2 * Copyright 2005 Jacek Caban
3 * Copyright 2011 Thomas Mullaly for CodeWeavers
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 #include "urlmon_main.h"
24 #include "wine/debug.h"
26 WINE_DEFAULT_DEBUG_CHANNEL(urlmon
);
28 static const WCHAR feature_control_keyW
[] =
29 L
"Software\\Microsoft\\Internet Explorer\\Main\\FeatureControl";
31 static CRITICAL_SECTION process_features_cs
;
32 static CRITICAL_SECTION_DEBUG process_features_cs_dbg
=
34 0, 0, &process_features_cs
,
35 { &process_features_cs_dbg
.ProcessLocksList
, &process_features_cs_dbg
.ProcessLocksList
},
36 0, 0, { (DWORD_PTR
)(__FILE__
": process features") }
38 static CRITICAL_SECTION process_features_cs
= { &process_features_cs_dbg
, -1, 0, 0, 0, 0 };
40 typedef struct feature_control
{
48 * This array is indexed using INTERNETFEATURELIST values, so everything must
49 * appear in the same order as it does in INTERNETFEATURELIST.
51 static feature_control process_feature_controls
[FEATURE_ENTRY_COUNT
] = {
52 {L
"FEATURE_OBJECT_CACHING", TRUE
,TRUE
},
53 {L
"FEATURE_ZONE_ELEVATION", FALSE
,TRUE
},
54 {L
"FEATURE_MIME_HANDLING", FALSE
,TRUE
},
55 {L
"FEATURE_MIME_SNIFFING", FALSE
,TRUE
},
56 {L
"FEATURE_WINDOW_RESTRICTIONS", FALSE
,TRUE
},
57 {L
"FEATURE_WEBOC_POPUPMANAGEMENT", FALSE
,TRUE
},
58 {L
"FEATURE_BEHAVIORS", TRUE
,TRUE
},
59 {L
"FEATURE_DISABLE_MK_PROTOCOL", TRUE
,TRUE
},
60 {L
"FEATURE_LOCALMACHINE_LOCKDOWN", FALSE
,TRUE
},
61 {L
"FEATURE_SECURITYBAND", FALSE
,TRUE
},
62 {L
"FEATURE_RESTRICT_ACTIVEXINSTALL", FALSE
,TRUE
},
63 {L
"FEATURE_VALIDATE_NAVIGATE_URL", FALSE
,TRUE
},
64 {L
"FEATURE_RESTRICT_FILEDOWNLOAD", FALSE
,TRUE
},
65 {L
"FEATURE_ADDON_MANAGEMENT", FALSE
,TRUE
},
66 {L
"FEATURE_PROTOCOL_LOCKDOWN", FALSE
,TRUE
},
67 {L
"FEATURE_HTTP_USERNAME_PASSWORD_DISABLE", FALSE
,TRUE
},
68 {L
"FEATURE_SAFE_BINDTOOBJECT", FALSE
,TRUE
},
69 {L
"FEATURE_UNC_SAVEDFILECHECK", FALSE
,TRUE
},
70 {L
"FEATURE_GET_URL_DOM_FILEPATH_UNENCODED", TRUE
,TRUE
},
71 {L
"FEATURE_TABBED_BROWSING", FALSE
,TRUE
},
72 {L
"FEATURE_SSLUX", FALSE
,TRUE
},
73 {L
"FEATURE_DISABLE_NAVIGATION_SOUNDS", FALSE
,TRUE
},
74 {L
"FEATURE_DISABLE_LEGACY_COMPRESSION", TRUE
,TRUE
},
75 {L
"FEATURE_FORCE_ADDR_AND_STATUS", FALSE
,TRUE
},
76 {L
"FEATURE_XMLHTTP", TRUE
,TRUE
},
77 {L
"FEATURE_DISABLE_TELNET_PROTOCOL", FALSE
,TRUE
},
78 {L
"FEATURE_FEEDS", FALSE
,TRUE
},
79 {L
"FEATURE_BLOCK_INPUT_PROMPTS", FALSE
,TRUE
}
82 static HRESULT
parse_schema(LPCWSTR url
, DWORD flags
, LPWSTR result
, DWORD size
, DWORD
*rsize
)
87 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
92 ptr
= wcschr(url
, ':');
103 memcpy(result
, url
, len
*sizeof(WCHAR
));
109 static HRESULT
parse_canonicalize_url(LPCWSTR url
, DWORD flags
, LPWSTR result
,
110 DWORD size
, DWORD
*rsize
)
112 IInternetProtocolInfo
*protocol_info
;
116 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
118 protocol_info
= get_protocol_info(url
);
