crypt32: Make sure we show Unicode characters (Dutch translation).
[wine] / dlls / urlmon / sec_mgr.c
1 /*
2  * Internet Security and Zone Manager
3  *
4  * Copyright (c) 2004 Huw D M Davies
5  * Copyright 2004 Jacek Caban
6  * Copyright 2009 Detlef Riekenberg
7  *
8  * This library is free software; you can redistribute it and/or
9  * modify it under the terms of the GNU Lesser General Public
10  * License as published by the Free Software Foundation; either
11  * version 2.1 of the License, or (at your option) any later version.
12  *
13  * This library is distributed in the hope that it will be useful,
14  * but WITHOUT ANY WARRANTY; without even the implied warranty of
15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16  * Lesser General Public License for more details.
17  *
18  * You should have received a copy of the GNU Lesser General Public
19  * License along with this library; if not, write to the Free Software
20  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21  */
22
23 #include <stdio.h>
24
25 #include "urlmon_main.h"
26 #include "winreg.h"
27 #include "wininet.h"
28
29 #include "wine/debug.h"
30
31 WINE_DEFAULT_DEBUG_CHANNEL(urlmon);
32
33 static const WCHAR currentlevelW[] = {'C','u','r','r','e','n','t','L','e','v','e','l',0};
34 static const WCHAR descriptionW[] = {'D','e','s','c','r','i','p','t','i','o','n',0};
35 static const WCHAR displaynameW[] = {'D','i','s','p','l','a','y','N','a','m','e',0};
36 static const WCHAR fileW[] = {'f','i','l','e',0};
37 static const WCHAR flagsW[] = {'F','l','a','g','s',0};
38 static const WCHAR iconW[] = {'I','c','o','n',0};
39 static const WCHAR minlevelW[] = {'M','i','n','L','e','v','e','l',0};
40 static const WCHAR recommendedlevelW[] = {'R','e','c','o','m','m','e','n','d','e','d',
41                                           'L','e','v','e','l',0};
42 static const WCHAR wszZonesKey[] = {'S','o','f','t','w','a','r','e','\\',
43                                     'M','i','c','r','o','s','o','f','t','\\',
44                                     'W','i','n','d','o','w','s','\\',
45                                     'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
46                                     'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
47                                     'Z','o','n','e','s','\\',0};
48
49 /********************************************************************
50  * get_string_from_reg [internal]
51  *
52  * helper to get a string from the reg.
53  *
54  */
55 static void get_string_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPWSTR out, DWORD maxlen)
56 {
57     DWORD type = REG_SZ;
58     DWORD len = maxlen * sizeof(WCHAR);
59     DWORD res;
60
61     res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len);
62
63     if (res && hklm) {
64         len = maxlen * sizeof(WCHAR);
65         type = REG_SZ;
66         res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len);
67     }
68
69     if (res) {
70         TRACE("%s failed: %d\n", debugstr_w(name), res);
71         *out = '\0';
72     }
73 }
74
75 /********************************************************************
76  * get_dword_from_reg [internal]
77  *
78  * helper to get a dword from the reg.
79  *
80  */
81 static void get_dword_from_reg(HKEY hcu, HKEY hklm, LPCWSTR name, LPDWORD out)
82 {
83     DWORD type = REG_DWORD;
84     DWORD len = sizeof(DWORD);
85     DWORD res;
86
87     res = RegQueryValueExW(hcu, name, NULL, &type, (LPBYTE) out, &len);
88
89     if (res && hklm) {
90         len = sizeof(DWORD);
91         type = REG_DWORD;
92         res = RegQueryValueExW(hklm, name, NULL, &type, (LPBYTE) out, &len);
93     }
94
95     if (res) {
96         TRACE("%s failed: %d\n", debugstr_w(name), res);
97         *out = 0;
98     }
99 }
100
101 static HRESULT get_zone_from_reg(LPCWSTR schema, DWORD *zone)
102 {
103     DWORD res, size;
104     HKEY hkey;
105
106     static const WCHAR wszZoneMapProtocolKey[] =
107         {'S','o','f','t','w','a','r','e','\\',
108          'M','i','c','r','o','s','o','f','t','\\',
109          'W','i','n','d','o','w','s','\\',
110          'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
111          'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
112          'Z','o','n','e','M','a','p','\\',
113          'P','r','o','t','o','c','o','l','D','e','f','a','u','l','t','s',0};
114
115     res = RegOpenKeyW(HKEY_CURRENT_USER, wszZoneMapProtocolKey, &hkey);
116     if(res != ERROR_SUCCESS) {
117         ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey));
118         return E_UNEXPECTED;
119     }
120
121     size = sizeof(DWORD);
122     res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size);
123     RegCloseKey(hkey);
124     if(res == ERROR_SUCCESS)
125         return S_OK;
126
127     res = RegOpenKeyW(HKEY_LOCAL_MACHINE, wszZoneMapProtocolKey, &hkey);
128     if(res != ERROR_SUCCESS) {
