[URLMON] Sync with Wine Staging 4.18. CORE-16441
[reactos.git] / dll / win32 / urlmon / internet.c
1 /*
2 * Copyright 2005 Jacek Caban
3 * Copyright 2011 Thomas Mullaly for CodeWeavers
4 *
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 */
19
20 #include "urlmon_main.h"
21 #include "winreg.h"
22 #include "shlwapi.h"
23
24 #include "wine/debug.h"
25
26 WINE_DEFAULT_DEBUG_CHANNEL(urlmon);
27
28 static const WCHAR feature_control_keyW[] =
29 {'S','o','f','t','w','a','r','e','\\',
30 'M','i','c','r','o','s','o','f','t','\\',
31 'I','n','t','e','r','n','e','t',' ','E','x','p','l','o','r','e','r','\\',
32 'M','a','i','n','\\',
33 'F','e','a','t','u','r','e','C','o','n','t','r','o','l',0};
34
35 static const WCHAR feature_object_cachingW[] =
36 {'F','E','A','T','U','R','E','_','O','B','J','E','C','T','_','C','A','C','H','I','N','G',0};
37 static const WCHAR feature_zone_elevationW[] =
38 {'F','E','A','T','U','R','E','_','Z','O','N','E','_','E','L','E','V','A','T','I','O','N',0};
39 static const WCHAR feature_mime_handlingW[] =
40 {'F','E','A','T','U','R','E','_','M','I','M','E','_','H','A','N','D','L','I','N','G',0};
41 static const WCHAR feature_mime_sniffingW[] =
42 {'F','E','A','T','U','R','E','_','M','I','M','E','_','S','N','I','F','F','I','N','G',0};
43 static const WCHAR feature_window_restrictionsW[] =
44 {'F','E','A','T','U','R','E','_','W','I','N','D','O','W','_','R','E','S','T','R','I','C','T','I','O','N','S',0};
45 static const WCHAR feature_weboc_popupmanagementW[] =
46 {'F','E','A','T','U','R','E','_','W','E','B','O','C','_','P','O','P','U','P','M','A','N','A','G','E','M','E','N','T',0};
47 static const WCHAR feature_behaviorsW[] =
48 {'F','E','A','T','U','R','E','_','B','E','H','A','V','I','O','R','S',0};
49 static const WCHAR feature_disable_mk_protocolW[] =
50 {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','M','K','_','P','R','O','T','O','C','O','L',0};
51 static const WCHAR feature_localmachine_lockdownW[] =
52 {'F','E','A','T','U','R','E','_','L','O','C','A','L','M','A','C','H','I','N','E','_','L','O','C','K','D','O','W','N',0};
53 static const WCHAR feature_securitybandW[] =
54 {'F','E','A','T','U','R','E','_','S','E','C','U','R','I','T','Y','B','A','N','D',0};
55 static const WCHAR feature_restrict_activexinstallW[] =
56 {'F','E','A','T','U','R','E','_','R','E','S','T','R','I','C','T','_','A','C','T','I','V','E','X','I','N','S','T','A','L','L',0};
57 static const WCHAR feature_validate_navigate_urlW[] =
58 {'F','E','A','T','U','R','E','_','V','A','L','I','D','A','T','E','_','N','A','V','I','G','A','T','E','_','U','R','L',0};
59 static const WCHAR feature_restrict_filedownloadW[] =
60 {'F','E','A','T','U','R','E','_','R','E','S','T','R','I','C','T','_','F','I','L','E','D','O','W','N','L','O','A','D',0};
61 static const WCHAR feature_addon_managementW[] =
62 {'F','E','A','T','U','R','E','_','A','D','D','O','N','_','M','A','N','A','G','E','M','E','N','T',0};
63 static const WCHAR feature_protocol_lockdownW[] =
