 WARN("Unknown URLZONEREG: %d\n", zone_reg);
686 hres = open_zone_key(parent_key, zone, &hkey);
687 if(SUCCEEDED(hres)) {
688 WCHAR action_str[16];
691 static const WCHAR formatW[] = {'%','X',0};
693 wsprintfW(action_str, formatW, action);
695 res = RegQueryValueExW(hkey, action_str, NULL, NULL, policy, &len);
696 if(res == ERROR_MORE_DATA) {
698 }else if(res == ERROR_FILE_NOT_FOUND) {
700 }else if(res != ERROR_SUCCESS) {
701 ERR("RegQueryValue failed: %d\n", res);
708 if(FAILED(hres) && zone_reg == URLZONEREG_DEFAULT)
709 return get_action_policy(zone, action, policy, size, URLZONEREG_HKLM);
714 static HRESULT generate_security_id(IUri *uri, BYTE *secid, DWORD *secid_len, DWORD zone)
720 if(zone == URLZONE_INVALID)
723 hres = IUri_GetScheme(uri, &scheme_type);
727 /* Windows handles opaque URLs differently then hierarchical ones. */
728 if(!is_hierarchical_scheme(scheme_type) && scheme_type != URL_SCHEME_WILDCARD) {
731 hres = IUri_GetDisplayUri(uri, &display_uri);
735 len = WideCharToMultiByte(CP_ACP, 0, display_uri, -1, NULL, 0, NULL, NULL)-1;
737 if(len+sizeof(DWORD) > *secid_len) {
738 SysFreeString(display_uri);
739 return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER);
742 WideCharToMultiByte(CP_ACP, 0, display_uri, -1, (LPSTR)secid, len, NULL, NULL);
743 SysFreeString(display_uri);
745 *(DWORD*)(secid+len) = zone;
748 DWORD host_len, scheme_len;
751 hres = IUri_GetHost(uri, &host);
755 /* The host can't be empty for Wildcard URIs. */
756 if(scheme_type == URL_SCHEME_WILDCARD && !*host) {
761 hres = IUri_GetSchemeName(uri, &scheme);
767 host_len = WideCharToMultiByte(CP_ACP, 0, host, -1, NULL, 0, NULL, NULL)-1;
768 scheme_len = WideCharToMultiByte(CP_ACP, 0, scheme, -1, NULL, 0, NULL, NULL)-1;
770 len = host_len+scheme_len+sizeof(BYTE);
772 if(len+sizeof(DWORD) > *secid_len) {
774 SysFreeString(scheme);
775 return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER);
778 WideCharToMultiByte(CP_ACP, 0, scheme, -1, (LPSTR)secid, len, NULL, NULL);
779 SysFreeString(scheme);
781 ptr = secid+scheme_len;
784 WideCharToMultiByte(CP_ACP, 0, host, -1, (LPSTR)ptr, host_len, NULL, NULL);
792 *secid_len = len+sizeof(DWORD);
797 static HRESULT get_security_id_for_url(LPCWSTR url, BYTE *secid, DWORD *secid_len)
800 DWORD zone = URLZONE_INVALID;
801 LPWSTR secur_url = NULL;
804 hres = map_url_to_zone(url, &zone, &secur_url);
806 return hres == 0x80041001 ? E_INVALIDARG : hres;
808 hres = CreateUri(secur_url, Uri_CREATE_ALLOW_IMPLICIT_FILE_SCHEME, 0, &uri);
809 CoTaskMemFree(secur_url);
813 hres = generate_security_id(uri, secid, secid_len, zone);
819 static HRESULT get_security_id_for_uri(IUri *uri, BYTE *secid, DWORD *secid_len)
823 DWORD zone = URLZONE_INVALID;
825 hres = map_uri_to_zone(uri, &zone, &secur_uri);
829 hres = generate_security_id(secur_uri, secid, secid_len, zone);
830 IUri_Release(secur_uri);
835 /***********************************************************************
836 * InternetSecurityManager implementation
840 IInternetSecurityManagerEx2 IInternetSecurityManagerEx2_iface;
844 IInternetSecurityMgrSite *mgrsite;
845 IInternetSecurityManager *custom_manager;
848 static inline SecManagerImpl *impl_from_IInternetSecurityManagerEx2(IInternetSecurityManagerEx2 *iface)
850 return CONTAINING_RECORD(iface, SecManagerImpl, IInternetSecurityManagerEx2_iface);
853 static HRESULT WINAPI SecManagerImpl_QueryInterface(IInternetSecurityManagerEx2* iface,REFIID riid,void** ppvObject)
855 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
857 TRACE("(%p)->(%s,%p)\n",This,debugstr_guid(riid),ppvObject);
859 /* Perform a sanity check on the parameters.*/
860 if ( (This==0) || (ppvObject==0) )
863 /* Initialize the return parameter */
866 /* Compare the riid with the interface IDs implemented by this object.*/
867 if (IsEqualIID(&IID_IUnknown, riid) ||
868 IsEqualIID(&IID_IInternetSecurityManager, riid) ||
869 IsEqualIID(&IID_IInternetSecurityManagerEx, riid) ||
870 IsEqualIID(&IID_IInternetSecurityManagerEx2, riid))
873 /* Check that we obtained an interface.*/
875 WARN("not supported interface %s\n", debugstr_guid(riid));
876 return E_NOINTERFACE;
879 /* Query Interface always increases the reference count by one when it is successful */
880 IInternetSecurityManager_AddRef(iface);
885 static ULONG WINAPI SecManagerImpl_AddRef(IInternetSecurityManagerEx2* iface)
