* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
+#include "config.h"
+#include "wine/port.h"
+#include "wine/debug.h"
+
+#include <stdarg.h>
+#include <stdlib.h>
+
+#ifdef HAVE_CORESERVICES_CORESERVICES_H
+#define GetCurrentThread MacGetCurrentThread
+#define LoadResource MacLoadResource
+#include <CoreServices/CoreServices.h>
+#undef GetCurrentThread
+#undef LoadResource
+#undef DPRINTF
+#endif
+
+#include "windef.h"
+#include "winbase.h"
+#ifndef __MINGW32__
+#define USE_WS_PREFIX
+#endif
+#include "winsock2.h"
+#include "ws2ipdef.h"
+#include "winhttp.h"
+#include "wincrypt.h"
+#include "winreg.h"
+#define COBJMACROS
+#include "ole2.h"
+#include "dispex.h"
+#include "activscp.h"
+
#include "winhttp_private.h"
-#include <wincrypt.h>
-#include <winreg.h>
-#include <dispex.h>
-#include <activscp.h>
+WINE_DEFAULT_DEBUG_CHANNEL(winhttp);
#define DEFAULT_RESOLVE_TIMEOUT 0
#define DEFAULT_CONNECT_TIMEOUT 20000
#define DEFAULT_SEND_TIMEOUT 30000
#define DEFAULT_RECEIVE_TIMEOUT 30000
-static const WCHAR global_funcsW[] = {'g','l','o','b','a','l','_','f','u','n','c','s',0};
-static const WCHAR dns_resolveW[] = {'d','n','s','_','r','e','s','o','l','v','e',0};
-
void set_last_error( DWORD error )
{
/* FIXME */
void send_callback( object_header_t *hdr, DWORD status, LPVOID info, DWORD buflen )
{
- TRACE("%p, 0x%08x, %p, %u\n", hdr, status, info, buflen);
-
- if (hdr->callback && (hdr->notify_mask & status)) hdr->callback( hdr->handle, hdr->context, status, info, buflen );
+ if (hdr->callback && (hdr->notify_mask & status))
+ {
+ TRACE("%p, 0x%08x, %p, %u\n", hdr, status, info, buflen);
+ hdr->callback( hdr->handle, hdr->context, status, info, buflen );
+ TRACE("returning from 0x%08x callback\n", status);
+ }
}
/***********************************************************************
TRACE("%p\n", session);
+ if (session->unload_event) SetEvent( session->unload_event );
+ if (session->cred_handle_initialized) FreeCredentialsHandle( &session->cred_handle );
+
LIST_FOR_EACH_SAFE( item, next, &session->cookie_cache )
{
domain = LIST_ENTRY( item, domain_t, entry );
heap_free( session->proxy_username );
heap_free( session->proxy_password );
heap_free( session );
-#ifdef __REACTOS__
- WSACleanup();
-#endif
}
static BOOL session_query_option( object_header_t *hdr, DWORD option, LPVOID buffer, LPDWORD buflen )
hdr->redirect_policy = policy;
return TRUE;
}
+ case WINHTTP_OPTION_SECURE_PROTOCOLS:
+ {
+ if (buflen != sizeof(session->secure_protocols))
+ {
+ set_last_error( ERROR_INSUFFICIENT_BUFFER );
+ return FALSE;
+ }
+ session->secure_protocols = *(DWORD *)buffer;
+ TRACE("0x%x\n", session->secure_protocols);
+ return TRUE;
+ }
case WINHTTP_OPTION_DISABLE_FEATURE:
set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
return FALSE;
case WINHTTP_OPTION_CONFIGURE_PASSPORT_AUTH:
FIXME("WINHTTP_OPTION_CONFIGURE_PASSPORT_AUTH: 0x%x\n", *(DWORD *)buffer);
return TRUE;
+ case WINHTTP_OPTION_UNLOAD_NOTIFY_EVENT:
+ TRACE("WINHTTP_OPTION_UNLOAD_NOTIFY_EVENT: %p\n", *(HANDLE *)buffer);
+ session->unload_event = *(HANDLE *)buffer;
+ return TRUE;
+ case WINHTTP_OPTION_MAX_CONNS_PER_SERVER:
+ FIXME("WINHTTP_OPTION_MAX_CONNS_PER_SERVER: %d\n", *(DWORD *)buffer);
+ return TRUE;
+ case WINHTTP_OPTION_MAX_CONNS_PER_1_0_SERVER:
+ FIXME("WINHTTP_OPTION_MAX_CONNS_PER_1_0_SERVER: %d\n", *(DWORD *)buffer);
+ return TRUE;
default:
FIXME("unimplemented option %u\n", option);
- set_last_error( ERROR_INVALID_PARAMETER );
+ set_last_error( ERROR_WINHTTP_INVALID_OPTION );
return FALSE;
}
}
session_set_option
};
+#ifdef __REACTOS__
+BOOL netconn_init_winsock();
+#endif /* __REACTOS__ */
/***********************************************************************
* WinHttpOpen (winhttp.@)
*/
session_t *session;
HINTERNET handle = NULL;
#ifdef __REACTOS__
- WSADATA wsaData;