129         ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey));
130         return E_UNEXPECTED;
131     }
132
133     size = sizeof(DWORD);
134     res = RegQueryValueExW(hkey, schema, NULL, NULL, (PBYTE)zone, &size);
135     RegCloseKey(hkey);
136     if(res == ERROR_SUCCESS)
137         return S_OK;
138
139     *zone = 3;
140     return S_OK;
141 }
142
143 static HRESULT map_url_to_zone(LPCWSTR url, DWORD *zone, LPWSTR *ret_url)
144 {
145     LPWSTR secur_url;
146     WCHAR schema[64];
147     DWORD size=0;
148     HRESULT hres;
149
150     secur_url = heap_alloc(INTERNET_MAX_URL_LENGTH*sizeof(WCHAR));
151     *zone = -1;
152
153     hres = CoInternetParseUrl(url, PARSE_SECURITY_URL, 0, secur_url, INTERNET_MAX_URL_LENGTH, &size, 0);
154     if(hres != S_OK)
155         strcpyW(secur_url, url);
156
157     hres = CoInternetParseUrl(secur_url, PARSE_SCHEMA, 0, schema, sizeof(schema)/sizeof(WCHAR), &size, 0);
158     if(FAILED(hres) || !*schema) {
159         heap_free(secur_url);
160         return E_INVALIDARG;
161     }
162
163     /* file protocol is a special case */
164     if(!strcmpW(schema, fileW)) {
165         WCHAR path[MAX_PATH], root[20];
166         WCHAR *ptr;
167
168         hres = CoInternetParseUrl(secur_url, PARSE_PATH_FROM_URL, 0, path,
169                 sizeof(path)/sizeof(WCHAR), &size, 0);
170
171         if(SUCCEEDED(hres) && (ptr = strchrW(path, '\\')) && ptr-path < sizeof(root)/sizeof(WCHAR)) {
172             UINT type;
173
174             memcpy(root, path, (ptr-path)*sizeof(WCHAR));
175             root[ptr-path] = 0;
176
177             type = GetDriveTypeW(root);
178
179             switch(type) {
180             case DRIVE_UNKNOWN:
181             case DRIVE_NO_ROOT_DIR:
182                 break;
183             case DRIVE_REMOVABLE:
184             case DRIVE_FIXED:
185             case DRIVE_CDROM:
186             case DRIVE_RAMDISK:
187                 *zone = 0;
188                 hres = S_OK;
189                 break;
190             case DRIVE_REMOTE:
191                 *zone = 3;
192                 hres = S_OK;
193                 break;
194             default:
195                 FIXME("unsupported drive type %d\n", type);
196             }
197         }
198     }
199
200     if(*zone == -1) {
201         WARN("domains are not yet implemented\n");
202         hres = get_zone_from_reg(schema, zone);
203     }
204
205     if(FAILED(hres) || !ret_url)
206         heap_free(secur_url);
207     else
208         *ret_url = secur_url;
209
210     return hres;
211 }
212
213 static HRESULT open_zone_key(HKEY parent_key, DWORD zone, HKEY *hkey)
214 {
215     static const WCHAR wszFormat[] = {'%','s','%','l','d',0};
216
217     WCHAR key_name[sizeof(wszZonesKey)/sizeof(WCHAR)+8];
218     DWORD res;
219
220     wsprintfW(key_name, wszFormat, wszZonesKey, zone);
221
222     res = RegOpenKeyW(parent_key, key_name, hkey);
223
224     if(res != ERROR_SUCCESS) {
225         WARN("RegOpenKey failed\n");
226         return E_INVALIDARG;
227     }
228
229     return S_OK;
230 }
231
232 static HRESULT get_action_policy(DWORD zone, DWORD action, BYTE *policy, DWORD size, URLZONEREG zone_reg)
233 {
234     HKEY parent_key;
235     HKEY hkey;
236     LONG res;
237     HRESULT hres;
238
239     switch(action) {
240     case URLACTION_SCRIPT_OVERRIDE_SAFETY:
241         *(DWORD*)policy = URLPOLICY_DISALLOW;
242         return S_OK;
243     }
244
245     switch(zone_reg) {
246     case URLZONEREG_DEFAULT:
247     case URLZONEREG_HKCU:
248         parent_key = HKEY_CURRENT_USER;
249         break;
250     case URLZONEREG_HKLM:
251         parent_key = HKEY_LOCAL_MACHINE;
252         break;
253     default:
254         WARN("Unknown URLZONEREG: %d\n", zone_reg);
255         return E_FAIL;
256     };
257
258     hres = open_zone_key(parent_key, zone, &hkey);
259     if(SUCCEEDED(hres)) {
260         WCHAR action_str[16];
261         DWORD len = size;
262
263         static const WCHAR formatW[] = {'%','X',0};
264
265         wsprintfW(action_str, formatW, action);
266
267         res = RegQueryValueExW(hkey, action_str, NULL, NULL, policy, &len);
268         if(res == ERROR_MORE_DATA) {
269             hres = E_INVALIDARG;
270         }else if(res == ERROR_FILE_NOT_FOUND) {
271             hres = E_FAIL;
272         }else if(res != ERROR_SUCCESS) {
273             ERR("RegQueryValue failed: %d\n", res);
274             hres = E_UNEXPECTED;
275         }
276
277         RegCloseKey(hkey);
278     }
279
280     if(FAILED(hres) && zone_reg == URLZONEREG_DEFAULT)
281         return get_action_policy(zone, action, policy, size, URLZONEREG_HKLM);
282
283     return hres;
284 }
285
286 /***********************************************************************
287  *           InternetSecurityManager implementation
288  *
289  */
290 typedef struct {
291     const IInternetSecurityManagerVtbl* lpInternetSecurityManagerVtbl;
292
293     LONG ref;