887 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
888 ULONG refCount = InterlockedIncrement(&This->ref);
890 TRACE("(%p) ref=%u\n", This, refCount);
895 static ULONG WINAPI SecManagerImpl_Release(IInternetSecurityManagerEx2* iface)
897 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
898 ULONG refCount = InterlockedDecrement(&This->ref);
900 TRACE("(%p) ref=%u\n", This, refCount);
902 /* destroy the object if there's no more reference on it */
905 IInternetSecurityMgrSite_Release(This->mgrsite);
906 if(This->custom_manager)
907 IInternetSecurityManager_Release(This->custom_manager);
911 URLMON_UnlockModule();
917 static HRESULT WINAPI SecManagerImpl_SetSecuritySite(IInternetSecurityManagerEx2 *iface,
918 IInternetSecurityMgrSite *pSite)
920 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
922 TRACE("(%p)->(%p)\n", This, pSite);
925 IInternetSecurityMgrSite_Release(This->mgrsite);
927 if(This->custom_manager) {
928 IInternetSecurityManager_Release(This->custom_manager);
929 This->custom_manager = NULL;
932 This->mgrsite = pSite;
935 IServiceProvider *servprov;
938 IInternetSecurityMgrSite_AddRef(pSite);
940 hres = IInternetSecurityMgrSite_QueryInterface(pSite, &IID_IServiceProvider,
942 if(SUCCEEDED(hres)) {
943 IServiceProvider_QueryService(servprov, &SID_SInternetSecurityManager,
944 &IID_IInternetSecurityManager, (void**)&This->custom_manager);
945 IServiceProvider_Release(servprov);
952 static HRESULT WINAPI SecManagerImpl_GetSecuritySite(IInternetSecurityManagerEx2 *iface,
953 IInternetSecurityMgrSite **ppSite)
955 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
957 TRACE("(%p)->(%p)\n", This, ppSite);
963 IInternetSecurityMgrSite_AddRef(This->mgrsite);
965 *ppSite = This->mgrsite;
969 static HRESULT WINAPI SecManagerImpl_MapUrlToZone(IInternetSecurityManagerEx2 *iface,
970 LPCWSTR pwszUrl, DWORD *pdwZone,
973 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
976 TRACE("(%p)->(%s %p %08x)\n", iface, debugstr_w(pwszUrl), pdwZone, dwFlags);
978 if(This->custom_manager) {
979 hres = IInternetSecurityManager_MapUrlToZone(This->custom_manager,
980 pwszUrl, pdwZone, dwFlags);
981 if(hres != INET_E_DEFAULT_ACTION)
986 *pdwZone = URLZONE_INVALID;
991 FIXME("not supported flags: %08x\n", dwFlags);
993 return map_url_to_zone(pwszUrl, pdwZone, NULL);
996 static HRESULT WINAPI SecManagerImpl_GetSecurityId(IInternetSecurityManagerEx2 *iface,
997 LPCWSTR pwszUrl, BYTE *pbSecurityId, DWORD *pcbSecurityId, DWORD_PTR dwReserved)
999 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1001 TRACE("(%p)->(%s %p %p %08lx)\n", iface, debugstr_w(pwszUrl), pbSecurityId,
1002 pcbSecurityId, dwReserved);
1004 if(This->custom_manager) {
1007 hres = IInternetSecurityManager_GetSecurityId(This->custom_manager,
1008 pwszUrl, pbSecurityId, pcbSecurityId, dwReserved);
1009 if(hres != INET_E_DEFAULT_ACTION)
1013 if(!pwszUrl || !pbSecurityId || !pcbSecurityId)
1014 return E_INVALIDARG;
1017 FIXME("dwReserved is not supported\n");
1019 return get_security_id_for_url(pwszUrl, pbSecurityId, pcbSecurityId);
1023 static HRESULT WINAPI SecManagerImpl_ProcessUrlAction(IInternetSecurityManagerEx2 *iface,
1024 LPCWSTR pwszUrl, DWORD dwAction,
1025 BYTE *pPolicy, DWORD cbPolicy,
1026 BYTE *pContext, DWORD cbContext,
1027 DWORD dwFlags, DWORD dwReserved)
1029 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1033 TRACE("(%p)->(%s %08x %p %08x %p %08x %08x %08x)\n", iface, debugstr_w(pwszUrl), dwAction,
1034 pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved);
1036 if(This->custom_manager) {
1037 hres = IInternetSecurityManager_ProcessUrlAction(This->custom_manager, pwszUrl, dwAction,
1038 pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved);
1039 if(hres != INET_E_DEFAULT_ACTION)
1043 if(dwFlags || dwReserved)
1044 FIXME("Unsupported arguments\n");
1047 return E_INVALIDARG;
1049 hres = map_url_to_zone(pwszUrl, &zone, NULL);
1053 hres = get_action_policy(zone, dwAction, (BYTE*)&policy, sizeof(policy), URLZONEREG_DEFAULT);
1057 TRACE("policy %x\n", policy);
1058 if(cbPolicy >= sizeof(DWORD))
1059 *(DWORD*)pPolicy = policy;
1061 switch(GetUrlPolicyPermissions(policy)) {
1062 case URLPOLICY_ALLOW:
1063 case URLPOLICY_CHANNEL_SOFTDIST_PRECACHE:
1065 case URLPOLICY_DISALLOW:
1067 case URLPOLICY_QUERY:
1068 FIXME("URLPOLICY_QUERY not implemented\n");
1071 FIXME("Not implemented policy %x\n", policy);
1078 static HRESULT WINAPI SecManagerImpl_QueryCustomPolicy(IInternetSecurityManagerEx2 *iface,
1079 LPCWSTR pwszUrl, REFGUID guidKey,
1080 BYTE **ppPolicy, DWORD *pcbPolicy,
1081 BYTE *pContext, DWORD cbContext,
1084 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1087 TRACE("(%p)->(%s %s %p %p %p %08x %08x )\n", iface, debugstr_w(pwszUrl), debugstr_guid(guidKey),
1088 ppPolicy, pcbPolicy, pContext, cbContext, dwReserved);
1090 if(This->custom_manager) {
1091 hres = IInternetSecurityManager_QueryCustomPolicy(This->custom_manager, pwszUrl, guidKey,
1092 ppPolicy, pcbPolicy, pContext, cbContext, dwReserved);
1093 if(hres != INET_E_DEFAULT_ACTION)
1097 WARN("Unknown guidKey %s\n", debugstr_guid(guidKey));
1098 return HRESULT_FROM_WIN32(ERROR_NOT_FOUND);
1101 static HRESULT WINAPI SecManagerImpl_SetZoneMapping(IInternetSecurityManagerEx2 *iface,
1102 DWORD dwZone, LPCWSTR pwszPattern, DWORD dwFlags)
1104 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1107 TRACE("(%p)->(%08x %s %08x)\n", iface, dwZone, debugstr_w(pwszPattern),dwFlags);
1109 if(This->custom_manager) {
1110 hres = IInternetSecurityManager_SetZoneMapping(This->custom_manager, dwZone,
1111 pwszPattern, dwFlags);
1112 if(hres != INET_E_DEFAULT_ACTION)
1116 FIXME("Default action is not implemented\n");
1120 static HRESULT WINAPI SecManagerImpl_GetZoneMappings(IInternetSecurityManagerEx2 *iface,
1121 DWORD dwZone, IEnumString **ppenumString, DWORD dwFlags)
1123 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1126 TRACE("(%p)->(%08x %p %08x)\n", iface, dwZone, ppenumString,dwFlags);
1128 if(This->custom_manager) {
1129 hres = IInternetSecurityManager_GetZoneMappings(This->custom_manager, dwZone,
1130 ppenumString, dwFlags);
1131 if(hres != INET_E_DEFAULT_ACTION)
1135 FIXME("Default action is not implemented\n");
1139 static HRESULT WINAPI SecManagerImpl_ProcessUrlActionEx(IInternetSecurityManagerEx2 *iface,
1140 LPCWSTR pwszUrl, DWORD dwAction, BYTE *pPolicy, DWORD cbPolicy, BYTE *pContext, DWORD cbContext,
1141 DWORD dwFlags, DWORD dwReserved, DWORD *pdwOutFlags)
1143 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1144 FIXME("(%p)->(%s %08x %p %d %p %d %08x %08x %p) stub\n", This, debugstr_w(pwszUrl), dwAction, pPolicy, cbPolicy,
1145 pContext, cbContext, dwFlags, dwReserved, pdwOutFlags);
1149 static HRESULT WINAPI SecManagerImpl_MapUrlToZoneEx2(IInternetSecurityManagerEx2 *iface,
1150 IUri *pUri, DWORD *pdwZone, DWORD dwFlags, LPWSTR *ppwszMappedUrl, DWORD *pdwOutFlags)
1152 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1154 TRACE("(%p)->(%p %p %08x %p %p)\n", This, pUri, pdwZone, dwFlags, ppwszMappedUrl, pdwOutFlags);
1156 if(This->custom_manager) {
1158 IInternetSecurityManagerEx2 *sec_mgr2;
1160 hres = IInternetSecurityManager_QueryInterface(This->custom_manager, &IID_IInternetSecurityManagerEx2,
1162 if(SUCCEEDED(hres)) {
1163 hres = IInternetSecurityManagerEx2_MapUrlToZoneEx2(sec_mgr2, pUri, pdwZone, dwFlags, ppwszMappedUrl, pdwOutFlags);
1164 IInternetSecurityManagerEx2_Release(sec_mgr2);
1168 hres = IUri_GetDisplayUri(pUri, &url);
1172 hres = IInternetSecurityManager_MapUrlToZone(This->custom_manager, url, pdwZone, dwFlags);
1176 if(hres != INET_E_DEFAULT_ACTION)
1181 return E_INVALIDARG;
1184 *pdwZone = URLZONE_INVALID;
1185 return E_INVALIDARG;
1189 FIXME("Unsupported flags: %08x\n", dwFlags);
1191 return map_uri_to_zone(pUri, pdwZone, NULL);
1194 static HRESULT WINAPI SecManagerImpl_ProcessUrlActionEx2(IInternetSecurityManagerEx2 *iface,
1195 IUri *pUri, DWORD dwAction, BYTE *pPolicy, DWORD cbPolicy, BYTE *pContext, DWORD cbContext,
1196 DWORD dwFlags, DWORD_PTR dwReserved, DWORD *pdwOutFlags)
1198 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1199 FIXME("(%p)->(%p %08x %p %d %p %d %08x %08x %p) stub\n", This, pUri, dwAction, pPolicy,
1200 cbPolicy, pContext, cbContext, dwFlags, (DWORD)dwReserved, pdwOutFlags);
1204 static HRESULT WINAPI SecManagerImpl_GetSecurityIdEx2(IInternetSecurityManagerEx2 *iface,
1205 IUri *pUri, BYTE *pbSecurityId, DWORD *pcbSecurityId, DWORD_PTR dwReserved)
1207 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1208 TRACE("(%p)->(%p %p %p %08x) stub\n", This, pUri, pbSecurityId, pcbSecurityId, (DWORD)dwReserved);