121 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_CANONICALIZE
,
122 flags
, result
, size
, rsize
, 0);
123 IInternetProtocolInfo_Release(protocol_info
);
128 hres
= UrlCanonicalizeW(url
, result
, &prsize
, flags
);
135 static HRESULT
parse_security_url(LPCWSTR url
, DWORD flags
, LPWSTR result
, DWORD size
, DWORD
*rsize
)
137 IInternetProtocolInfo
*protocol_info
;
140 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
142 protocol_info
= get_protocol_info(url
);
145 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_SECURITY_URL
,
146 flags
, result
, size
, rsize
, 0);
147 IInternetProtocolInfo_Release(protocol_info
);
154 static HRESULT
parse_encode(LPCWSTR url
, PARSEACTION action
, DWORD flags
, LPWSTR result
, DWORD size
, DWORD
*rsize
)
156 IInternetProtocolInfo
*protocol_info
;
160 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
162 protocol_info
= get_protocol_info(url
);
165 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, action
,
166 flags
, result
, size
, rsize
, 0);
167 IInternetProtocolInfo_Release(protocol_info
);
173 hres
= UrlUnescapeW((LPWSTR
)url
, result
, &prsize
, flags
);
181 static HRESULT
parse_path_from_url(LPCWSTR url
, DWORD flags
, LPWSTR result
, DWORD size
, DWORD
*rsize
)
183 IInternetProtocolInfo
*protocol_info
;
187 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
189 protocol_info
= get_protocol_info(url
);
192 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_PATH_FROM_URL
,
193 flags
, result
, size
, rsize
, 0);
194 IInternetProtocolInfo_Release(protocol_info
);
200 hres
= PathCreateFromUrlW(url
, result
, &prsize
, 0);
207 static HRESULT
parse_security_domain(LPCWSTR url
, DWORD flags
, LPWSTR result
,
208 DWORD size
, DWORD
*rsize
)
210 IInternetProtocolInfo
*protocol_info
;
213 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
215 protocol_info
= get_protocol_info(url
);
218 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_SECURITY_DOMAIN
,
219 flags
, result
, size
, rsize
, 0);
220 IInternetProtocolInfo_Release(protocol_info
);
228 static HRESULT
parse_domain(LPCWSTR url
, DWORD flags
, LPWSTR result
,
229 DWORD size
, DWORD
*rsize
)
231 IInternetProtocolInfo
*protocol_info
;
234 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
236 protocol_info
= get_protocol_info(url
);
239 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_DOMAIN
,
240 flags
, result
, size
, rsize
, 0);
241 IInternetProtocolInfo_Release(protocol_info
);
246 hres
= UrlGetPartW(url
, result
, &size
, URL_PART_HOSTNAME
, flags
);
250 if(hres
== E_POINTER
)
258 static HRESULT
parse_rootdocument(LPCWSTR url
, DWORD flags
, LPWSTR result
,
259 DWORD size
, DWORD
*rsize
)
261 IInternetProtocolInfo
*protocol_info
;
265 TRACE("(%s %08lx %p %ld %p)\n", debugstr_w(url
), flags
, result
, size
, rsize
);
267 protocol_info
= get_protocol_info(url
);
270 hres
= IInternetProtocolInfo_ParseUrl(protocol_info
, url
, PARSE_ROOTDOCUMENT