294
295     IInternetSecurityMgrSite *mgrsite;
296     IInternetSecurityManager *custom_manager;
297 } SecManagerImpl;
298
299 #define SECMGR_THIS(iface) DEFINE_THIS(SecManagerImpl, InternetSecurityManager, iface)
300
301 static HRESULT WINAPI SecManagerImpl_QueryInterface(IInternetSecurityManager* iface,REFIID riid,void** ppvObject)
302 {
303     SecManagerImpl *This = SECMGR_THIS(iface);
304
305     TRACE("(%p)->(%s,%p)\n",This,debugstr_guid(riid),ppvObject);
306
307     /* Perform a sanity check on the parameters.*/
308     if ( (This==0) || (ppvObject==0) )
309         return E_INVALIDARG;
310
311     /* Initialize the return parameter */
312     *ppvObject = 0;
313
314     /* Compare the riid with the interface IDs implemented by this object.*/
315     if (IsEqualIID(&IID_IUnknown, riid) ||
316         IsEqualIID(&IID_IInternetSecurityManager, riid))
317         *ppvObject = iface;
318
319     /* Check that we obtained an interface.*/
320     if (!*ppvObject) {
321         WARN("not supported interface %s\n", debugstr_guid(riid));
322         return E_NOINTERFACE;
323     }
324
325     /* Query Interface always increases the reference count by one when it is successful */
326     IInternetSecurityManager_AddRef(iface);
327
328     return S_OK;
329 }
330
331 static ULONG WINAPI SecManagerImpl_AddRef(IInternetSecurityManager* iface)
332 {
333     SecManagerImpl *This = SECMGR_THIS(iface);
334     ULONG refCount = InterlockedIncrement(&This->ref);
335
336     TRACE("(%p) ref=%u\n", This, refCount);
337
338     return refCount;
339 }
340
341 static ULONG WINAPI SecManagerImpl_Release(IInternetSecurityManager* iface)
342 {
343     SecManagerImpl *This = SECMGR_THIS(iface);
344     ULONG refCount = InterlockedDecrement(&This->ref);
345
346     TRACE("(%p) ref=%u\n", This, refCount);
347
348     /* destroy the object if there's no more reference on it */
349     if (!refCount){
350         if(This->mgrsite)
351             IInternetSecurityMgrSite_Release(This->mgrsite);
352         if(This->custom_manager)
353             IInternetSecurityManager_Release(This->custom_manager);
354
355         heap_free(This);
356
357         URLMON_UnlockModule();
358     }
359
360     return refCount;
361 }
362
363 static HRESULT WINAPI SecManagerImpl_SetSecuritySite(IInternetSecurityManager *iface,
364                                                      IInternetSecurityMgrSite *pSite)
365 {
366     SecManagerImpl *This = SECMGR_THIS(iface);
367
368     TRACE("(%p)->(%p)\n", This, pSite);
369
370     if(This->mgrsite)
371         IInternetSecurityMgrSite_Release(This->mgrsite);
372
373     if(This->custom_manager) {
374         IInternetSecurityManager_Release(This->custom_manager);
375         This->custom_manager = NULL;
376     }
377
378     This->mgrsite = pSite;
379
380     if(pSite) {
381         IServiceProvider *servprov;
382         HRESULT hres;
383
384         IInternetSecurityMgrSite_AddRef(pSite);
385
386         hres = IInternetSecurityMgrSite_QueryInterface(pSite, &IID_IServiceProvider,
387                 (void**)&servprov);
388         if(SUCCEEDED(hres)) {
389             IServiceProvider_QueryService(servprov, &SID_SInternetSecurityManager,
390                     &IID_IInternetSecurityManager, (void**)&This->custom_manager);
391             IServiceProvider_Release(servprov);
392         }
393     }
394
395     return S_OK;
396 }
397
398 static HRESULT WINAPI SecManagerImpl_GetSecuritySite(IInternetSecurityManager *iface,
399                                                      IInternetSecurityMgrSite **ppSite)
400 {
401     SecManagerImpl *This = SECMGR_THIS(iface);
402
403     TRACE("(%p)->(%p)\n", This, ppSite);
404
405     if(!ppSite)
406         return E_INVALIDARG;
407
408     if(This->mgrsite)
409         IInternetSecurityMgrSite_AddRef(This->mgrsite);
410
411     *ppSite = This->mgrsite;
412     return S_OK;
413 }
414
415 static HRESULT WINAPI SecManagerImpl_MapUrlToZone(IInternetSecurityManager *iface,
416                                                   LPCWSTR pwszUrl, DWORD *pdwZone,
417                                                   DWORD dwFlags)
418 {
419     SecManagerImpl *This = SECMGR_THIS(iface);
420     HRESULT hres;
421
422     TRACE("(%p)->(%s %p %08x)\n", iface, debugstr_w(pwszUrl), pdwZone, dwFlags);
423
424     if(This->custom_manager) {
425         hres = IInternetSecurityManager_MapUrlToZone(This->custom_manager,
426                 pwszUrl, pdwZone, dwFlags);
427         if(hres != INET_E_DEFAULT_ACTION)
428             return hres;
429     }
430
431     if(!pwszUrl) {
432         *pdwZone = -1;
433         return E_INVALIDARG;
434     }
435
436     if(dwFlags)
437         FIXME("not supported flags: %08x\n", dwFlags);
438
439     return map_url_to_zone(pwszUrl, pdwZone, NULL);
440 }
441
442 static HRESULT WINAPI SecManagerImpl_GetSecurityId(IInternetSecurityManager *iface, 