1211 FIXME("dwReserved is not supported yet\n");
1213 if(!pUri || !pcbSecurityId || !pbSecurityId)
1214 return E_INVALIDARG;
1216 return get_security_id_for_uri(pUri, pbSecurityId, pcbSecurityId);
1219 static HRESULT WINAPI SecManagerImpl_QueryCustomPolicyEx2(IInternetSecurityManagerEx2 *iface,
1220 IUri *pUri, REFGUID guidKey, BYTE **ppPolicy, DWORD *pcbPolicy, BYTE *pContext,
1221 DWORD cbContext, DWORD_PTR dwReserved)
1223 SecManagerImpl *This = impl_from_IInternetSecurityManagerEx2(iface);
1224 FIXME("(%p)->(%p %s %p %p %p %d %08x) stub\n", This, pUri, debugstr_guid(guidKey), ppPolicy, pcbPolicy,
1225 pContext, cbContext, (DWORD)dwReserved);
1229 static const IInternetSecurityManagerEx2Vtbl VT_SecManagerImpl =
1231 SecManagerImpl_QueryInterface,
1232 SecManagerImpl_AddRef,
1233 SecManagerImpl_Release,
1234 SecManagerImpl_SetSecuritySite,
1235 SecManagerImpl_GetSecuritySite,
1236 SecManagerImpl_MapUrlToZone,
1237 SecManagerImpl_GetSecurityId,
1238 SecManagerImpl_ProcessUrlAction,
1239 SecManagerImpl_QueryCustomPolicy,
1240 SecManagerImpl_SetZoneMapping,
1241 SecManagerImpl_GetZoneMappings,
1242 SecManagerImpl_ProcessUrlActionEx,
1243 SecManagerImpl_MapUrlToZoneEx2,
1244 SecManagerImpl_ProcessUrlActionEx2,
1245 SecManagerImpl_GetSecurityIdEx2,
1246 SecManagerImpl_QueryCustomPolicyEx2
1249 HRESULT SecManagerImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj)
1251 SecManagerImpl *This;
1253 TRACE("(%p,%p)\n",pUnkOuter,ppobj);
1254 This = heap_alloc(sizeof(*This));
1256 /* Initialize the virtual function table. */
1257 This->IInternetSecurityManagerEx2_iface.lpVtbl = &VT_SecManagerImpl;
1260 This->mgrsite = NULL;
1261 This->custom_manager = NULL;
1265 URLMON_LockModule();
1270 /***********************************************************************
1271 * InternetZoneManager implementation
1275 IInternetZoneManagerEx2 IInternetZoneManagerEx2_iface;
1278 DWORD zonemap_count;
1281 static inline ZoneMgrImpl *impl_from_IInternetZoneManagerEx2(IInternetZoneManagerEx2 *iface)
1283 return CONTAINING_RECORD(iface, ZoneMgrImpl, IInternetZoneManagerEx2_iface);
1287 /***********************************************************************
1288 * build_zonemap_from_reg [internal]
1290 * Enumerate the Zones in the Registry and return the Zones in a DWORD-array
1291 * The number of the Zones is returned in data[0]
1293 static LPDWORD build_zonemap_from_reg(void)
1297 LPDWORD data = NULL;
1298 DWORD allocated = 6; /* space for the zonecount and Zone "0" up to Zone "4" */
1304 res = RegOpenKeyW(HKEY_CURRENT_USER, wszZonesKey, &hkey);
1308 data = heap_alloc(allocated * sizeof(DWORD));
1314 len = sizeof(name) / sizeof(name[0]);
1315 res = RegEnumKeyExW(hkey, used, name, &len, NULL, NULL, NULL, NULL);
1319 if (used == allocated) {
1323 new_data = heap_realloc_zero(data, allocated * sizeof(DWORD));
1329 data[used] = atoiW(name);
1339 /* something failed */
1345 /********************************************************************
1346 * IInternetZoneManager_QueryInterface
1348 static HRESULT WINAPI ZoneMgrImpl_QueryInterface(IInternetZoneManagerEx2* iface, REFIID riid, void** ppvObject)
1350 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1352 TRACE("(%p)->(%s,%p)\n", This, debugstr_guid(riid), ppvObject);
1354 if(!This || !ppvObject)
1355 return E_INVALIDARG;
1357 if(IsEqualIID(&IID_IUnknown, riid)) {
1358 TRACE("(%p)->(IID_IUnknown %p)\n", This, ppvObject);
1359 }else if(IsEqualIID(&IID_IInternetZoneManager, riid)) {
1360 TRACE("(%p)->(IID_InternetZoneManager %p)\n", This, ppvObject);
1361 }else if(IsEqualIID(&IID_IInternetZoneManagerEx, riid)) {
1362 TRACE("(%p)->(IID_InternetZoneManagerEx %p)\n", This, ppvObject);
1363 }else if(IsEqualIID(&IID_IInternetZoneManagerEx2, riid)) {
1364 TRACE("(%p)->(IID_InternetZoneManagerEx2 %p)\n", This, ppvObject);
1368 FIXME("Unknown interface: %s\n", debugstr_guid(riid));
1370 return E_NOINTERFACE;
1374 IInternetZoneManager_AddRef(iface);
1378 /********************************************************************
1379 * IInternetZoneManager_AddRef
1381 static ULONG WINAPI ZoneMgrImpl_AddRef(IInternetZoneManagerEx2* iface)
1383 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1384 ULONG refCount = InterlockedIncrement(&This->ref);
1386 TRACE("(%p)->(ref before=%u)\n",This, refCount - 1);