,
271 flags
, result
, size
, rsize
, 0);
272 IInternetProtocolInfo_Release(protocol_info
);
277 url_info
.cbSize
= sizeof(url_info
);
278 if(FAILED(ParseURLW(url
, &url_info
)))
281 switch(url_info
.nScheme
) {
283 case URL_SCHEME_HTTP
:
284 case URL_SCHEME_HTTPS
:
285 if(url_info
.cchSuffix
<3 || *(url_info
.pszSuffix
)!='/'
286 || *(url_info
.pszSuffix
+1)!='/')
289 if(size
< url_info
.cchProtocol
+3) {
291 hres
= UrlGetPartW(url
, result
, &size
, URL_PART_HOSTNAME
, flags
);
294 *rsize
= size
+url_info
.cchProtocol
+3;
296 if(hres
== E_POINTER
)
302 size
-= url_info
.cchProtocol
+3;
303 hres
= UrlGetPartW(url
, result
+url_info
.cchProtocol
+3,
304 &size
, URL_PART_HOSTNAME
, flags
);
306 if(hres
== E_POINTER
)
313 *rsize
= size
+url_info
.cchProtocol
+3;
315 memcpy(result
, url
, (url_info
.cchProtocol
+3)*sizeof(WCHAR
));
322 /**************************************************************************
323 * CoInternetParseUrl (URLMON.@)
325 HRESULT WINAPI
CoInternetParseUrl(LPCWSTR pwzUrl
, PARSEACTION ParseAction
, DWORD dwFlags
,
326 LPWSTR pszResult
, DWORD cchResult
, DWORD
*pcchResult
, DWORD dwReserved
)
329 WARN("dwReserved = %ld\n", dwReserved
);
331 switch(ParseAction
) {
332 case PARSE_CANONICALIZE
:
333 return parse_canonicalize_url(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
334 case PARSE_SECURITY_URL
:
335 return parse_security_url(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
338 return parse_encode(pwzUrl
, ParseAction
, dwFlags
, pszResult
, cchResult
, pcchResult
);
339 case PARSE_PATH_FROM_URL
:
340 return parse_path_from_url(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
342 return parse_schema(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
343 case PARSE_SECURITY_DOMAIN
:
344 return parse_security_domain(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
346 return parse_domain(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
347 case PARSE_ROOTDOCUMENT
:
348 return parse_rootdocument(pwzUrl
, dwFlags
, pszResult
, cchResult
, pcchResult
);
350 FIXME("not supported action %d\n", ParseAction
);
356 /**************************************************************************
357 * CoInternetCombineUrl (URLMON.@)
359 HRESULT WINAPI
CoInternetCombineUrl(LPCWSTR pwzBaseUrl
, LPCWSTR pwzRelativeUrl
,
360 DWORD dwCombineFlags
, LPWSTR pwzResult
, DWORD cchResult
, DWORD
*pcchResult
,
363 IInternetProtocolInfo
*protocol_info
;
364 DWORD size
= cchResult
;
367 TRACE("(%s,%s,0x%08lx,%p,%ld,%p,%ld)\n", debugstr_w(pwzBaseUrl
),
368 debugstr_w(pwzRelativeUrl
), dwCombineFlags
, pwzResult
, cchResult
, pcchResult
,
371 protocol_info
= get_protocol_info(pwzBaseUrl
);
374 hres
= IInternetProtocolInfo_CombineUrl(protocol_info
, pwzBaseUrl
, pwzRelativeUrl
,
375 dwCombineFlags
, pwzResult
, cchResult
, pcchResult
, dwReserved
);
376 IInternetProtocolInfo_Release(protocol_info
);
382 hres
= UrlCombineW(pwzBaseUrl