64 {'F','E','A','T','U','R','E','_','P','R','O','T','O','C','O','L','_','L','O','C','K','D','O','W','N',0};
65 static const WCHAR feature_http_username_password_disableW[] =
66 {'F','E','A','T','U','R','E','_','H','T','T','P','_','U','S','E','R','N','A','M','E','_',
67 'P','A','S','S','W','O','R','D','_','D','I','S','A','B','L','E',0};
68 static const WCHAR feature_safe_bindtoobjectW[] =
69 {'F','E','A','T','U','R','E','_','S','A','F','E','_','B','I','N','D','T','O','O','B','J','E','C','T',0};
70 static const WCHAR feature_unc_savedfilecheckW[] =
71 {'F','E','A','T','U','R','E','_','U','N','C','_','S','A','V','E','D','F','I','L','E','C','H','E','C','K',0};
72 static const WCHAR feature_get_url_dom_filepath_unencodedW[] =
73 {'F','E','A','T','U','R','E','_','G','E','T','_','U','R','L','_','D','O','M','_',
74 'F','I','L','E','P','A','T','H','_','U','N','E','N','C','O','D','E','D',0};
75 static const WCHAR feature_tabbed_browsingW[] =
76 {'F','E','A','T','U','R','E','_','T','A','B','B','E','D','_','B','R','O','W','S','I','N','G',0};
77 static const WCHAR feature_ssluxW[] =
78 {'F','E','A','T','U','R','E','_','S','S','L','U','X',0};
79 static const WCHAR feature_disable_navigation_soundsW[] =
80 {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','N','A','V','I','G','A','T','I','O','N','_',
81 'S','O','U','N','D','S',0};
82 static const WCHAR feature_disable_legacy_compressionW[] =
83 {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','L','E','G','A','C','Y','_',
84 'C','O','M','P','R','E','S','S','I','O','N',0};
85 static const WCHAR feature_force_addr_and_statusW[] =
86 {'F','E','A','T','U','R','E','_','F','O','R','C','E','_','A','D','D','R','_','A','N','D','_',
87 'S','T','A','T','U','S',0};
88 static const WCHAR feature_xmlhttpW[] =
89 {'F','E','A','T','U','R','E','_','X','M','L','H','T','T','P',0};
90 static const WCHAR feature_disable_telnet_protocolW[] =
91 {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','T','E','L','N','E','T','_',
92 'P','R','O','T','O','C','O','L',0};
93 static const WCHAR feature_feedsW[] =
94 {'F','E','A','T','U','R','E','_','F','E','E','D','S',0};
95 static const WCHAR feature_block_input_promptsW[] =
96 {'F','E','A','T','U','R','E','_','B','L','O','C','K','_','I','N','P','U','T','_','P','R','O','M','P','T','S',0};
97
98 static CRITICAL_SECTION process_features_cs;
99 static CRITICAL_SECTION_DEBUG process_features_cs_dbg =
100 {
101 0, 0, &process_features_cs,
102 { &process_features_cs_dbg.ProcessLocksList, &process_features_cs_dbg.ProcessLocksList },
103 0, 0, { (DWORD_PTR)(__FILE__ ": process features") }
104 };
105 static CRITICAL_SECTION process_features_cs = { &process_features_cs_dbg, -1, 0, 0, 0, 0 };
106
107 typedef struct feature_control {
108 LPCWSTR feature_name;
109 BOOL enabled;
110 BOOL check_registry;
111 } feature_control;
112
113 /* IMPORTANT!!!
114 *
115 * This array is indexed using INTERNETFEATURELIST values, so everything must
116 * appear in the same order as it does in INTERNETFEATURELIST.