- int error = WSAStartup(MAKEWORD(2, 2), &wsaData);
- if (error) ERR("WSAStartup failed: %d\n", error);
+ if (!netconn_init_winsock()) return NULL;
#endif
TRACE("%s, %u, %s, %s, 0x%08x\n", debugstr_w(agent), access, debugstr_w(proxy), debugstr_w(bypass), flags);
end:
release_object( &session->hdr );
TRACE("returning %p\n", handle);
+ if (handle) set_last_error( ERROR_SUCCESS );
return handle;
}
release_object( &connect->hdr );
release_object( &session->hdr );
TRACE("returning %p\n", hconnect);
+ if (hconnect) set_last_error( ERROR_SUCCESS );
return hconnect;
}
static void request_destroy( object_header_t *hdr )
{
request_t *request = (request_t *)hdr;
- unsigned int i;
+ unsigned int i, j;
TRACE("%p\n", request);
+ if (request->task_thread)
+ {
+ /* Signal to the task proc to quit. It will call
+ this again when it does. */
+ HANDLE thread = request->task_thread;
+ request->task_thread = 0;
+ SetEvent( request->task_cancel );
+ CloseHandle( thread );
+ return;
+ }
release_object( &request->connect->hdr );
destroy_authinfo( request->authinfo );
heap_free( request->headers[i].value );
}
heap_free( request->headers );
- for (i = 0; i < request->num_accept_types; i++) heap_free( request->accept_types[i] );
- heap_free( request->accept_types );
+ for (i = 0; i < TARGET_MAX; i++)
+ {
+ for (j = 0; j < SCHEME_MAX; j++)
+ {
+ heap_free( request->creds[i][j].username );
+ heap_free( request->creds[i][j].password );
+ }
+ }
heap_free( request );
}
{
case WINHTTP_OPTION_SECURITY_FLAGS:
{
- DWORD flags;
+ DWORD flags = 0;
int bits;
if (!buffer || *buflen < sizeof(flags))
flags = 0;
if (hdr->flags & WINHTTP_FLAG_SECURE) flags |= SECURITY_FLAG_SECURE;
- flags |= request->netconn.security_flags;
- bits = netconn_get_cipher_strength( &request->netconn );
- if (bits >= 128)
- flags |= SECURITY_FLAG_STRENGTH_STRONG;
- else if (bits >= 56)
- flags |= SECURITY_FLAG_STRENGTH_MEDIUM;
- else
- flags |= SECURITY_FLAG_STRENGTH_WEAK;
+ flags |= request->security_flags;
+ if (request->netconn)
+ {
+ bits = netconn_get_cipher_strength( request->netconn );
+ if (bits >= 128)
+ flags |= SECURITY_FLAG_STRENGTH_STRONG;
+ else if (bits >= 56)
+ flags |= SECURITY_FLAG_STRENGTH_MEDIUM;
+ else
+ flags |= SECURITY_FLAG_STRENGTH_WEAK;
+ }
*(DWORD *)buffer = flags;
*buflen = sizeof(flags);
return TRUE;
return FALSE;
}
- if (!(cert = netconn_get_certificate( &request->netconn ))) return FALSE;
+ if (!request->netconn || !(cert = netconn_get_certificate( request->netconn ))) return FALSE;
*(CERT_CONTEXT **)buffer = (CERT_CONTEXT *)cert;
*buflen = sizeof(cert);
return TRUE;
set_last_error( ERROR_INSUFFICIENT_BUFFER );
return FALSE;
}
- if (!(cert = netconn_get_certificate( &request->netconn ))) return FALSE;
+ if (!request->netconn || !(cert = netconn_get_certificate( request->netconn ))) return FALSE;
ci->ftExpiry = cert->pCertInfo->NotAfter;
ci->ftStart = cert->pCertInfo->NotBefore;
else
ci->lpszSignatureAlgName = NULL;
ci->lpszEncryptionAlgName = NULL;
- ci->dwKeySize = netconn_get_cipher_strength( &request->netconn );
+ ci->dwKeySize = request->netconn ? netconn_get_cipher_strength( request->netconn ) : 0;
CertFreeCertificateContext( cert );
*buflen = sizeof(*ci);
return FALSE;
}
- *(DWORD *)buffer = netconn_get_cipher_strength( &request->netconn );
+ *(DWORD *)buffer = request->netconn ? netconn_get_cipher_strength( request->netconn ) : 0;
*buflen = sizeof(DWORD);
return TRUE;
}
set_last_error( ERROR_INSUFFICIENT_BUFFER );
return FALSE;
}
- if (!netconn_connected( &request->netconn ))
+ if (!request->netconn)
{
set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_STATE );
return FALSE;
}
- if (getsockname( request->netconn.socket, &local, &len )) return FALSE;
+ if (getsockname( request->netconn->socket, &local, &len )) return FALSE;