, pwzRelativeUrl
, pwzResult
, &size
, dwCombineFlags
);
390 /**************************************************************************
391 * CoInternetCompareUrl (URLMON.@)
393 HRESULT WINAPI
CoInternetCompareUrl(LPCWSTR pwzUrl1
, LPCWSTR pwzUrl2
, DWORD dwCompareFlags
)
395 IInternetProtocolInfo
*protocol_info
;
398 TRACE("(%s,%s,%08lx)\n", debugstr_w(pwzUrl1
), debugstr_w(pwzUrl2
), dwCompareFlags
);
400 protocol_info
= get_protocol_info(pwzUrl1
);
403 hres
= IInternetProtocolInfo_CompareUrl(protocol_info
, pwzUrl1
, pwzUrl2
, dwCompareFlags
);
404 IInternetProtocolInfo_Release(protocol_info
);
409 return UrlCompareW(pwzUrl1
, pwzUrl2
, dwCompareFlags
) ? S_FALSE
: S_OK
;
412 /***********************************************************************
413 * CoInternetQueryInfo (URLMON.@)
415 * Retrieves information relevant to a specified URL
418 HRESULT WINAPI
CoInternetQueryInfo(LPCWSTR pwzUrl
, QUERYOPTION QueryOption
,
419 DWORD dwQueryFlags
, LPVOID pvBuffer
, DWORD cbBuffer
, DWORD
*pcbBuffer
,
422 IInternetProtocolInfo
*protocol_info
;
425 TRACE("(%s, %x, %lx, %p, %lx, %p, %lx)\n", debugstr_w(pwzUrl
),
426 QueryOption
, dwQueryFlags
, pvBuffer
, cbBuffer
, pcbBuffer
, dwReserved
);
428 protocol_info
= get_protocol_info(pwzUrl
);
431 hres
= IInternetProtocolInfo_QueryInfo(protocol_info
, pwzUrl
, QueryOption
, dwQueryFlags
,
432 pvBuffer
, cbBuffer
, pcbBuffer
, dwReserved
);
433 IInternetProtocolInfo_Release(protocol_info
);
435 return SUCCEEDED(hres
) ? hres
: E_FAIL
;
438 switch(QueryOption
) {
439 case QUERY_USES_NETWORK
:
440 if(!pvBuffer
|| cbBuffer
< sizeof(DWORD
))
443 *(DWORD
*)pvBuffer
= 0;
445 *pcbBuffer
= sizeof(DWORD
);
449 FIXME("Not supported option %d\n", QueryOption
);
456 static void set_feature_on_process(INTERNETFEATURELIST feature
, BOOL enable
)
458 EnterCriticalSection(&process_features_cs
);
460 process_feature_controls
[feature
].enabled
= enable
;
461 process_feature_controls
[feature
].check_registry
= FALSE
;
463 LeaveCriticalSection(&process_features_cs
);
466 static HRESULT
set_internet_feature(INTERNETFEATURELIST feature
, DWORD flags
, BOOL enable
)
468 const DWORD supported_flags
= SET_FEATURE_ON_PROCESS
;
470 if(feature
>= FEATURE_ENTRY_COUNT
)
473 if(flags
& ~supported_flags
)
474 FIXME("Unsupported flags: %08lx\n", flags
& ~supported_flags
);
476 if(flags
& SET_FEATURE_ON_PROCESS
)
477 set_feature_on_process(feature
, enable
);
482 static BOOL
get_feature_from_reg(HKEY feature_control
, LPCWSTR feature_name
, LPCWSTR process_name
, BOOL
*enabled
)
484 DWORD type
, value
, size
;
488 res
= RegOpenKeyW(feature_control
, feature_name
, &feature
);
489 if(res
!= ERROR_SUCCESS
)
492 size
= sizeof(DWORD
);
493 res
= RegQueryValueExW(feature
, process_name
, NULL
, &type
, (BYTE
*)&value
, &size
);
494 if(res
!= ERROR_SUCCESS
|| type
!= REG_DWORD
) {
495 size
= sizeof(DWORD
);
496 res
= RegQueryValueExW(feature
, L
"*", NULL
, &type
, (BYTE