117 */
118 static feature_control process_feature_controls[FEATURE_ENTRY_COUNT] = {
119 {feature_object_cachingW, TRUE ,TRUE},
120 {feature_zone_elevationW, FALSE,TRUE},
121 {feature_mime_handlingW, FALSE,TRUE},
122 {feature_mime_sniffingW, FALSE,TRUE},
123 {feature_window_restrictionsW, FALSE,TRUE},
124 {feature_weboc_popupmanagementW, FALSE,TRUE},
125 {feature_behaviorsW, TRUE ,TRUE},
126 {feature_disable_mk_protocolW, TRUE ,TRUE},
127 {feature_localmachine_lockdownW, FALSE,TRUE},
128 {feature_securitybandW, FALSE,TRUE},
129 {feature_restrict_activexinstallW, FALSE,TRUE},
130 {feature_validate_navigate_urlW, FALSE,TRUE},
131 {feature_restrict_filedownloadW, FALSE,TRUE},
132 {feature_addon_managementW, FALSE,TRUE},
133 {feature_protocol_lockdownW, FALSE,TRUE},
134 {feature_http_username_password_disableW, FALSE,TRUE},
135 {feature_safe_bindtoobjectW, FALSE,TRUE},
136 {feature_unc_savedfilecheckW, FALSE,TRUE},
137 {feature_get_url_dom_filepath_unencodedW, TRUE ,TRUE},
138 {feature_tabbed_browsingW, FALSE,TRUE},
139 {feature_ssluxW, FALSE,TRUE},
140 {feature_disable_navigation_soundsW, FALSE,TRUE},
141 {feature_disable_legacy_compressionW, TRUE ,TRUE},
142 {feature_force_addr_and_statusW, FALSE,TRUE},
143 {feature_xmlhttpW, TRUE ,TRUE},
144 {feature_disable_telnet_protocolW, FALSE,TRUE},
145 {feature_feedsW, FALSE,TRUE},
146 {feature_block_input_promptsW, FALSE,TRUE}
147 };
148
149 static HRESULT parse_schema(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
150 {
151 WCHAR *ptr;
152 DWORD len = 0;
153
154 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
155
156 if(flags)
157 ERR("wrong flags\n");
158
159 ptr = wcschr(url, ':');
160 if(ptr)
161 len = ptr-url;
162
163 if(rsize)
164 *rsize = len;
165
166 if(len >= size)
167 return E_POINTER;
168
169 if(len)
170 memcpy(result, url, len*sizeof(WCHAR));
171 result[len] = 0;
172
173 return S_OK;
174 }
175
176 static HRESULT parse_canonicalize_url(LPCWSTR url, DWORD flags, LPWSTR result,
177 DWORD size, DWORD *rsize)
178 {
179 IInternetProtocolInfo *protocol_info;
180 DWORD prsize = size;
181 HRESULT hres;
182
183 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
184
185 protocol_info = get_protocol_info(url);
186
187 if(protocol_info) {
188 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_CANONICALIZE,
189 flags, result, size, rsize, 0);
190 IInternetProtocolInfo_Release(protocol_info);
191 if(SUCCEEDED(hres))
192 return hres;
193 }
194
195 hres = UrlCanonicalizeW(url, result, &prsize, flags);
196
197 if(rsize)
198 *rsize = prsize;
199 return hres;
200 }
201
202 static HRESULT parse_security_url(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
203 {
204 IInternetProtocolInfo *protocol_info;
205 HRESULT hres;
206
207 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
208
209 protocol_info = get_protocol_info(url);
210
211 if(protocol_info) {
212 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_URL,
213 flags, result, size, rsize, 0);
214 IInternetProtocolInfo_Release(protocol_info);
215 return hres;
216 }
217
218 return E_FAIL;
219 }
220
221 static HRESULT parse_encode(LPCWSTR url, PARSEACTION action, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
222 {
223 IInternetProtocolInfo *protocol_info;
224 DWORD prsize;
225 HRESULT hres;
226
227 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
228