if (!convert_sockaddr( &local, &info->LocalAddress )) return FALSE;
if (!convert_sockaddr( remote, &info->RemoteAddress )) return FALSE;
info->cbSize = sizeof(*info);
set_last_error( ERROR_INVALID_PARAMETER );
return FALSE;
}
- request->netconn.security_flags = flags;
+ request->security_flags = flags;
return TRUE;
}
case WINHTTP_OPTION_RESOLVE_TIMEOUT:
if (!(session->proxy_password = buffer_to_str( buffer, buflen ))) return FALSE;
return TRUE;
}
+ case WINHTTP_OPTION_CLIENT_CERT_CONTEXT:
+ if (!(hdr->flags & WINHTTP_FLAG_SECURE))
+ {
+ SetLastError( ERROR_WINHTTP_INCORRECT_HANDLE_STATE );
+ return FALSE;
+ }
+ FIXME("WINHTTP_OPTION_CLIENT_CERT_CONTEXT\n");
+ return TRUE;
default:
FIXME("unimplemented option %u\n", option);
- set_last_error( ERROR_INVALID_PARAMETER );
- return TRUE;
+ set_last_error( ERROR_WINHTTP_INVALID_OPTION );
+ return FALSE;
}
}
static BOOL store_accept_types( request_t *request, const WCHAR **accept_types )
{
+ static const WCHAR attr_accept[] = {'A','c','c','e','p','t',0};
+ static const DWORD flags = WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA;
const WCHAR **types = accept_types;
- DWORD i;
if (!types) return TRUE;
while (*types)
{
- request->num_accept_types++;
- types++;
- }
- if (!request->num_accept_types) return TRUE;
- if (!(request->accept_types = heap_alloc( request->num_accept_types * sizeof(WCHAR *))))
- {
- request->num_accept_types = 0;
- return FALSE;
- }
- types = accept_types;
- for (i = 0; i < request->num_accept_types; i++)
- {
- if (!(request->accept_types[i] = strdupW( *types )))
- {
- for ( ; i > 0; --i) heap_free( request->accept_types[i - 1] );
- heap_free( request->accept_types );
- request->accept_types = NULL;
- request->num_accept_types = 0;
- return FALSE;
- }
+ process_header( request, attr_accept, *types, flags, TRUE );
types++;
}
return TRUE;
request->hdr.context = connect->hdr.context;
request->hdr.redirect_policy = connect->hdr.redirect_policy;
list_init( &request->hdr.children );
+ list_init( &request->task_queue );
addref_object( &connect->hdr );
request->connect = connect;
list_add_head( &connect->hdr.children, &request->hdr.entry );
- if (!netconn_init( &request->netconn )) goto end;
request->resolve_timeout = connect->session->resolve_timeout;
request->connect_timeout = connect->session->connect_timeout;
request->send_timeout = connect->session->send_timeout;
release_object( &request->hdr );
release_object( &connect->hdr );
TRACE("returning %p\n", hrequest);
+ if (hrequest) set_last_error( ERROR_SUCCESS );
return hrequest;
}
}
release_object( hdr );
free_handle( handle );
+ set_last_error( ERROR_SUCCESS );
return TRUE;
}
ret = query_option( hdr, option, buffer, buflen );
release_object( hdr );
+ if (ret) set_last_error( ERROR_SUCCESS );
return ret;
}
{
BOOL ret = TRUE;
- if (!buffer)
+ if (!buffer && buflen)
{
set_last_error( ERROR_INVALID_PARAMETER );
return FALSE;
ret = set_option( hdr, option, buffer, buflen );
release_object( hdr );
+ if (ret) set_last_error( ERROR_SUCCESS );
return ret;
}
return FALSE;
}
-static void printf_addr( const WCHAR *fmt, WCHAR *buf, struct sockaddr_in *addr )
-{
- sprintfW( buf, fmt,
- (unsigned int)(ntohl( addr->sin_addr.s_addr ) >> 24 & 0xff),
- (unsigned int)(ntohl( addr->sin_addr.s_addr ) >> 16 & 0xff),
- (unsigned int)(ntohl( addr->sin_addr.s_addr ) >> 8 & 0xff),
- (unsigned int)(ntohl( addr->sin_addr.s_addr ) & 0xff) );
-}
-
static int reverse_lookup( const struct addrinfo *ai, char *hostname, size_t len )
{
int ret = -1;
return ret;
}
+static BOOL get_system_proxy_autoconfig_url( char *buf, DWORD buflen )
+{
+#if defined(MAC_OS_X_VERSION_10_6) && MAC_OS_X_VERSION_MAX_ALLOWED >= MAC_OS_X_VERSION_10_6
+ CFDictionaryRef settings = CFNetworkCopySystemProxySettings();
+ const void *ref;
+ BOOL ret = FALSE;
+
+ if (!settings) return FALSE;