443         LPCWSTR pwszUrl, BYTE *pbSecurityId, DWORD *pcbSecurityId, DWORD_PTR dwReserved)
444 {
445     SecManagerImpl *This = SECMGR_THIS(iface);
446     LPWSTR url, ptr, ptr2;
447     DWORD zone, len;
448     HRESULT hres;
449
450     static const WCHAR wszFile[] = {'f','i','l','e',':'};
451
452     TRACE("(%p)->(%s %p %p %08lx)\n", iface, debugstr_w(pwszUrl), pbSecurityId,
453           pcbSecurityId, dwReserved);
454
455     if(This->custom_manager) {
456         hres = IInternetSecurityManager_GetSecurityId(This->custom_manager,
457                 pwszUrl, pbSecurityId, pcbSecurityId, dwReserved);
458         if(hres != INET_E_DEFAULT_ACTION)
459             return hres;
460     }
461
462     if(!pwszUrl || !pbSecurityId || !pcbSecurityId)
463         return E_INVALIDARG;
464
465     if(dwReserved)
466         FIXME("dwReserved is not supported\n");
467
468     hres = map_url_to_zone(pwszUrl, &zone, &url);
469     if(FAILED(hres))
470         return hres == 0x80041001 ? E_INVALIDARG : hres;
471
472     /* file protocol is a special case */
473     if(strlenW(url) >= sizeof(wszFile)/sizeof(WCHAR)
474             && !memcmp(url, wszFile, sizeof(wszFile)) && strchrW(url, '\\')) {
475
476         static const BYTE secidFile[] = {'f','i','l','e',':'};
477
478         heap_free(url);
479
480         if(*pcbSecurityId < sizeof(secidFile)+sizeof(zone))
481             return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER);
482
483         memcpy(pbSecurityId, secidFile, sizeof(secidFile));
484         *(DWORD*)(pbSecurityId+sizeof(secidFile)) = zone;
485
486         *pcbSecurityId = sizeof(secidFile)+sizeof(zone);
487         return S_OK;
488     }
489
490     ptr = strchrW(url, ':');
491     ptr2 = ++ptr;
492     while(*ptr2 == '/')
493         ptr2++;
494     if(ptr2 != ptr)
495         memmove(ptr, ptr2, (strlenW(ptr2)+1)*sizeof(WCHAR));
496
497     ptr = strchrW(ptr, '/');
498     if(ptr)
499         *ptr = 0;
500
501     len = WideCharToMultiByte(CP_ACP, 0, url, -1, NULL, 0, NULL, NULL)-1;
502
503     if(len+sizeof(DWORD) > *pcbSecurityId) {
504         heap_free(url);
505         return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER);
506     }
507
508     WideCharToMultiByte(CP_ACP, 0, url, -1, (LPSTR)pbSecurityId, len, NULL, NULL);
509     heap_free(url);
510
511     *(DWORD*)(pbSecurityId+len) = zone;
512
513     *pcbSecurityId = len+sizeof(DWORD);
514
515     return S_OK;
516 }
517
518
519 static HRESULT WINAPI SecManagerImpl_ProcessUrlAction(IInternetSecurityManager *iface,
520                                                       LPCWSTR pwszUrl, DWORD dwAction,
521                                                       BYTE *pPolicy, DWORD cbPolicy,
522                                                       BYTE *pContext, DWORD cbContext,
523                                                       DWORD dwFlags, DWORD dwReserved)
524 {
525     SecManagerImpl *This = SECMGR_THIS(iface);
526     DWORD zone, policy;
527     HRESULT hres;
528
529     TRACE("(%p)->(%s %08x %p %08x %p %08x %08x %08x)\n", iface, debugstr_w(pwszUrl), dwAction,
530           pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved);
531
532     if(This->custom_manager) {
533         hres = IInternetSecurityManager_ProcessUrlAction(This->custom_manager, pwszUrl, dwAction,
534                 pPolicy, cbPolicy, pContext, cbContext, dwFlags, dwReserved);
535         if(hres != INET_E_DEFAULT_ACTION)
536             return hres;
537     }
538
539     if(pContext || cbContext || dwFlags || dwReserved)
540         FIXME("Unsupported arguments\n");
541
542     if(!pwszUrl)
543         return E_INVALIDARG;
544
545     hres = map_url_to_zone(pwszUrl, &zone, NULL);
546     if(FAILED(hres))
547         return hres;
548
549     hres = get_action_policy(zone, dwAction, (BYTE*)&policy, sizeof(policy), URLZONEREG_DEFAULT);
550     if(FAILED(hres))
551         return hres;
552
553     TRACE("policy %x\n", policy);
554
555     switch(GetUrlPolicyPermissions(policy)) {
556     case URLPOLICY_ALLOW:
557     case URLPOLICY_CHANNEL_SOFTDIST_PRECACHE:
558         return S_OK;
559     case URLPOLICY_DISALLOW:
560         return S_FALSE;
561     case URLPOLICY_QUERY:
562         FIXME("URLPOLICY_QUERY not implemented\n");
563         return E_FAIL;
564     default:
565         FIXME("Not implemented policy %x\n", policy);
566     }
567
568     return E_FAIL;
569 }
570                                                
571
572 static HRESULT WINAPI SecManagerImpl_QueryCustomPolicy(IInternetSecurityManager *iface,
573                                                        LPCWSTR pwszUrl, REFGUID guidKey,
574                                                        BYTE **ppPolicy, DWORD *pcbPolicy,
575                                                        BYTE *pContext, DWORD cbContext,
576                                                        DWORD dwReserved)
577 {
578     SecManagerImpl *This = SECMGR_THIS(iface);