1391 /********************************************************************
1392 * IInternetZoneManager_Release
1394 static ULONG WINAPI ZoneMgrImpl_Release(IInternetZoneManagerEx2* iface)
1396 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1397 ULONG refCount = InterlockedDecrement(&This->ref);
1399 TRACE("(%p)->(ref before=%u)\n",This, refCount + 1);
1402 while (This->zonemap_count) heap_free(This->zonemaps[--This->zonemap_count]);
1403 heap_free(This->zonemaps);
1405 URLMON_UnlockModule();
1411 /********************************************************************
1412 * IInternetZoneManager_GetZoneAttributes
1414 static HRESULT WINAPI ZoneMgrImpl_GetZoneAttributes(IInternetZoneManagerEx2* iface,
1416 ZONEATTRIBUTES* pZoneAttributes)
1418 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1423 TRACE("(%p)->(%d %p)\n", This, dwZone, pZoneAttributes);
1425 if (!pZoneAttributes)
1426 return E_INVALIDARG;
1428 hr = open_zone_key(HKEY_CURRENT_USER, dwZone, &hcu);
1430 return S_OK; /* IE6 and older returned E_FAIL here */
1432 hr = open_zone_key(HKEY_LOCAL_MACHINE, dwZone, &hklm);
1434 TRACE("Zone %d not in HKLM\n", dwZone);
1436 get_string_from_reg(hcu, hklm, displaynameW, pZoneAttributes->szDisplayName, MAX_ZONE_PATH);
1437 get_string_from_reg(hcu, hklm, descriptionW, pZoneAttributes->szDescription, MAX_ZONE_DESCRIPTION);
1438 get_string_from_reg(hcu, hklm, iconW, pZoneAttributes->szIconPath, MAX_ZONE_PATH);
1439 get_dword_from_reg(hcu, hklm, minlevelW, &pZoneAttributes->dwTemplateMinLevel);
1440 get_dword_from_reg(hcu, hklm, currentlevelW, &pZoneAttributes->dwTemplateCurrentLevel);
1441 get_dword_from_reg(hcu, hklm, recommendedlevelW, &pZoneAttributes->dwTemplateRecommended);
1442 get_dword_from_reg(hcu, hklm, flagsW, &pZoneAttributes->dwFlags);
1449 /********************************************************************
1450 * IInternetZoneManager_SetZoneAttributes
1452 static HRESULT WINAPI ZoneMgrImpl_SetZoneAttributes(IInternetZoneManagerEx2* iface,
1454 ZONEATTRIBUTES* pZoneAttributes)
1456 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1460 TRACE("(%p)->(%d %p)\n", This, dwZone, pZoneAttributes);
1462 if (!pZoneAttributes)
1463 return E_INVALIDARG;
1465 hr = open_zone_key(HKEY_CURRENT_USER, dwZone, &hcu);
1467 return S_OK; /* IE6 returned E_FAIL here */
1469 /* cbSize is ignored */
1470 RegSetValueExW(hcu, displaynameW, 0, REG_SZ, (LPBYTE) pZoneAttributes->szDisplayName,
1471 (lstrlenW(pZoneAttributes->szDisplayName)+1)* sizeof(WCHAR));
1473 RegSetValueExW(hcu, descriptionW, 0, REG_SZ, (LPBYTE) pZoneAttributes->szDescription,
1474 (lstrlenW(pZoneAttributes->szDescription)+1)* sizeof(WCHAR));
1476 RegSetValueExW(hcu, iconW, 0, REG_SZ, (LPBYTE) pZoneAttributes->szIconPath,
1477 (lstrlenW(pZoneAttributes->szIconPath)+1)* sizeof(WCHAR));
1479 RegSetValueExW(hcu, minlevelW, 0, REG_DWORD,
1480 (const BYTE*) &pZoneAttributes->dwTemplateMinLevel, sizeof(DWORD));
1482 RegSetValueExW(hcu, currentlevelW, 0, REG_DWORD,
1483 (const BYTE*) &pZoneAttributes->dwTemplateCurrentLevel, sizeof(DWORD));
1485 RegSetValueExW(hcu, recommendedlevelW, 0, REG_DWORD,
1486 (const BYTE*) &pZoneAttributes->dwTemplateRecommended, sizeof(DWORD));
1488 RegSetValueExW(hcu, flagsW, 0, REG_DWORD, (const BYTE*) &pZoneAttributes->dwFlags, sizeof(DWORD));
1494 /********************************************************************
1495 * IInternetZoneManager_GetZoneCustomPolicy
1497 static HRESULT WINAPI ZoneMgrImpl_GetZoneCustomPolicy(IInternetZoneManagerEx2* iface,
1502 URLZONEREG ulrZoneReg)
1504 FIXME("(%p)->(%08x %s %p %p %08x) stub\n", iface, dwZone, debugstr_guid(guidKey),
1505 ppPolicy, pcbPolicy, ulrZoneReg);
1509 /********************************************************************
1510 * IInternetZoneManager_SetZoneCustomPolicy
1512 static HRESULT WINAPI ZoneMgrImpl_SetZoneCustomPolicy(IInternetZoneManagerEx2* iface,
1517 URLZONEREG ulrZoneReg)
1519 FIXME("(%p)->(%08x %s %p %08x %08x) stub\n", iface, dwZone, debugstr_guid(guidKey),
1520 ppPolicy, cbPolicy, ulrZoneReg);
1524 /********************************************************************
1525 * IInternetZoneManager_GetZoneActionPolicy
1527 static HRESULT WINAPI ZoneMgrImpl_GetZoneActionPolicy(IInternetZoneManagerEx2* iface,
1528 DWORD dwZone, DWORD dwAction, BYTE* pPolicy, DWORD cbPolicy, URLZONEREG urlZoneReg)