*)&value
, &size
);
499 RegCloseKey(feature
);
500 if(res
!= ERROR_SUCCESS
)
503 if(type
!= REG_DWORD
) {
504 WARN("Unexpected registry value type %ld (expected REG_DWORD) for %s\n", type
, debugstr_w(L
"*"));
508 *enabled
= value
== 1;
512 /* Assumes 'process_features_cs' is held. */
513 static HRESULT
load_process_feature(INTERNETFEATURELIST feature
)
516 HKEY feature_control
;
517 WCHAR module_name
[MAX_PATH
];
518 LPCWSTR process_name
, feature_name
;
519 HRESULT hres
= S_FALSE
;
520 BOOL check_hklm
= FALSE
;
523 if (!GetModuleFileNameW(NULL
, module_name
, ARRAY_SIZE(module_name
))) {
524 ERR("Failed to get module file name: %lu\n", GetLastError());
528 process_name
= wcsrchr(module_name
, '\\');
530 ERR("Invalid module file name: %s\n", debugstr_w(module_name
));
534 /* Skip past the '\\' in front of the filename. */
537 feature_name
= process_feature_controls
[feature
].feature_name
;
539 res
= RegOpenKeyW(HKEY_CURRENT_USER
, feature_control_keyW
, &feature_control
);
540 if(res
== ERROR_SUCCESS
) {
541 if(get_feature_from_reg(feature_control
, feature_name
, process_name
, &enabled
)) {
542 hres
= enabled
? S_OK
: S_FALSE
;
543 process_feature_controls
[feature
].enabled
= enabled
;
545 /* We didn't find anything in HKCU, so check HKLM. */
548 RegCloseKey(feature_control
);
552 res
= RegOpenKeyW(HKEY_LOCAL_MACHINE
, feature_control_keyW
, &feature_control
);
553 if(res
== ERROR_SUCCESS
) {
554 if(get_feature_from_reg(feature_control
, feature_name
, process_name
, &enabled
)) {
555 hres
= enabled
? S_OK
: S_FALSE
;
556 process_feature_controls
[feature
].enabled
= enabled
;
558 RegCloseKey(feature_control
);
562 /* Don't bother checking the registry again for this feature. */
563 process_feature_controls
[feature
].check_registry
= FALSE
;
568 static HRESULT
get_feature_from_process(INTERNETFEATURELIST feature
)
572 EnterCriticalSection(&process_features_cs
);
574 /* Try loading the feature from the registry, if it hasn't already
577 if(process_feature_controls
[feature
].check_registry
)
578 hres
= load_process_feature(feature
);
580 hres
= process_feature_controls
[feature
].enabled
? S_OK
: S_FALSE
;
582 LeaveCriticalSection(&process_features_cs
);
587 static HRESULT
get_internet_feature(INTERNETFEATURELIST feature
, DWORD flags
)
591 if(feature
>= FEATURE_ENTRY_COUNT
)
594 if(flags
== GET_FEATURE_FROM_PROCESS
)
595 hres
= get_feature_from_process(feature
);
597 FIXME("Unsupported flags: %08lx\n", flags
);
604 /***********************************************************************
605 * CoInternetSetFeatureEnabled (URLMON.@)
607 HRESULT WINAPI
CoInternetSetFeatureEnabled(INTERNETFEATURELIST FeatureEntry
, DWORD dwFlags
, BOOL fEnable
)
609 TRACE("(%d, %08lx, %x)\n", FeatureEntry
, dwFlags
, fEnable
);
610 return set_internet_feature(FeatureEntry
, dwFlags
, fEnable
);
613 /***********************************************************************