+
+ if (!(ref = CFDictionaryGetValue( settings, kCFNetworkProxiesProxyAutoConfigURLString )))
+ {
+ CFRelease( settings );
+ return FALSE;
+ }
+ if (CFStringGetCString( ref, buf, buflen, kCFStringEncodingASCII ))
+ {
+ TRACE( "returning %s\n", debugstr_a(buf) );
+ ret = TRUE;
+ }
+ CFRelease( settings );
+ return ret;
+#else
+ static BOOL first = TRUE;
+ if (first)
+ {
+ FIXME( "no support on this platform\n" );
+ first = FALSE;
+ }
+ else
+ TRACE( "no support on this platform\n" );
+ return FALSE;
+#endif
+}
+
+#define INTERNET_MAX_URL_LENGTH 2084
+
/***********************************************************************
* WinHttpDetectAutoProxyConfigUrl (winhttp.@)
*/
BOOL WINAPI WinHttpDetectAutoProxyConfigUrl( DWORD flags, LPWSTR *url )
{
BOOL ret = FALSE;
+ char system_url[INTERNET_MAX_URL_LENGTH + 1];
TRACE("0x%08x, %p\n", flags, url);
set_last_error( ERROR_INVALID_PARAMETER );
return FALSE;
}
+ if (get_system_proxy_autoconfig_url( system_url, sizeof(system_url) ))
+ {
+ WCHAR *urlW;
+
+ if (!(urlW = strdupAW( system_url ))) return FALSE;
+ *url = urlW;
+ set_last_error( ERROR_SUCCESS );
+ return TRUE;
+ }
if (flags & WINHTTP_AUTO_DETECT_TYPE_DHCP)
{
static int fixme_shown;
set_last_error( ERROR_WINHTTP_AUTODETECTION_FAILED );
*url = NULL;
}
+ else set_last_error( ERROR_SUCCESS );
return ret;
}
}
if (!got_from_reg && (envproxy = getenv( "http_proxy" )))
{
- char *colon, *http_proxy;
+ char *colon, *http_proxy = NULL;
- if ((colon = strchr( envproxy, ':' )))
+ if (!(colon = strchr( envproxy, ':' ))) http_proxy = envproxy;
+ else
{
if (*(colon + 1) == '/' && *(colon + 2) == '/')
{
- static const char http[] = "http://";
-
/* It's a scheme, check that it's http */
- if (!strncmp( envproxy, http, strlen( http ) ))
- http_proxy = envproxy + strlen( http );
- else
- {
- WARN("unsupported scheme in $http_proxy: %s\n", envproxy);
- http_proxy = NULL;
- }
+ if (!strncmp( envproxy, "http://", 7 )) http_proxy = envproxy + 7;
+ else WARN("unsupported scheme in $http_proxy: %s\n", envproxy);
}
- else
- http_proxy = envproxy;
+ else http_proxy = envproxy;
}
- else
- http_proxy = envproxy;
- if (http_proxy)
+
+ if (http_proxy && http_proxy[0])
{
WCHAR *http_proxyW;
int len;
info->dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
info->lpszProxy = http_proxyW;
info->lpszProxyBypass = NULL;
- TRACE("http proxy (from environment) = %s\n",
- debugstr_w(info->lpszProxy));
+ TRACE("http proxy (from environment) = %s\n", debugstr_w(info->lpszProxy));
}
}
}
info->lpszProxy = NULL;
info->lpszProxyBypass = NULL;
}
+ set_last_error( ERROR_SUCCESS );
return TRUE;
}
GlobalFree( config->lpszProxyBypass );
config->lpszProxyBypass = NULL;
}
+ else set_last_error( ERROR_SUCCESS );
return ret;
}
-static HRESULT WINAPI dispex_QueryInterface(
- IDispatchEx *iface, REFIID riid, void **ppv )
-{
- *ppv = NULL;
-
- if (IsEqualGUID( riid, &IID_IUnknown ) ||
- IsEqualGUID( riid, &IID_IDispatch ) ||
- IsEqualGUID( riid, &IID_IDispatchEx ))
- *ppv = iface;
- else
- return E_NOINTERFACE;
-
- return S_OK;
-}
-
-static ULONG WINAPI dispex_AddRef(
- IDispatchEx *iface )
-{
- return 2;
-}
-
-static ULONG WINAPI dispex_Release(
- IDispatchEx *iface )
-{
- return 1;
-}
-
-static HRESULT WINAPI dispex_GetTypeInfoCount(
- IDispatchEx *iface, UINT *info )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetTypeInfo(
- IDispatchEx *iface, UINT info, LCID lcid, ITypeInfo **type_info )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetIDsOfNames(
- IDispatchEx *iface, REFIID riid, LPOLESTR *names, UINT count, LCID lcid, DISPID *id )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_Invoke(
- IDispatchEx *iface, DISPID member, REFIID riid, LCID lcid, WORD flags,
- DISPPARAMS *params, VARIANT *result, EXCEPINFO *excep, UINT *err )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_DeleteMemberByName(