1530 TRACE("(%p)->(%d %08x %p %d %d)\n", iface, dwZone, dwAction, pPolicy,
1531 cbPolicy, urlZoneReg);
1534 return E_INVALIDARG;
1536 return get_action_policy(dwZone, dwAction, pPolicy, cbPolicy, urlZoneReg);
1539 /********************************************************************
1540 * IInternetZoneManager_SetZoneActionPolicy
1542 static HRESULT WINAPI ZoneMgrImpl_SetZoneActionPolicy(IInternetZoneManagerEx2* iface,
1547 URLZONEREG urlZoneReg)
1549 FIXME("(%p)->(%08x %08x %p %08x %08x) stub\n", iface, dwZone, dwAction, pPolicy,
1550 cbPolicy, urlZoneReg);
1554 /********************************************************************
1555 * IInternetZoneManager_PromptAction
1557 static HRESULT WINAPI ZoneMgrImpl_PromptAction(IInternetZoneManagerEx2* iface,
1562 DWORD dwPromptFlags)
1564 FIXME("%p %08x %p %s %s %08x\n", iface, dwAction, hwndParent,
1565 debugstr_w(pwszUrl), debugstr_w(pwszText), dwPromptFlags );
1569 /********************************************************************
1570 * IInternetZoneManager_LogAction
1572 static HRESULT WINAPI ZoneMgrImpl_LogAction(IInternetZoneManagerEx2* iface,
1578 FIXME("(%p)->(%08x %s %s %08x) stub\n", iface, dwAction, debugstr_w(pwszUrl),
1579 debugstr_w(pwszText), dwLogFlags);
1583 /********************************************************************
1584 * IInternetZoneManager_CreateZoneEnumerator
1586 static HRESULT WINAPI ZoneMgrImpl_CreateZoneEnumerator(IInternetZoneManagerEx2* iface,
1591 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1596 TRACE("(%p)->(%p, %p, 0x%08x)\n", This, pdwEnum, pdwCount, dwFlags);
1597 if (!pdwEnum || !pdwCount || (dwFlags != 0))
1598 return E_INVALIDARG;
1600 data = build_zonemap_from_reg();
1601 TRACE("found %d zones\n", data ? data[0] : -1);
1606 for (i = 0; i < This->zonemap_count; i++) {
1607 if (This->zonemaps && !This->zonemaps[i]) {
1608 This->zonemaps[i] = data;
1610 *pdwCount = data[0];
1615 if (This->zonemaps) {
1616 /* try to double the nr. of pointers in the array */
1617 new_maps = heap_realloc_zero(This->zonemaps, This->zonemap_count * 2 * sizeof(LPDWORD));
1619 This->zonemap_count *= 2;
1623 This->zonemap_count = 2;
1624 new_maps = heap_alloc_zero(This->zonemap_count * sizeof(LPDWORD));
1631 This->zonemaps = new_maps;
1632 This->zonemaps[i] = data;
1634 *pdwCount = data[0];
1638 /********************************************************************
1639 * IInternetZoneManager_GetZoneAt
1641 static HRESULT WINAPI ZoneMgrImpl_GetZoneAt(IInternetZoneManagerEx2* iface,
1646 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1649 TRACE("(%p)->(0x%08x, %d, %p)\n", This, dwEnum, dwIndex, pdwZone);
1651 /* make sure, that dwEnum and dwIndex are in the valid range */
1652 if (dwEnum < This->zonemap_count) {
1653 if ((data = This->zonemaps[dwEnum])) {
1654 if (dwIndex < data[0]) {
1655 *pdwZone = data[dwIndex + 1];
1660 return E_INVALIDARG;
1663 /********************************************************************
1664 * IInternetZoneManager_DestroyZoneEnumerator
1666 static HRESULT WINAPI ZoneMgrImpl_DestroyZoneEnumerator(IInternetZoneManagerEx2* iface,
1669 ZoneMgrImpl* This = impl_from_IInternetZoneManagerEx2(iface);
1672 TRACE("(%p)->(0x%08x)\n", This, dwEnum);
1673 /* make sure, that dwEnum is valid */
1674 if (dwEnum < This->zonemap_count) {
1675 if ((data = This->zonemaps[dwEnum])) {
1676 This->zonemaps[dwEnum] = NULL;
1681 return E_INVALIDARG;
1684 /********************************************************************
1685 * IInternetZoneManager_CopyTemplatePoliciesToZone
1687 static HRESULT WINAPI ZoneMgrImpl_CopyTemplatePoliciesToZone(IInternetZoneManagerEx2* iface,
1692 FIXME("(%p)->(%08x %08x %08x) stub\n", iface, dwTemplate, dwZone, dwReserved);
1696 /********************************************************************
1697 * IInternetZoneManagerEx_GetZoneActionPolicyEx
1699 static HRESULT WINAPI ZoneMgrImpl_GetZoneActionPolicyEx(IInternetZoneManagerEx2* iface,
1704 URLZONEREG urlZoneReg,
1707 TRACE("(%p)->(%d, 0x%x, %p, %d, %d, 0x%x)\n", iface, dwZone,
1708 dwAction, pPolicy, cbPolicy, urlZoneReg, dwFlags);
1711 return E_INVALIDARG;
1714 FIXME("dwFlags 0x%x ignored\n", dwFlags);
1716 return get_action_policy(dwZone, dwAction, pPolicy, cbPolicy, urlZoneReg);
1719 /********************************************************************