579     HRESULT hres;
580
581     TRACE("(%p)->(%s %s %p %p %p %08x %08x )\n", iface, debugstr_w(pwszUrl), debugstr_guid(guidKey),
582           ppPolicy, pcbPolicy, pContext, cbContext, dwReserved);
583
584     if(This->custom_manager) {
585         hres = IInternetSecurityManager_QueryCustomPolicy(This->custom_manager, pwszUrl, guidKey,
586                 ppPolicy, pcbPolicy, pContext, cbContext, dwReserved);
587         if(hres != INET_E_DEFAULT_ACTION)
588             return hres;
589     }
590
591     FIXME("Default action is not implemented\n");
592     return E_NOTIMPL;
593 }
594
595 static HRESULT WINAPI SecManagerImpl_SetZoneMapping(IInternetSecurityManager *iface,
596                                                     DWORD dwZone, LPCWSTR pwszPattern, DWORD dwFlags)
597 {
598     SecManagerImpl *This = SECMGR_THIS(iface);
599     HRESULT hres;
600
601     TRACE("(%p)->(%08x %s %08x)\n", iface, dwZone, debugstr_w(pwszPattern),dwFlags);
602
603     if(This->custom_manager) {
604         hres = IInternetSecurityManager_SetZoneMapping(This->custom_manager, dwZone,
605                 pwszPattern, dwFlags);
606         if(hres != INET_E_DEFAULT_ACTION)
607             return hres;
608     }
609
610     FIXME("Default action is not implemented\n");
611     return E_NOTIMPL;
612 }
613
614 static HRESULT WINAPI SecManagerImpl_GetZoneMappings(IInternetSecurityManager *iface,
615         DWORD dwZone, IEnumString **ppenumString, DWORD dwFlags)
616 {
617     SecManagerImpl *This = SECMGR_THIS(iface);
618     HRESULT hres;
619
620     TRACE("(%p)->(%08x %p %08x)\n", iface, dwZone, ppenumString,dwFlags);
621
622     if(This->custom_manager) {
623         hres = IInternetSecurityManager_GetZoneMappings(This->custom_manager, dwZone,
624                 ppenumString, dwFlags);
625         if(hres != INET_E_DEFAULT_ACTION)
626             return hres;
627     }
628
629     FIXME("Default action is not implemented\n");
630     return E_NOTIMPL;
631 }
632
633 static const IInternetSecurityManagerVtbl VT_SecManagerImpl =
634 {
635     SecManagerImpl_QueryInterface,
636     SecManagerImpl_AddRef,
637     SecManagerImpl_Release,
638     SecManagerImpl_SetSecuritySite,
639     SecManagerImpl_GetSecuritySite,
640     SecManagerImpl_MapUrlToZone,
641     SecManagerImpl_GetSecurityId,
642     SecManagerImpl_ProcessUrlAction,
643     SecManagerImpl_QueryCustomPolicy,
644     SecManagerImpl_SetZoneMapping,
645     SecManagerImpl_GetZoneMappings
646 };
647
648 HRESULT SecManagerImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj)
649 {
650     SecManagerImpl *This;
651
652     TRACE("(%p,%p)\n",pUnkOuter,ppobj);
653     This = heap_alloc(sizeof(*This));
654
655     /* Initialize the virtual function table. */
656     This->lpInternetSecurityManagerVtbl = &VT_SecManagerImpl;
657
658     This->ref = 1;
659     This->mgrsite = NULL;
660     This->custom_manager = NULL;
661
662     *ppobj = This;
663
664     URLMON_LockModule();
665
666     return S_OK;
667 }
668
669 /***********************************************************************
670  *           InternetZoneManager implementation
671  *
672  */
673 typedef struct {
674     const IInternetZoneManagerVtbl* lpVtbl;
675     LONG ref;
676     LPDWORD *zonemaps;
677     DWORD zonemap_count;
678 } ZoneMgrImpl;
679
680
681 /***********************************************************************
682  * build_zonemap_from_reg [internal]
683  *
684  * Enumerate the Zones in the Registry and return the Zones in a DWORD-array
685  * The number of the Zones is returned in data[0]
686  */
687 static LPDWORD build_zonemap_from_reg(void)
688 {
689     WCHAR name[32];
690     HKEY hkey;
691     LPDWORD data = NULL;
692     DWORD allocated = 6; /* space for the zonecount and Zone "0" upto Zone "4" */
693     DWORD used = 0;
694     DWORD res;
695     DWORD len;
696
697
698     res = RegOpenKeyW(HKEY_CURRENT_USER, wszZonesKey, &hkey);
699     if (res)
700         return NULL;
701
702     data = heap_alloc(allocated * sizeof(DWORD));
703     if (!data)
704         goto cleanup;
705
706     while (!res) {
707         name[0] = '\0';
708         len = sizeof(name) / sizeof(name[0]);
709         res = RegEnumKeyExW(hkey, used, name, &len, NULL, NULL, NULL, NULL);
710
711         if (!res) {
712             used++;
713             if (used == allocated) {
714                 LPDWORD new_data;
715
716                 allocated *= 2;
717                 new_data = heap_realloc_zero(data, allocated * sizeof(DWORD));
718                 if (!new_data)
719                     goto cleanup;
720
721                 data = new_data;
722             }
723             data[used] = atoiW(name);
724         }
725     }
726     if (used) {
727         RegCloseKey(hkey);
728         data[0] = used;
729         return data;
730     }
731
732 cleanup:
733     /* something failed */
734     RegCloseKey(hkey);
735     heap_free(data);