229 protocol_info = get_protocol_info(url);
230
231 if(protocol_info) {
232 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, action,
233 flags, result, size, rsize, 0);
234 IInternetProtocolInfo_Release(protocol_info);
235 if(SUCCEEDED(hres))
236 return hres;
237 }
238
239 prsize = size;
240 hres = UrlUnescapeW((LPWSTR)url, result, &prsize, flags);
241
242 if(rsize)
243 *rsize = prsize;
244
245 return hres;
246 }
247
248 static HRESULT parse_path_from_url(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
249 {
250 IInternetProtocolInfo *protocol_info;
251 DWORD prsize;
252 HRESULT hres;
253
254 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
255
256 protocol_info = get_protocol_info(url);
257
258 if(protocol_info) {
259 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_PATH_FROM_URL,
260 flags, result, size, rsize, 0);
261 IInternetProtocolInfo_Release(protocol_info);
262 if(SUCCEEDED(hres))
263 return hres;
264 }
265
266 prsize = size;
267 hres = PathCreateFromUrlW(url, result, &prsize, 0);
268
269 if(rsize)
270 *rsize = prsize;
271 return hres;
272 }
273
274 static HRESULT parse_security_domain(LPCWSTR url, DWORD flags, LPWSTR result,
275 DWORD size, DWORD *rsize)
276 {
277 IInternetProtocolInfo *protocol_info;
278 HRESULT hres;
279
280 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
281
282 protocol_info = get_protocol_info(url);
283
284 if(protocol_info) {
285 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_DOMAIN,
286 flags, result, size, rsize, 0);
287 IInternetProtocolInfo_Release(protocol_info);
288 if(SUCCEEDED(hres))
289 return hres;
290 }
291
292 return E_FAIL;
293 }
294
295 static HRESULT parse_domain(LPCWSTR url, DWORD flags, LPWSTR result,
296 DWORD size, DWORD *rsize)
297 {
298 IInternetProtocolInfo *protocol_info;
299 HRESULT hres;
300
301 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
302
303 protocol_info = get_protocol_info(url);
304
305 if(protocol_info) {
306 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_DOMAIN,
307 flags, result, size, rsize, 0);
308 IInternetProtocolInfo_Release(protocol_info);
309 if(SUCCEEDED(hres))
310 return hres;
311 }
312
313 hres = UrlGetPartW(url, result, &size, URL_PART_HOSTNAME, flags);
314 if(rsize)
315 *rsize = size;
316
317 if(hres == E_POINTER)
318 return S_FALSE;
319
320 if(FAILED(hres))
321 return E_FAIL;
322 return S_OK;
323 }
324
325 static HRESULT parse_rootdocument(LPCWSTR url, DWORD flags, LPWSTR result,
326 DWORD size, DWORD *rsize)
327 {
328 IInternetProtocolInfo *protocol_info;
329 PARSEDURLW url_info;
330 HRESULT hres;
331
332 TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
333
334 protocol_info = get_protocol_info(url);
335
336 if(protocol_info) {
337 hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_ROOTDOCUMENT,
338 flags, result, size, rsize, 0);
339 IInternetProtocolInfo_Release(protocol_info);
340 if(SUCCEEDED(hres))
341 return hres;
342 }
343
344 url_info.cbSize = sizeof(url_info);
345 if(FAILED(ParseURLW(url, &url_info)))
346 return E_FAIL;
347
348 switch(url_info.nScheme) {
349 case URL_SCHEME_FTP:
350 case URL_SCHEME_HTTP:
351 case URL_SCHEME_HTTPS:
352 if(url_info.cchSuffix<3 || *(url_info.pszSuffix)!='/'
353 || *(url_info.pszSuffix+1)!='/')
354 return E_FAIL;
355
356 if(size < url_info.cchProtocol+3) {
357 size = 0;
358 hres = UrlGetPartW(url, result, &size, URL_PART_HOSTNAME, flags);