- IDispatchEx *iface, BSTR name, DWORD flags )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_DeleteMemberByDispID(
- IDispatchEx *iface, DISPID id )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetMemberProperties(
- IDispatchEx *iface, DISPID id, DWORD flags_fetch, DWORD *flags )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetMemberName(
- IDispatchEx *iface, DISPID id, BSTR *name )
+static BOOL parse_script_result( const char *result, WINHTTP_PROXY_INFO *info )
{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetNextDispID(
- IDispatchEx *iface, DWORD flags, DISPID id, DISPID *next )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI dispex_GetNameSpaceParent(
- IDispatchEx *iface, IUnknown **unk )
-{
- return E_NOTIMPL;
-}
-
-#define DISPID_GLOBAL_DNSRESOLVE 0x1000
-
-static HRESULT WINAPI dispex_GetDispID(
- IDispatchEx *iface, BSTR name, DWORD flags, DISPID *id )
-{
- if (!strcmpW( name, dns_resolveW ))
- {
- *id = DISPID_GLOBAL_DNSRESOLVE;
- return S_OK;
- }
- return DISP_E_UNKNOWNNAME;
-}
-
-static HRESULT dns_resolve( const WCHAR *hostname, VARIANT *result )
-{
-#ifdef HAVE_GETADDRINFO
- static const WCHAR fmtW[] = {'%','u','.','%','u','.','%','u','.','%','u',0};
- WCHAR addr[16];
- struct addrinfo *ai, *elem;
- char *hostnameA;
- int res;
-
- if (hostname[0])
- hostnameA = strdupWA( hostname );
- else
- hostnameA = get_computer_name( ComputerNamePhysicalDnsFullyQualified );
-
- if (!hostnameA) return E_OUTOFMEMORY;
- res = getaddrinfo( hostnameA, NULL, NULL, &ai );
- heap_free( hostnameA );
- if (res) return S_FALSE;
-
- elem = ai;
- while (elem && elem->ai_family != AF_INET) elem = elem->ai_next;
- if (!elem)
- {
- freeaddrinfo( ai );
- return S_FALSE;
- }
- printf_addr( fmtW, addr, (struct sockaddr_in *)elem->ai_addr );
- freeaddrinfo( ai );
- V_VT( result ) = VT_BSTR;
- V_BSTR( result ) = SysAllocString( addr );
- return S_OK;
-#else
- FIXME("getaddrinfo not found at build time\n");
- return S_FALSE;
-#endif
-}
-
-static HRESULT WINAPI dispex_InvokeEx(
- IDispatchEx *iface, DISPID id, LCID lcid, WORD flags, DISPPARAMS *params,
- VARIANT *result, EXCEPINFO *exep, IServiceProvider *caller )
-{
- if (id == DISPID_GLOBAL_DNSRESOLVE)
- {
- if (params->cArgs != 1) return DISP_E_BADPARAMCOUNT;
- if (V_VT(¶ms->rgvarg[0]) != VT_BSTR) return DISP_E_BADVARTYPE;
- return dns_resolve( V_BSTR(¶ms->rgvarg[0]), result );
- }
- return DISP_E_MEMBERNOTFOUND;
-}
-
-static const IDispatchExVtbl dispex_vtbl =
-{
- dispex_QueryInterface,
- dispex_AddRef,
- dispex_Release,
- dispex_GetTypeInfoCount,
- dispex_GetTypeInfo,
- dispex_GetIDsOfNames,
- dispex_Invoke,
- dispex_GetDispID,
- dispex_InvokeEx,
- dispex_DeleteMemberByName,
- dispex_DeleteMemberByDispID,
- dispex_GetMemberProperties,
- dispex_GetMemberName,
- dispex_GetNextDispID,
- dispex_GetNameSpaceParent
-};
-
-static IDispatchEx global_dispex = { &dispex_vtbl };
-
-static HRESULT WINAPI site_QueryInterface(
- IActiveScriptSite *iface, REFIID riid, void **ppv )
-{
- *ppv = NULL;
-
- if (IsEqualGUID( &IID_IUnknown, riid ))
- *ppv = iface;
- else if (IsEqualGUID( &IID_IActiveScriptSite, riid ))
- *ppv = iface;
- else
- return E_NOINTERFACE;
-
- IUnknown_AddRef( (IUnknown *)*ppv );
- return S_OK;
-}
-
-static ULONG WINAPI site_AddRef(
- IActiveScriptSite *iface )
-{
- return 2;
-}
-
-static ULONG WINAPI site_Release(
- IActiveScriptSite *iface )
-{
- return 1;
-}
-
-static HRESULT WINAPI site_GetLCID(
- IActiveScriptSite *iface, LCID *lcid )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_GetItemInfo(
- IActiveScriptSite *iface, LPCOLESTR name, DWORD mask,
- IUnknown **item, ITypeInfo **type_info )
-{
- if (!strcmpW( name, global_funcsW ) && mask == SCRIPTINFO_IUNKNOWN)
- {