1720 * IInternetZoneManagerEx_SetZoneActionPolicyEx
1722 static HRESULT WINAPI ZoneMgrImpl_SetZoneActionPolicyEx(IInternetZoneManagerEx2* iface,
1727 URLZONEREG urlZoneReg,
1730 FIXME("(%p)->(%d, 0x%x, %p, %d, %d, 0x%x) stub\n", iface, dwZone, dwAction, pPolicy,
1731 cbPolicy, urlZoneReg, dwFlags);
1735 /********************************************************************
1736 * IInternetZoneManagerEx2_GetZoneAttributesEx
1738 static HRESULT WINAPI ZoneMgrImpl_GetZoneAttributesEx(IInternetZoneManagerEx2* iface,
1740 ZONEATTRIBUTES* pZoneAttributes,
1743 TRACE("(%p)->(%d, %p, 0x%x)\n", iface, dwZone, pZoneAttributes, dwFlags);
1746 FIXME("dwFlags 0x%x ignored\n", dwFlags);
1748 return IInternetZoneManager_GetZoneAttributes(iface, dwZone, pZoneAttributes);
1752 /********************************************************************
1753 * IInternetZoneManagerEx2_GetZoneSecurityState
1755 static HRESULT WINAPI ZoneMgrImpl_GetZoneSecurityState(IInternetZoneManagerEx2* iface,
1757 BOOL fRespectPolicy,
1759 BOOL *pfPolicyEncountered)
1761 FIXME("(%p)->(%d, %d, %p, %p) stub\n", iface, dwZoneIndex, fRespectPolicy,
1762 pdwState, pfPolicyEncountered);
1764 *pdwState = SECURITY_IE_STATE_GREEN;
1766 if (pfPolicyEncountered)
1767 *pfPolicyEncountered = FALSE;
1772 /********************************************************************
1773 * IInternetZoneManagerEx2_GetIESecurityState
1775 static HRESULT WINAPI ZoneMgrImpl_GetIESecurityState(IInternetZoneManagerEx2* iface,
1776 BOOL fRespectPolicy,
1778 BOOL *pfPolicyEncountered,
1781 FIXME("(%p)->(%d, %p, %p, %d) stub\n", iface, fRespectPolicy, pdwState,
1782 pfPolicyEncountered, fNoCache);
1784 *pdwState = SECURITY_IE_STATE_GREEN;
1786 if (pfPolicyEncountered)
1787 *pfPolicyEncountered = FALSE;
1792 /********************************************************************
1793 * IInternetZoneManagerEx2_FixInsecureSettings
1795 static HRESULT WINAPI ZoneMgrImpl_FixInsecureSettings(IInternetZoneManagerEx2* iface)
1797 FIXME("(%p) stub\n", iface);
1801 /********************************************************************
1802 * IInternetZoneManager_Construct
1804 static const IInternetZoneManagerEx2Vtbl ZoneMgrImplVtbl = {
1805 ZoneMgrImpl_QueryInterface,
1807 ZoneMgrImpl_Release,
1808 /* IInternetZoneManager */
1809 ZoneMgrImpl_GetZoneAttributes,
1810 ZoneMgrImpl_SetZoneAttributes,
1811 ZoneMgrImpl_GetZoneCustomPolicy,
1812 ZoneMgrImpl_SetZoneCustomPolicy,
1813 ZoneMgrImpl_GetZoneActionPolicy,
1814 ZoneMgrImpl_SetZoneActionPolicy,
1815 ZoneMgrImpl_PromptAction,
1816 ZoneMgrImpl_LogAction,
1817 ZoneMgrImpl_CreateZoneEnumerator,
1818 ZoneMgrImpl_GetZoneAt,
1819 ZoneMgrImpl_DestroyZoneEnumerator,
1820 ZoneMgrImpl_CopyTemplatePoliciesToZone,
1821 /* IInternetZoneManagerEx */
1822 ZoneMgrImpl_GetZoneActionPolicyEx,
1823 ZoneMgrImpl_SetZoneActionPolicyEx,
1824 /* IInternetZoneManagerEx2 */
1825 ZoneMgrImpl_GetZoneAttributesEx,
1826 ZoneMgrImpl_GetZoneSecurityState,
1827 ZoneMgrImpl_GetIESecurityState,
1828 ZoneMgrImpl_FixInsecureSettings,
1831 HRESULT ZoneMgrImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj)
1833 ZoneMgrImpl* ret = heap_alloc_zero(sizeof(ZoneMgrImpl));
1835 TRACE("(%p %p)\n", pUnkOuter, ppobj);
1836 ret->IInternetZoneManagerEx2_iface.lpVtbl = &ZoneMgrImplVtbl;
1838 *ppobj = (IInternetZoneManagerEx*)ret;
1840 URLMON_LockModule();
1845 /***********************************************************************
1846 * CoInternetCreateSecurityManager (URLMON.@)
1849 HRESULT WINAPI CoInternetCreateSecurityManager( IServiceProvider *pSP,
1850 IInternetSecurityManager **ppSM, DWORD dwReserved )
1852 TRACE("%p %p %d\n", pSP, ppSM, dwReserved );
1855 FIXME("pSP not supported\n");
1857 return SecManagerImpl_Construct(NULL, (void**) ppSM);
1860 /********************************************************************
1861 * CoInternetCreateZoneManager (URLMON.@)
1863 HRESULT WINAPI CoInternetCreateZoneManager(IServiceProvider* pSP, IInternetZoneManager** ppZM, DWORD dwReserved)
1865 TRACE("(%p %p %x)\n", pSP, ppZM, dwReserved);
1866 return ZoneMgrImpl_Construct(NULL, (void**)ppZM);
1869 static HRESULT parse_security_url(const WCHAR *url, PSUACTION action, WCHAR **result) {
1870 IInternetProtocolInfo *protocol_info;
1871 WCHAR *tmp, *new_url = NULL, *alloc_url = NULL;
1872 DWORD size, new_size;