736     return NULL;
737 }
738
739 /********************************************************************
740  *      IInternetZoneManager_QueryInterface
741  */
742 static HRESULT WINAPI ZoneMgrImpl_QueryInterface(IInternetZoneManager* iface, REFIID riid, void** ppvObject)
743 {
744     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
745
746     TRACE("(%p)->(%s,%p)\n", This, debugstr_guid(riid), ppvObject);
747
748     if(!This || !ppvObject)
749         return E_INVALIDARG;
750
751     if(!IsEqualIID(&IID_IUnknown, riid) && !IsEqualIID(&IID_IInternetZoneManager, riid)) {
752         FIXME("Unknown interface: %s\n", debugstr_guid(riid));
753         *ppvObject = NULL;
754         return E_NOINTERFACE;
755     }
756
757     *ppvObject = iface;
758     IInternetZoneManager_AddRef(iface);
759
760     return S_OK;
761 }
762
763 /********************************************************************
764  *      IInternetZoneManager_AddRef
765  */
766 static ULONG WINAPI ZoneMgrImpl_AddRef(IInternetZoneManager* iface)
767 {
768     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
769     ULONG refCount = InterlockedIncrement(&This->ref);
770
771     TRACE("(%p)->(ref before=%u)\n",This, refCount - 1);
772
773     return refCount;
774 }
775
776 /********************************************************************
777  *      IInternetZoneManager_Release
778  */
779 static ULONG WINAPI ZoneMgrImpl_Release(IInternetZoneManager* iface)
780 {
781     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
782     ULONG refCount = InterlockedDecrement(&This->ref);
783
784     TRACE("(%p)->(ref before=%u)\n",This, refCount + 1);
785
786     if(!refCount) {
787         while (This->zonemap_count) heap_free(This->zonemaps[--This->zonemap_count]);
788         heap_free(This->zonemaps);
789         heap_free(This);
790         URLMON_UnlockModule();
791     }
792     
793     return refCount;
794 }
795
796 /********************************************************************
797  *      IInternetZoneManager_GetZoneAttributes
798  */
799 static HRESULT WINAPI ZoneMgrImpl_GetZoneAttributes(IInternetZoneManager* iface,
800                                                     DWORD dwZone,
801                                                     ZONEATTRIBUTES* pZoneAttributes)
802 {
803     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
804     HRESULT hr;
805     HKEY hcu;
806     HKEY hklm = NULL;
807
808     TRACE("(%p)->(%d %p)\n", This, dwZone, pZoneAttributes);
809
810     if (!pZoneAttributes)
811         return E_INVALIDARG;
812
813     hr = open_zone_key(HKEY_CURRENT_USER, dwZone, &hcu);
814     if (FAILED(hr))
815         return S_OK;  /* IE6 and older returned E_FAIL here */
816
817     hr = open_zone_key(HKEY_LOCAL_MACHINE, dwZone, &hklm);
818     if (FAILED(hr))
819         TRACE("Zone %d not in HKLM\n", dwZone);
820
821     get_string_from_reg(hcu, hklm, displaynameW, pZoneAttributes->szDisplayName, MAX_ZONE_PATH);
822     get_string_from_reg(hcu, hklm, descriptionW, pZoneAttributes->szDescription, MAX_ZONE_DESCRIPTION);
823     get_string_from_reg(hcu, hklm, iconW, pZoneAttributes->szIconPath, MAX_ZONE_PATH);
824     get_dword_from_reg(hcu, hklm, minlevelW, &pZoneAttributes->dwTemplateMinLevel);
825     get_dword_from_reg(hcu, hklm, currentlevelW, &pZoneAttributes->dwTemplateCurrentLevel);
826     get_dword_from_reg(hcu, hklm, recommendedlevelW, &pZoneAttributes->dwTemplateRecommended);
827     get_dword_from_reg(hcu, hklm, flagsW, &pZoneAttributes->dwFlags);
828
829     RegCloseKey(hklm);
830     RegCloseKey(hcu);
831     return S_OK;
832 }
833
834 /********************************************************************
835  *      IInternetZoneManager_SetZoneAttributes
836  */
837 static HRESULT WINAPI ZoneMgrImpl_SetZoneAttributes(IInternetZoneManager* iface,
838                                                     DWORD dwZone,
839                                                     ZONEATTRIBUTES* pZoneAttributes)
840 {
841     FIXME("(%p)->(%08x %p) stub\n", iface, dwZone, pZoneAttributes);
842     return E_NOTIMPL;
843 }
844
845 /********************************************************************
846  *      IInternetZoneManager_GetZoneCustomPolicy
847  */
848 static HRESULT WINAPI ZoneMgrImpl_GetZoneCustomPolicy(IInternetZoneManager* iface,
849                                                       DWORD dwZone,
850                                                       REFGUID guidKey,
851                                                       BYTE** ppPolicy,
852                                                       DWORD* pcbPolicy,
853                                                       URLZONEREG ulrZoneReg)
854 {
855     FIXME("(%p)->(%08x %s %p %p %08x) stub\n", iface, dwZone, debugstr_guid(guidKey),
856                                                     ppPolicy, pcbPolicy, ulrZoneReg);
857     return E_NOTIMPL;