- *item = (IUnknown *)&global_dispex;
- return S_OK;
- }
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_GetDocVersionString(
- IActiveScriptSite *iface, BSTR *version )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_OnScriptTerminate(
- IActiveScriptSite *iface, const VARIANT *result, const EXCEPINFO *info )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_OnStateChange(
- IActiveScriptSite *iface, SCRIPTSTATE state )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_OnScriptError(
- IActiveScriptSite *iface, IActiveScriptError *error )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_OnEnterScript(
- IActiveScriptSite *iface )
-{
- return E_NOTIMPL;
-}
-
-static HRESULT WINAPI site_OnLeaveScript(
- IActiveScriptSite *iface )
-{
- return E_NOTIMPL;
-}
-
-static const IActiveScriptSiteVtbl site_vtbl =
-{
- site_QueryInterface,
- site_AddRef,
- site_Release,
- site_GetLCID,
- site_GetItemInfo,
- site_GetDocVersionString,
- site_OnScriptTerminate,
- site_OnStateChange,
- site_OnScriptError,
- site_OnEnterScript,
- site_OnLeaveScript
-};
-
-static IActiveScriptSite script_site = { &site_vtbl };
-
-static BOOL parse_script_result( VARIANT result, WINHTTP_PROXY_INFO *info )
-{
- static const WCHAR proxyW[] = {'P','R','O','X','Y'};
- const WCHAR *p;
+ const char *p;
WCHAR *q;
int len;
info->lpszProxy = NULL;
info->lpszProxyBypass = NULL;
- if (V_VT( &result ) != VT_BSTR) return TRUE;
- TRACE("%s\n", debugstr_w( V_BSTR( &result ) ));
+ TRACE("%s\n", debugstr_a( result ));
- p = V_BSTR( &result );
+ p = result;
while (*p == ' ') p++;
- len = strlenW( p );
- if (len >= 5 && !memicmpW( p, proxyW, sizeof(proxyW)/sizeof(WCHAR) ))
+ len = strlen( p );
+ if (len >= 5 && !strncasecmp( p, "PROXY", sizeof("PROXY") - 1 ))
{
p += 5;
while (*p == ' ') p++;
if (!*p || *p == ';') return TRUE;
- if (!(info->lpszProxy = q = strdupW( p ))) return FALSE;
+ if (!(info->lpszProxy = q = strdupAW( p ))) return FALSE;
info->dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
for (; *q; q++)
{
return TRUE;
}
-static BSTR include_pac_utils( BSTR script )
-{
- static const WCHAR pacjsW[] = {'p','a','c','.','j','s',0};
- HMODULE hmod = GetModuleHandleA( "winhttp.dll" );
- HRSRC rsrc;
- DWORD size;
- const char *data;
- BSTR ret;
- int len;
-
- if (!(rsrc = FindResourceW( hmod, pacjsW, (LPCWSTR)40 ))) return NULL;
- size = SizeofResource( hmod, rsrc );
- data = LoadResource( hmod, rsrc );
-
- len = MultiByteToWideChar( CP_ACP, 0, data, size, NULL, 0 );
- if (!(ret = SysAllocStringLen( NULL, len + SysStringLen( script ) + 1 ))) return NULL;
- MultiByteToWideChar( CP_ACP, 0, data, size, ret, len );
- ret[len] = 0;
- strcatW( ret, script );
- return ret;
-}
-
-#ifdef _WIN64
-#define IActiveScriptParse_Release IActiveScriptParse64_Release
-#define IActiveScriptParse_InitNew IActiveScriptParse64_InitNew
-#define IActiveScriptParse_ParseScriptText IActiveScriptParse64_ParseScriptText
-#else
-#define IActiveScriptParse_Release IActiveScriptParse32_Release
-#define IActiveScriptParse_InitNew IActiveScriptParse32_InitNew
-#define IActiveScriptParse_ParseScriptText IActiveScriptParse32_ParseScriptText
-#endif
-
-static BOOL run_script( const BSTR script, const WCHAR *url, WINHTTP_PROXY_INFO *info )
-{
- static const WCHAR jscriptW[] = {'J','S','c','r','i','p','t',0};
- static const WCHAR findproxyW[] = {'F','i','n','d','P','r','o','x','y','F','o','r','U','R','L',0};
- IActiveScriptParse *parser = NULL;
- IActiveScript *engine = NULL;
- IDispatch *dispatch = NULL;
- BOOL ret = FALSE;
- CLSID clsid;
- DISPID dispid;
- BSTR func = NULL, hostname = NULL, full_script = NULL;
- URL_COMPONENTSW uc;
- VARIANT args[2], result;
- DISPPARAMS params;
- HRESULT hr, init;
-
- memset( &uc, 0, sizeof(uc) );
- uc.dwStructSize = sizeof(uc);
- if (!WinHttpCrackUrl( url, 0, 0, &uc )) return FALSE;