614 * CoInternetIsFeatureEnabled (URLMON.@)
616 HRESULT WINAPI
CoInternetIsFeatureEnabled(INTERNETFEATURELIST FeatureEntry
, DWORD dwFlags
)
618 TRACE("(%d, %08lx)\n", FeatureEntry
, dwFlags
);
619 return get_internet_feature(FeatureEntry
, dwFlags
);
622 /***********************************************************************
623 * CoInternetIsFeatureEnabledForUrl (URLMON.@)
625 HRESULT WINAPI
CoInternetIsFeatureEnabledForUrl(INTERNETFEATURELIST FeatureEntry
, DWORD dwFlags
, LPCWSTR szURL
,
626 IInternetSecurityManager
*pSecMgr
)
631 TRACE("(%d %08lx %s %p)\n", FeatureEntry
, dwFlags
, debugstr_w(szURL
), pSecMgr
);
633 if(FeatureEntry
== FEATURE_MIME_SNIFFING
)
634 urlaction
= URLACTION_FEATURE_MIME_SNIFFING
;
635 else if(FeatureEntry
== FEATURE_WINDOW_RESTRICTIONS
)
636 urlaction
= URLACTION_FEATURE_WINDOW_RESTRICTIONS
;
637 else if(FeatureEntry
== FEATURE_ZONE_ELEVATION
)
638 urlaction
= URLACTION_FEATURE_ZONE_ELEVATION
;
640 if(!szURL
|| !urlaction
|| !pSecMgr
)
641 return CoInternetIsFeatureEnabled(FeatureEntry
, dwFlags
);
644 case GET_FEATURE_FROM_THREAD
:
645 case GET_FEATURE_FROM_THREAD_LOCALMACHINE
:
646 case GET_FEATURE_FROM_THREAD_INTRANET
:
647 case GET_FEATURE_FROM_THREAD_TRUSTED
:
648 case GET_FEATURE_FROM_THREAD_INTERNET
:
649 case GET_FEATURE_FROM_THREAD_RESTRICTED
:
650 FIXME("unsupported flags %lx\n", dwFlags
);
653 case GET_FEATURE_FROM_PROCESS
:
654 hres
= CoInternetIsFeatureEnabled(FeatureEntry
, dwFlags
);
660 DWORD policy
= URLPOLICY_DISALLOW
;
662 hres
= IInternetSecurityManager_ProcessUrlAction(pSecMgr
, szURL
, urlaction
,
663 (BYTE
*)&policy
, sizeof(DWORD
), NULL
, 0, PUAF_NOUI
, 0);
664 if(hres
!=S_OK
|| policy
!=URLPOLICY_ALLOW
)
671 /***********************************************************************
672 * CoInternetIsFeatureZoneElevationEnabled (URLMON.@)
674 HRESULT WINAPI
CoInternetIsFeatureZoneElevationEnabled(LPCWSTR szFromURL
, LPCWSTR szToURL
,
675 IInternetSecurityManager
*pSecMgr
, DWORD dwFlags
)
679 TRACE("(%s %s %p %lx)\n", debugstr_w(szFromURL
), debugstr_w(szToURL
), pSecMgr
, dwFlags
);
681 if(!pSecMgr
|| !szToURL
)
682 return CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION
, dwFlags
);
685 case GET_FEATURE_FROM_THREAD
:
686 case GET_FEATURE_FROM_THREAD_LOCALMACHINE
:
687 case GET_FEATURE_FROM_THREAD_INTRANET
:
688 case GET_FEATURE_FROM_THREAD_TRUSTED
:
689 case GET_FEATURE_FROM_THREAD_INTERNET
:
690 case GET_FEATURE_FROM_THREAD_RESTRICTED
:
691 FIXME("unsupported flags %lx\n", dwFlags
);
694 case GET_FEATURE_FROM_PROCESS
:
695 hres
= CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION
, dwFlags
);
701 DWORD policy
= URLPOLICY_DISALLOW
;
703 hres
= IInternetSecurityManager_ProcessUrlAction(pSecMgr
, szToURL
,
704 URLACTION_FEATURE_ZONE_ELEVATION
, (BYTE
*)&policy
, sizeof(DWORD
),
705 NULL
, 0, PUAF_NOUI
, 0);
710 case URLPOLICY_ALLOW
:
712 case URLPOLICY_QUERY
:
713 FIXME("Ask user dialog not implemented\n");