858 }
859
860 /********************************************************************
861  *      IInternetZoneManager_SetZoneCustomPolicy
862  */
863 static HRESULT WINAPI ZoneMgrImpl_SetZoneCustomPolicy(IInternetZoneManager* iface,
864                                                       DWORD dwZone,
865                                                       REFGUID guidKey,
866                                                       BYTE* ppPolicy,
867                                                       DWORD cbPolicy,
868                                                       URLZONEREG ulrZoneReg)
869 {
870     FIXME("(%p)->(%08x %s %p %08x %08x) stub\n", iface, dwZone, debugstr_guid(guidKey),
871                                                     ppPolicy, cbPolicy, ulrZoneReg);
872     return E_NOTIMPL;
873 }
874
875 /********************************************************************
876  *      IInternetZoneManager_GetZoneActionPolicy
877  */
878 static HRESULT WINAPI ZoneMgrImpl_GetZoneActionPolicy(IInternetZoneManager* iface,
879         DWORD dwZone, DWORD dwAction, BYTE* pPolicy, DWORD cbPolicy, URLZONEREG urlZoneReg)
880 {
881     TRACE("(%p)->(%d %08x %p %d %d)\n", iface, dwZone, dwAction, pPolicy,
882             cbPolicy, urlZoneReg);
883
884     if(!pPolicy)
885         return E_INVALIDARG;
886
887     return get_action_policy(dwZone, dwAction, pPolicy, cbPolicy, urlZoneReg);
888 }
889
890 /********************************************************************
891  *      IInternetZoneManager_SetZoneActionPolicy
892  */
893 static HRESULT WINAPI ZoneMgrImpl_SetZoneActionPolicy(IInternetZoneManager* iface,
894                                                       DWORD dwZone,
895                                                       DWORD dwAction,
896                                                       BYTE* pPolicy,
897                                                       DWORD cbPolicy,
898                                                       URLZONEREG urlZoneReg)
899 {
900     FIXME("(%p)->(%08x %08x %p %08x %08x) stub\n", iface, dwZone, dwAction, pPolicy,
901                                                        cbPolicy, urlZoneReg);
902     return E_NOTIMPL;
903 }
904
905 /********************************************************************
906  *      IInternetZoneManager_PromptAction
907  */
908 static HRESULT WINAPI ZoneMgrImpl_PromptAction(IInternetZoneManager* iface,
909                                                DWORD dwAction,
910                                                HWND hwndParent,
911                                                LPCWSTR pwszUrl,
912                                                LPCWSTR pwszText,
913                                                DWORD dwPromptFlags)
914 {
915     FIXME("%p %08x %p %s %s %08x\n", iface, dwAction, hwndParent,
916           debugstr_w(pwszUrl), debugstr_w(pwszText), dwPromptFlags );
917     return E_NOTIMPL;
918 }
919
920 /********************************************************************
921  *      IInternetZoneManager_LogAction
922  */
923 static HRESULT WINAPI ZoneMgrImpl_LogAction(IInternetZoneManager* iface,
924                                             DWORD dwAction,
925                                             LPCWSTR pwszUrl,
926                                             LPCWSTR pwszText,
927                                             DWORD dwLogFlags)
928 {
929     FIXME("(%p)->(%08x %s %s %08x) stub\n", iface, dwAction, debugstr_w(pwszUrl),
930                                               debugstr_w(pwszText), dwLogFlags);
931     return E_NOTIMPL;
932 }
933
934 /********************************************************************
935  *      IInternetZoneManager_CreateZoneEnumerator
936  */
937 static HRESULT WINAPI ZoneMgrImpl_CreateZoneEnumerator(IInternetZoneManager* iface,
938                                                        DWORD* pdwEnum,
939                                                        DWORD* pdwCount,
940                                                        DWORD dwFlags)
941 {
942     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
943     LPDWORD * new_maps;
944     LPDWORD data;
945     DWORD i;
946
947     TRACE("(%p)->(%p, %p, 0x%08x)\n", This, pdwEnum, pdwCount, dwFlags);
948     if (!pdwEnum || !pdwCount || (dwFlags != 0))
949         return E_INVALIDARG;
950
951     data = build_zonemap_from_reg();
952     TRACE("found %d zones\n", data ? data[0] : -1);
953
954     if (!data)
955         return E_FAIL;
956
957     for (i = 0; i < This->zonemap_count; i++) {
958         if (This->zonemaps && !This->zonemaps[i]) {
959             This->zonemaps[i] = data;
960             *pdwEnum = i;
961             *pdwCount = data[0];
962             return S_OK;
963         }
964     }
965
966     if (This->zonemaps) {
967         /* try to double the nr. of pointers in the array */