- if (!(hostname = SysAllocStringLen( NULL, uc.dwHostNameLength + 1 ))) return FALSE;
- memcpy( hostname, uc.lpszHostName, uc.dwHostNameLength * sizeof(WCHAR) );
- hostname[uc.dwHostNameLength] = 0;
-
- init = CoInitialize( NULL );
- hr = CLSIDFromProgID( jscriptW, &clsid );
- if (hr != S_OK) goto done;
-
- hr = CoCreateInstance( &clsid, NULL, CLSCTX_INPROC_SERVER|CLSCTX_INPROC_HANDLER,
- &IID_IActiveScript, (void **)&engine );
- if (hr != S_OK) goto done;
-
- hr = IActiveScript_QueryInterface( engine, &IID_IActiveScriptParse, (void **)&parser );
- if (hr != S_OK) goto done;
-
- hr = IActiveScriptParse_InitNew( parser );
- if (hr != S_OK) goto done;
-
- hr = IActiveScript_SetScriptSite( engine, &script_site );
- if (hr != S_OK) goto done;
-
- hr = IActiveScript_AddNamedItem( engine, global_funcsW, SCRIPTITEM_GLOBALMEMBERS );
- if (hr != S_OK) goto done;
-
- if (!(full_script = include_pac_utils( script ))) goto done;
-
- hr = IActiveScriptParse_ParseScriptText( parser, full_script, NULL, NULL, NULL, 0, 0, 0, NULL, NULL );
- if (hr != S_OK) goto done;
-
- hr = IActiveScript_SetScriptState( engine, SCRIPTSTATE_STARTED );
- if (hr != S_OK) goto done;
-
- hr = IActiveScript_GetScriptDispatch( engine, NULL, &dispatch );
- if (hr != S_OK) goto done;
-
- if (!(func = SysAllocString( findproxyW ))) goto done;
- hr = IDispatch_GetIDsOfNames( dispatch, &IID_NULL, &func, 1, LOCALE_SYSTEM_DEFAULT, &dispid );
- if (hr != S_OK) goto done;
-
- V_VT( &args[0] ) = VT_BSTR;
- V_BSTR( &args[0] ) = hostname;
- V_VT( &args[1] ) = VT_BSTR;
- V_BSTR( &args[1] ) = SysAllocString( url );
-
- params.rgvarg = args;
- params.rgdispidNamedArgs = NULL;
- params.cArgs = 2;
- params.cNamedArgs = 0;
- hr = IDispatch_Invoke( dispatch, dispid, &IID_NULL, LOCALE_SYSTEM_DEFAULT, DISPATCH_METHOD,
- ¶ms, &result, NULL, NULL );
- VariantClear( &args[1] );
- if (hr != S_OK)
- {
- WARN("script failed 0x%08x\n", hr);
- goto done;
- }
- ret = parse_script_result( result, info );
-
-done:
- SysFreeString( full_script );
- SysFreeString( hostname );
- SysFreeString( func );
- if (dispatch) IDispatch_Release( dispatch );
- if (parser) IActiveScriptParse_Release( parser );
- if (engine) IActiveScript_Release( engine );
- if (SUCCEEDED( init )) CoUninitialize();
- if (!ret) set_last_error( ERROR_WINHTTP_BAD_AUTO_PROXY_SCRIPT );
- return ret;
-}
-
-static BSTR download_script( const WCHAR *url )
+static char *download_script( const WCHAR *url, DWORD *out_size )
{
static const WCHAR typeW[] = {'*','/','*',0};
static const WCHAR *acceptW[] = {typeW, NULL};
URL_COMPONENTSW uc;
DWORD status, size = sizeof(status), offset, to_read, bytes_read, flags = 0;
char *tmp, *buffer = NULL;
- BSTR script = NULL;
- int len;
+
+ *out_size = 0;
memset( &uc, 0, sizeof(uc) );
uc.dwStructSize = sizeof(uc);
+ uc.dwHostNameLength = -1;
+ uc.dwUrlPathLength = -1;
if (!WinHttpCrackUrl( url, 0, 0, &uc )) return NULL;
if (!(hostname = heap_alloc( (uc.dwHostNameLength + 1) * sizeof(WCHAR) ))) return NULL;
memcpy( hostname, uc.lpszHostName, uc.dwHostNameLength * sizeof(WCHAR) );
if (!bytes_read) break;
to_read -= bytes_read;
offset += bytes_read;
+ *out_size += bytes_read;
if (!to_read)
{
to_read = size;
buffer = tmp;
}
}
- len = MultiByteToWideChar( CP_ACP, 0, buffer, offset, NULL, 0 );
- if (!(script = SysAllocStringLen( NULL, len ))) goto done;
- MultiByteToWideChar( CP_ACP, 0, buffer, offset, script, len );
- script[len] = 0;
done:
WinHttpCloseHandle( req );
WinHttpCloseHandle( con );
WinHttpCloseHandle( ses );
- heap_free( buffer );
heap_free( hostname );
- if (!script) set_last_error( ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT );
- return script;
+ if (!buffer) set_last_error( ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT );
+ return buffer;
+}
+