359
360 if(rsize)
361 *rsize = size+url_info.cchProtocol+3;
362
363 if(hres == E_POINTER)
364 return S_FALSE;
365
366 return hres;
367 }
368
369 size -= url_info.cchProtocol+3;
370 hres = UrlGetPartW(url, result+url_info.cchProtocol+3,
371 &size, URL_PART_HOSTNAME, flags);
372
373 if(hres == E_POINTER)
374 return S_FALSE;
375
376 if(FAILED(hres))
377 return E_FAIL;
378
379 if(rsize)
380 *rsize = size+url_info.cchProtocol+3;
381
382 memcpy(result, url, (url_info.cchProtocol+3)*sizeof(WCHAR));
383 return hres;
384 default:
385 return E_FAIL;
386 }
387 }
388
389 /**************************************************************************
390 * CoInternetParseUrl (URLMON.@)
391 */
392 HRESULT WINAPI CoInternetParseUrl(LPCWSTR pwzUrl, PARSEACTION ParseAction, DWORD dwFlags,
393 LPWSTR pszResult, DWORD cchResult, DWORD *pcchResult, DWORD dwReserved)
394 {
395 if(dwReserved)
396 WARN("dwReserved = %d\n", dwReserved);
397
398 switch(ParseAction) {
399 case PARSE_CANONICALIZE:
400 return parse_canonicalize_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
401 case PARSE_SECURITY_URL:
402 return parse_security_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
403 case PARSE_ENCODE:
404 case PARSE_UNESCAPE:
405 return parse_encode(pwzUrl, ParseAction, dwFlags, pszResult, cchResult, pcchResult);
406 case PARSE_PATH_FROM_URL:
407 return parse_path_from_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
408 case PARSE_SCHEMA:
409 return parse_schema(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
410 case PARSE_SECURITY_DOMAIN:
411 return parse_security_domain(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
412 case PARSE_DOMAIN:
413 return parse_domain(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
414 case PARSE_ROOTDOCUMENT:
415 return parse_rootdocument(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
416 default:
417 FIXME("not supported action %d\n", ParseAction);
418 }
419
420 return E_NOTIMPL;
421 }
422
423 /**************************************************************************
424 * CoInternetCombineUrl (URLMON.@)
425 */
426 HRESULT WINAPI CoInternetCombineUrl(LPCWSTR pwzBaseUrl, LPCWSTR pwzRelativeUrl,
427 DWORD dwCombineFlags, LPWSTR pwzResult, DWORD cchResult, DWORD *pcchResult,
428 DWORD dwReserved)
429 {
430 IInternetProtocolInfo *protocol_info;
431 DWORD size = cchResult;
432 HRESULT hres;
433
434 TRACE("(%s,%s,0x%08x,%p,%d,%p,%d)\n", debugstr_w(pwzBaseUrl),
435 debugstr_w(pwzRelativeUrl), dwCombineFlags, pwzResult, cchResult, pcchResult,
436 dwReserved);
437
438 protocol_info = get_protocol_info(pwzBaseUrl);
439
440 if(protocol_info) {
441 hres = IInternetProtocolInfo_CombineUrl(protocol_info, pwzBaseUrl, pwzRelativeUrl,
442 dwCombineFlags, pwzResult, cchResult, pcchResult, dwReserved);
443 IInternetProtocolInfo_Release(protocol_info);
444 if(SUCCEEDED(hres))
445 return hres;
446 }
447
448
449 hres = UrlCombineW(pwzBaseUrl, pwzRelativeUrl, pwzResult, &size, dwCombineFlags);
450
451 if(pcchResult)
452 *pcchResult = size;
453
454 return hres;
455 }
456
457 /**************************************************************************
458 * CoInternetCompareUrl (URLMON.@)
459 */
460 HRESULT WINAPI CoInternetCompareUrl(LPCWSTR pwzUrl1, LPCWSTR pwzUrl2, DWORD dwCompareFlags)
461 {
462 IInternetProtocolInfo *protocol_info;