968         new_maps = heap_realloc_zero(This->zonemaps, This->zonemap_count * 2 * sizeof(LPDWORD));
969         if (new_maps)
970             This->zonemap_count *= 2;
971     }
972     else
973     {
974         This->zonemap_count = 2;
975         new_maps = heap_alloc_zero(This->zonemap_count * sizeof(LPDWORD));
976     }
977
978     if (!new_maps) {
979         heap_free(data);
980         return E_FAIL;
981     }
982     This->zonemaps = new_maps;
983     This->zonemaps[i] = data;
984     *pdwEnum = i;
985     *pdwCount = data[0];
986     return S_OK;
987 }
988
989 /********************************************************************
990  *      IInternetZoneManager_GetZoneAt
991  */
992 static HRESULT WINAPI ZoneMgrImpl_GetZoneAt(IInternetZoneManager* iface,
993                                             DWORD dwEnum,
994                                             DWORD dwIndex,
995                                             DWORD* pdwZone)
996 {
997     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
998     LPDWORD data;
999
1000     TRACE("(%p)->(0x%08x, %d, %p)\n", This, dwEnum, dwIndex, pdwZone);
1001
1002     /* make sure, that dwEnum and dwIndex are in the valid range */
1003     if (dwEnum < This->zonemap_count) {
1004         if ((data = This->zonemaps[dwEnum])) {
1005             if (dwIndex < data[0]) {
1006                 *pdwZone = data[dwIndex + 1];
1007                 return S_OK;
1008             }
1009         }
1010     }
1011     return E_INVALIDARG;
1012 }
1013
1014 /********************************************************************
1015  *      IInternetZoneManager_DestroyZoneEnumerator
1016  */
1017 static HRESULT WINAPI ZoneMgrImpl_DestroyZoneEnumerator(IInternetZoneManager* iface,
1018                                                         DWORD dwEnum)
1019 {
1020     ZoneMgrImpl* This = (ZoneMgrImpl*)iface;
1021     LPDWORD data;
1022
1023     TRACE("(%p)->(0x%08x)\n", This, dwEnum);
1024     /* make sure, that dwEnum is valid */
1025     if (dwEnum < This->zonemap_count) {
1026         if ((data = This->zonemaps[dwEnum])) {
1027             This->zonemaps[dwEnum] = NULL;
1028             heap_free(data);
1029             return S_OK;
1030         }
1031     }
1032     return E_INVALIDARG;
1033 }
1034
1035 /********************************************************************
1036  *      IInternetZoneManager_CopyTemplatePoliciesToZone
1037  */
1038 static HRESULT WINAPI ZoneMgrImpl_CopyTemplatePoliciesToZone(IInternetZoneManager* iface,
1039                                                              DWORD dwTemplate,
1040                                                              DWORD dwZone,
1041                                                              DWORD dwReserved)
1042 {
1043     FIXME("(%p)->(%08x %08x %08x) stub\n", iface, dwTemplate, dwZone, dwReserved);
1044     return E_NOTIMPL;
1045 }
1046
1047 /********************************************************************
1048  *      IInternetZoneManager_Construct
1049  */
1050 static const IInternetZoneManagerVtbl ZoneMgrImplVtbl = {
1051     ZoneMgrImpl_QueryInterface,
1052     ZoneMgrImpl_AddRef,
1053     ZoneMgrImpl_Release,
1054     ZoneMgrImpl_GetZoneAttributes,
1055     ZoneMgrImpl_SetZoneAttributes,
1056     ZoneMgrImpl_GetZoneCustomPolicy,
1057     ZoneMgrImpl_SetZoneCustomPolicy,
1058     ZoneMgrImpl_GetZoneActionPolicy,
1059     ZoneMgrImpl_SetZoneActionPolicy,
1060     ZoneMgrImpl_PromptAction,
1061     ZoneMgrImpl_LogAction,
1062     ZoneMgrImpl_CreateZoneEnumerator,
1063     ZoneMgrImpl_GetZoneAt,
1064     ZoneMgrImpl_DestroyZoneEnumerator,
1065     ZoneMgrImpl_CopyTemplatePoliciesToZone,
1066 };
1067
1068 HRESULT ZoneMgrImpl_Construct(IUnknown *pUnkOuter, LPVOID *ppobj)
1069 {
1070     ZoneMgrImpl* ret = heap_alloc_zero(sizeof(ZoneMgrImpl));
1071
1072     TRACE("(%p %p)\n", pUnkOuter, ppobj);
1073     ret->lpVtbl = &ZoneMgrImplVtbl;
1074     ret->ref = 1;
1075     *ppobj = (IInternetZoneManager*)ret;
1076
1077     URLMON_LockModule();
1078
1079     return S_OK;
1080 }
1081
1082 /***********************************************************************
1083  *           CoInternetCreateSecurityManager (URLMON.@)
1084  *
1085  */
1086 HRESULT WINAPI CoInternetCreateSecurityManager( IServiceProvider *pSP,
1087     IInternetSecurityManager **ppSM, DWORD dwReserved )
1088 {
1089     TRACE("%p %p %d\n", pSP, ppSM, dwReserved );
1090
1091     if(pSP)
1092         FIXME("pSP not supported\n");
1093
1094     return SecManagerImpl_Construct(NULL, (void**) ppSM);
1095 }
1096
1097 /********************************************************************
1098  *      CoInternetCreateZoneManager (URLMON.@)
1099  */
1100 HRESULT WINAPI CoInternetCreateZoneManager(IServiceProvider* pSP, IInternetZoneManager** ppZM, DWORD dwReserved)
1101 {
1102     TRACE("(%p %p %x)\n", pSP, ppZM, dwReserved);
1103     return ZoneMgrImpl_Construct(NULL, (void**)ppZM);
1104 }