+struct AUTO_PROXY_SCRIPT_BUFFER
+{
+ DWORD dwStructSize;
+ LPSTR lpszScriptBuffer;
+ DWORD dwScriptBufferSize;
+};
+
+BOOL WINAPI InternetDeInitializeAutoProxyDll(LPSTR, DWORD);
+BOOL WINAPI InternetGetProxyInfo(LPCSTR, DWORD, LPSTR, DWORD, LPSTR *, LPDWORD);
+BOOL WINAPI InternetInitializeAutoProxyDll(DWORD, LPSTR, LPSTR, void *, struct AUTO_PROXY_SCRIPT_BUFFER *);
+
+static BOOL run_script( char *script, DWORD size, const WCHAR *url, WINHTTP_PROXY_INFO *info )
+{
+ BOOL ret;
+ char *result, *urlA;
+ DWORD len_result;
+ struct AUTO_PROXY_SCRIPT_BUFFER buffer;
+ URL_COMPONENTSW uc;
+
+ buffer.dwStructSize = sizeof(buffer);
+ buffer.lpszScriptBuffer = script;
+ buffer.dwScriptBufferSize = size;
+
+ if (!(urlA = strdupWA( url ))) return FALSE;
+ if (!(ret = InternetInitializeAutoProxyDll( 0, NULL, NULL, NULL, &buffer )))
+ {
+ heap_free( urlA );
+ return FALSE;
+ }
+
+ memset( &uc, 0, sizeof(uc) );
+ uc.dwStructSize = sizeof(uc);
+ uc.dwHostNameLength = -1;
+
+ if (WinHttpCrackUrl( url, 0, 0, &uc ))
+ {
+ char *hostnameA = strdupWA_sized( uc.lpszHostName, uc.dwHostNameLength );
+
+ if ((ret = InternetGetProxyInfo( urlA, strlen(urlA),
+ hostnameA, strlen(hostnameA), &result, &len_result )))
+ {
+ ret = parse_script_result( result, info );
+ heap_free( result );
+ }
+
+ heap_free( hostnameA );
+ }
+ heap_free( urlA );
+ return InternetDeInitializeAutoProxyDll( NULL, 0 );
}
/***********************************************************************
WCHAR *detected_pac_url = NULL;
const WCHAR *pac_url;
session_t *session;
- BSTR script;
+ char *script;
+ DWORD size;
BOOL ret = FALSE;
TRACE("%p, %s, %p, %p\n", hsession, debugstr_w(url), options, info);
if (options->dwFlags & WINHTTP_AUTOPROXY_CONFIG_URL) pac_url = options->lpszAutoConfigUrl;
else pac_url = detected_pac_url;
- if (!(script = download_script( pac_url ))) goto done;
- ret = run_script( script, url, info );
- SysFreeString( script );
+ if ((script = download_script( pac_url, &size )))
+ {
+ ret = run_script( script, size, url, info );
+ heap_free( script );
+ }
done:
GlobalFree( detected_pac_url );
release_object( &session->hdr );
+ if (ret) set_last_error( ERROR_SUCCESS );
return ret;
}
}
RegCloseKey( key );
}
+ if (ret) set_last_error( ERROR_SUCCESS );
return ret;
}
hdr->notify_mask = flags;
release_object( hdr );
+ set_last_error( ERROR_SUCCESS );
return ret;
}
if (receive < 0) receive = 0;
request->recv_timeout = receive;
- if (netconn_connected( &request->netconn ))
+ if (request->netconn)
{
- if (netconn_set_timeout( &request->netconn, TRUE, send )) ret = FALSE;
- if (netconn_set_timeout( &request->netconn, FALSE, receive )) ret = FALSE;
+ if (netconn_set_timeout( request->netconn, TRUE, send )) ret = FALSE;
+ if (netconn_set_timeout( request->netconn, FALSE, receive )) ret = FALSE;
}
-
- release_object( &request->hdr );
break;
case WINHTTP_HANDLE_TYPE_SESSION:
break;
default:
- release_object( hdr );
set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
- return FALSE;
+ ret = FALSE;
}
+ release_object( hdr );
+ if (ret) set_last_error( ERROR_SUCCESS );
return ret;
}
TRACE("%p, %p\n", time, string);
- if (!time || !string) return FALSE;
+ if (!time || !string)
+ {
+ set_last_error( ERROR_INVALID_PARAMETER );
+ return FALSE;
+ }
sprintfW( string, format,
wkday[time->wDayOfWeek],
time->wMinute,
time->wSecond );
+ set_last_error( ERROR_SUCCESS );
return TRUE;
}
TRACE("%s, %p\n", debugstr_w(string), time);
- if (!string || !time) return FALSE;
+ if (!string || !time)
+ {
+ set_last_error( ERROR_INVALID_PARAMETER );
+ return FALSE;
+ }
/* Windows does this too */
GetSystemTime( time );
* a SYSTEMTIME structure.
*/
+ set_last_error( ERROR_SUCCESS );
+
while (*s && !isalphaW( *s )) s++;
if (s[0] == '\0' || s[1] == '\0' || s[2] == '\0') return TRUE;
time->wDayOfWeek = 7;