463 HRESULT hres;
464
465 TRACE("(%s,%s,%08x)\n", debugstr_w(pwzUrl1), debugstr_w(pwzUrl2), dwCompareFlags);
466
467 protocol_info = get_protocol_info(pwzUrl1);
468
469 if(protocol_info) {
470 hres = IInternetProtocolInfo_CompareUrl(protocol_info, pwzUrl1, pwzUrl2, dwCompareFlags);
471 IInternetProtocolInfo_Release(protocol_info);
472 if(SUCCEEDED(hres))
473 return hres;
474 }
475
476 return UrlCompareW(pwzUrl1, pwzUrl2, dwCompareFlags) ? S_FALSE : S_OK;
477 }
478
479 /***********************************************************************
480 * CoInternetQueryInfo (URLMON.@)
481 *
482 * Retrieves information relevant to a specified URL
483 *
484 */
485 HRESULT WINAPI CoInternetQueryInfo(LPCWSTR pwzUrl, QUERYOPTION QueryOption,
486 DWORD dwQueryFlags, LPVOID pvBuffer, DWORD cbBuffer, DWORD *pcbBuffer,
487 DWORD dwReserved)
488 {
489 IInternetProtocolInfo *protocol_info;
490 HRESULT hres;
491
492 TRACE("(%s, %x, %x, %p, %x, %p, %x)\n", debugstr_w(pwzUrl),
493 QueryOption, dwQueryFlags, pvBuffer, cbBuffer, pcbBuffer, dwReserved);
494
495 protocol_info = get_protocol_info(pwzUrl);
496
497 if(protocol_info) {
498 hres = IInternetProtocolInfo_QueryInfo(protocol_info, pwzUrl, QueryOption, dwQueryFlags,
499 pvBuffer, cbBuffer, pcbBuffer, dwReserved);
500 IInternetProtocolInfo_Release(protocol_info);
501
502 return SUCCEEDED(hres) ? hres : E_FAIL;
503 }
504
505 switch(QueryOption) {
506 case QUERY_USES_NETWORK:
507 if(!pvBuffer || cbBuffer < sizeof(DWORD))
508 return E_FAIL;
509
510 *(DWORD*)pvBuffer = 0;
511 if(pcbBuffer)
512 *pcbBuffer = sizeof(DWORD);
513 break;
514
515 default:
516 FIXME("Not supported option %d\n", QueryOption);
517 return E_NOTIMPL;
518 }
519
520 return S_OK;
521 }
522
523 static void set_feature_on_process(INTERNETFEATURELIST feature, BOOL enable)
524 {
525 EnterCriticalSection(&process_features_cs);
526
527 process_feature_controls[feature].enabled = enable;
528 process_feature_controls[feature].check_registry = FALSE;
529
530 LeaveCriticalSection(&process_features_cs);
531 }
532
533 static HRESULT set_internet_feature(INTERNETFEATURELIST feature, DWORD flags, BOOL enable)
534 {
535 const DWORD supported_flags = SET_FEATURE_ON_PROCESS;
536
537 if(feature >= FEATURE_ENTRY_COUNT)
538 return E_FAIL;
539
540 if(flags & ~supported_flags)
541 FIXME("Unsupported flags: %08x\n", flags & ~supported_flags);
542
543 if(flags & SET_FEATURE_ON_PROCESS)
544 set_feature_on_process(feature, enable);
545
546 return S_OK;
547 }
548
549 static BOOL get_feature_from_reg(HKEY feature_control, LPCWSTR feature_name, LPCWSTR process_name, BOOL *enabled)
550 {
551 DWORD type, value, size;
552 HKEY feature;
553 DWORD res;
554
555 static const WCHAR wildcardW[] = {'*',0};
556
557 res = RegOpenKeyW(feature_control, feature_name, &feature);
558 if(res != ERROR_SUCCESS)
559 return FALSE;
560
561 size = sizeof(DWORD);
562 res = RegQueryValueExW(feature, process_name, NULL, &type, (BYTE*)&value, &size);
563 if(res != ERROR_SUCCESS || type != REG_DWORD) {
564 size = sizeof(DWORD);
565 res = RegQueryValueExW(feature, wildcardW, NULL, &type, (BYTE*)&value, &size);
566 }
567
568 RegCloseKey(feature);
569 if(res != ERROR_SUCCESS)
570 return FALSE;
571
572 if(type != REG_DWORD) {
573 WARN("Unexpected registry value type %d (expected REG_DWORD) for %s\n", type, debugstr_w(wildcardW));
574 return FALSE;