1873 HRESULT hres = S_OK, parse_hres;
1876 TRACE("parsing %s\n", debugstr_w(url));
1878 protocol_info = get_protocol_info(url);
1882 size = strlenW(url)+1;
1883 new_url = CoTaskMemAlloc(size*sizeof(WCHAR));
1885 hres = E_OUTOFMEMORY;
1890 parse_hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_URL, 0, new_url, size, &new_size, 0);
1891 if(parse_hres == S_FALSE) {
1893 hres = E_UNEXPECTED;
1897 tmp = CoTaskMemRealloc(new_url, new_size*sizeof(WCHAR));
1899 hres = E_OUTOFMEMORY;
1903 parse_hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_URL, 0, new_url,
1904 new_size, &new_size, 0);
1905 if(parse_hres == S_FALSE) {
1911 if(parse_hres != S_OK || !strcmpW(url, new_url))
1914 CoTaskMemFree(alloc_url);
1915 url = alloc_url = new_url;
1919 CoTaskMemFree(new_url);
1922 WARN("failed: %08x\n", hres);
1923 CoTaskMemFree(alloc_url);
1927 if(action == PSU_DEFAULT && (protocol_info = get_protocol_info(url))) {
1928 size = strlenW(url)+1;
1929 new_url = CoTaskMemAlloc(size * sizeof(WCHAR));
1932 parse_hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_DOMAIN, 0,
1933 new_url, size, &new_size, 0);
1934 if(parse_hres == S_FALSE) {
1936 tmp = CoTaskMemRealloc(new_url, new_size*sizeof(WCHAR));
1939 parse_hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_DOMAIN, 0, new_url,
1940 new_size, &new_size, 0);
1941 if(parse_hres == S_FALSE)
1944 hres = E_OUTOFMEMORY;
1947 hres = E_UNEXPECTED;
1951 if(hres == S_OK && parse_hres == S_OK) {
1952 CoTaskMemFree(alloc_url);
1953 url = alloc_url = new_url;
1957 CoTaskMemFree(new_url);
1959 hres = E_OUTOFMEMORY;
1961 IInternetProtocolInfo_Release(protocol_info);
1965 WARN("failed %08x\n", hres);
1966 CoTaskMemFree(alloc_url);
1971 size = strlenW(url)+1;
1972 alloc_url = CoTaskMemAlloc(size * sizeof(WCHAR));
1974 return E_OUTOFMEMORY;
1975 memcpy(alloc_url, url, size * sizeof(WCHAR));
1978 *result = alloc_url;
1982 /********************************************************************
1983 * CoInternetGetSecurityUrl (URLMON.@)
1985 HRESULT WINAPI CoInternetGetSecurityUrl(LPCWSTR pwzUrl, LPWSTR *ppwzSecUrl, PSUACTION psuAction, DWORD dwReserved)
1990 TRACE("(%p,%p,%u,%u)\n", pwzUrl, ppwzSecUrl, psuAction, dwReserved);
1992 hres = parse_security_url(pwzUrl, psuAction, &secure_url);
1996 if(psuAction != PSU_SECURITY_URL_ONLY) {
1997 PARSEDURLW parsed_url = { sizeof(parsed_url) };
2000 /* FIXME: Use helpers from uri.c */
2001 if(SUCCEEDED(ParseURLW(secure_url, &parsed_url))) {
2004 switch(parsed_url.nScheme) {
2005 case URL_SCHEME_FTP:
2006 case URL_SCHEME_HTTP:
2007 case URL_SCHEME_HTTPS:
2008 size = strlenW(secure_url)+1;
2009 new_url = CoTaskMemAlloc(size * sizeof(WCHAR));
2011 hres = UrlGetPartW(secure_url, new_url, &size, URL_PART_HOSTNAME, URL_PARTFLAG_KEEPSCHEME);
2013 hres = E_OUTOFMEMORY;
2014 CoTaskMemFree(secure_url);
2016 WARN("UrlGetPart failed: %08x\n", hres);
2017 CoTaskMemFree(new_url);
2018 return FAILED(hres) ? hres : E_FAIL;
2020 secure_url = new_url;
2025 *ppwzSecUrl = secure_url;
2029 /********************************************************************
2030 * CoInternetGetSecurityUrlEx (URLMON.@)
2032 HRESULT WINAPI CoInternetGetSecurityUrlEx(IUri *pUri, IUri **ppSecUri, PSUACTION psuAction, DWORD_PTR dwReserved)
2034 URL_SCHEME scheme_type;
2039 TRACE("(%p,%p,%u,%u)\n", pUri, ppSecUri, psuAction, (DWORD)dwReserved);
2041 if(!pUri || !ppSecUri)
2042 return E_INVALIDARG;
2044 hres = IUri_GetDisplayUri(pUri, &secure_uri);
2048 hres = parse_security_url(secure_uri, psuAction, &ret_url);
2049 SysFreeString(secure_uri);
2053 /* File URIs have to hierarchical. */
2054 hres = IUri_GetScheme(pUri, (DWORD*)&scheme_type);
2055 if(SUCCEEDED(hres) && scheme_type == URL_SCHEME_FILE) {
2056 const WCHAR *tmp = ret_url;
2058 /* Check and see if a "//" is after the scheme name. */
2059 tmp += sizeof(fileW)/sizeof(WCHAR);
2060 if(*tmp != '/' || *(tmp+1) != '/')
2061 hres = E_INVALIDARG;
2065 hres = CreateUri(ret_url, Uri_CREATE_ALLOW_IMPLICIT_WILDCARD_SCHEME, 0, ppSecUri);
2066 CoTaskMemFree(ret_url);
2070 /********************************************************************
2071 * CompareSecurityIds (URLMON.@)
2073 HRESULT WINAPI CompareSecurityIds(BYTE *secid1, DWORD size1, BYTE *secid2, DWORD size2, DWORD reserved)
2075 FIXME("(%p %d %p %d %x)\n", secid1, size1, secid2, size2, reserved);