575 }
576
577 *enabled = value == 1;
578 return TRUE;
579 }
580
581 /* Assumes 'process_features_cs' is held. */
582 static HRESULT load_process_feature(INTERNETFEATURELIST feature)
583 {
584 DWORD res;
585 HKEY feature_control;
586 WCHAR module_name[MAX_PATH];
587 LPCWSTR process_name, feature_name;
588 HRESULT hres = S_FALSE;
589 BOOL check_hklm = FALSE;
590 BOOL enabled;
591
592 if (!GetModuleFileNameW(NULL, module_name, ARRAY_SIZE(module_name))) {
593 ERR("Failed to get module file name: %u\n", GetLastError());
594 return E_UNEXPECTED;
595 }
596
597 process_name = wcsrchr(module_name, '\\');
598 if(!process_name) {
599 ERR("Invalid module file name: %s\n", debugstr_w(module_name));
600 return E_UNEXPECTED;
601 }
602
603 /* Skip past the '\\' in front of the filename. */
604 ++process_name;
605
606 feature_name = process_feature_controls[feature].feature_name;
607
608 res = RegOpenKeyW(HKEY_CURRENT_USER, feature_control_keyW, &feature_control);
609 if(res == ERROR_SUCCESS) {
610 if(get_feature_from_reg(feature_control, feature_name, process_name, &enabled)) {
611 hres = enabled ? S_OK : S_FALSE;
612 process_feature_controls[feature].enabled = enabled;
613 } else
614 /* We didn't find anything in HKCU, so check HKLM. */
615 check_hklm = TRUE;
616
617 RegCloseKey(feature_control);
618 }
619
620 if(check_hklm) {
621 res = RegOpenKeyW(HKEY_LOCAL_MACHINE, feature_control_keyW, &feature_control);
622 if(res == ERROR_SUCCESS) {
623 if(get_feature_from_reg(feature_control, feature_name, process_name, &enabled)) {
624 hres = enabled ? S_OK : S_FALSE;
625 process_feature_controls[feature].enabled = enabled;
626 }
627 RegCloseKey(feature_control);
628 }
629 }
630
631 /* Don't bother checking the registry again for this feature. */
632 process_feature_controls[feature].check_registry = FALSE;
633
634 return hres;
635 }
636
637 static HRESULT get_feature_from_process(INTERNETFEATURELIST feature)
638 {
639 HRESULT hres = S_OK;
640
641 EnterCriticalSection(&process_features_cs);
642
643 /* Try loading the feature from the registry, if it hasn't already
644 * been done.
645 */
646 if(process_feature_controls[feature].check_registry)
647 hres = load_process_feature(feature);
648 if(SUCCEEDED(hres))
649 hres = process_feature_controls[feature].enabled ? S_OK : S_FALSE;
650
651 LeaveCriticalSection(&process_features_cs);
652
653 return hres;
654 }
655
656 static HRESULT get_internet_feature(INTERNETFEATURELIST feature, DWORD flags)
657 {
658 HRESULT hres;
659
660 if(feature >= FEATURE_ENTRY_COUNT)
661 return E_FAIL;
662
663 if(flags == GET_FEATURE_FROM_PROCESS)
664 hres = get_feature_from_process(feature);
665 else {
666 FIXME("Unsupported flags: %08x\n", flags);
667 hres = E_NOTIMPL;
668 }
669
670 return hres;
671 }
672
673 /***********************************************************************
674 * CoInternetSetFeatureEnabled (URLMON.@)
675 */
676 HRESULT WINAPI CoInternetSetFeatureEnabled(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags, BOOL fEnable)
677 {
678 TRACE("(%d, %08x, %x)\n", FeatureEntry, dwFlags, fEnable);
679 return set_internet_feature(FeatureEntry, dwFlags, fEnable);
680 }
681
682 /***********************************************************************
683 * CoInternetIsFeatureEnabled (URLMON.@)
684 */
685 HRESULT WINAPI CoInternetIsFeatureEnabled(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags)
686 {
687 TRACE("(%d, %08x)\n", FeatureEntry, dwFlags);
688 return get_internet_feature(FeatureEntry, dwFlags);
689 }
690
691 /***********************************************************************
692 * CoInternetIsFeatureEnabledForUrl (URLMON.@)
693 */
694 HRESULT WINAPI CoInternetIsFeatureEnabledForUrl(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags, LPCWSTR szURL,
695 IInternetSecurityManager *pSecMgr)
696 {
697 DWORD urlaction = 0;
698 HRESULT hres;
699
700 TRACE("(%d %08x %s %p)\n", FeatureEntry, dwFlags, debugstr_w(szURL), pSecMgr);
701
702 if(FeatureEntry == FEATURE_MIME_SNIFFING)
703 urlaction = URLACTION_FEATURE_MIME_SNIFFING;
704 else if(FeatureEntry == FEATURE_WINDOW_RESTRICTIONS)
705 urlaction = URLACTION_FEATURE_WINDOW_RESTRICTIONS;
706 else if(FeatureEntry == FEATURE_ZONE_ELEVATION)
707 urlaction = URLACTION_FEATURE_ZONE_ELEVATION;
708
709 if(!szURL || !urlaction || !pSecMgr)
710 return CoInternetIsFeatureEnabled(FeatureEntry, dwFlags);
711
712 switch(dwFlags) {
713 case GET_FEATURE_FROM_THREAD:
714 case GET_FEATURE_FROM_THREAD_LOCALMACHINE:
715 case GET_FEATURE_FROM_THREAD_INTRANET:
716 case GET_FEATURE_FROM_THREAD_TRUSTED:
717 case GET_FEATURE_FROM_THREAD_INTERNET:
718 case GET_FEATURE_FROM_THREAD_RESTRICTED:
719 FIXME("unsupported flags %x\n", dwFlags);
720 return E_NOTIMPL;
721
722 case GET_FEATURE_FROM_PROCESS:
723 hres = CoInternetIsFeatureEnabled(FeatureEntry, dwFlags);
724 if(hres != S_OK)
725 return hres;
726 /* fall through */
727
728 default: {
729 DWORD policy = URLPOLICY_DISALLOW;
730
731 hres = IInternetSecurityManager_ProcessUrlAction(pSecMgr, szURL, urlaction,
732 (BYTE*)&policy, sizeof(DWORD), NULL, 0, PUAF_NOUI, 0);
733 if(hres!=S_OK || policy!=URLPOLICY_ALLOW)
734 return S_OK;
735 return S_FALSE;
736 }
737 }
738 }
739
740 /***********************************************************************
741 * CoInternetIsFeatureZoneElevationEnabled (URLMON.@)
742 */
743 HRESULT WINAPI CoInternetIsFeatureZoneElevationEnabled(LPCWSTR szFromURL, LPCWSTR szToURL,
744 IInternetSecurityManager *pSecMgr, DWORD dwFlags)
745 {
746 HRESULT hres;
747
748 TRACE("(%s %s %p %x)\n", debugstr_w(szFromURL), debugstr_w(szToURL), pSecMgr, dwFlags);
749
750 if(!pSecMgr || !szToURL)
751 return CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION, dwFlags);
752
753 switch(dwFlags) {
754 case GET_FEATURE_FROM_THREAD:
755 case GET_FEATURE_FROM_THREAD_LOCALMACHINE:
756 case GET_FEATURE_FROM_THREAD_INTRANET:
757 case GET_FEATURE_FROM_THREAD_TRUSTED:
758 case GET_FEATURE_FROM_THREAD_INTERNET:
759 case GET_FEATURE_FROM_THREAD_RESTRICTED:
760 FIXME("unsupported flags %x\n", dwFlags);
761 return E_NOTIMPL;
762
763 case GET_FEATURE_FROM_PROCESS:
764 hres = CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION, dwFlags);
765 if(hres != S_OK)
766 return hres;
767 /* fall through */
768
769 default: {
770 DWORD policy = URLPOLICY_DISALLOW;
771
772 hres = IInternetSecurityManager_ProcessUrlAction(pSecMgr, szToURL,
773 URLACTION_FEATURE_ZONE_ELEVATION, (BYTE*)&policy, sizeof(DWORD),
774 NULL, 0, PUAF_NOUI, 0);
775 if(FAILED(hres))
776 return S_OK;
777
778 switch(policy) {
779 case URLPOLICY_ALLOW:
780 return S_FALSE;
781 case URLPOLICY_QUERY:
782 FIXME("Ask user dialog not implemented\n");
783 default:
784 return S_OK;
785 }
786 }
787 }
788 }