2 * Internet Security and Zone Manager
4 * Copyright (c) 2004 Huw D M Davies
5 * Copyright 2004 Jacek Caban
6 * Copyright 2009 Detlef Riekenberg
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
25 #include "urlmon_main.h"
29 #include "wine/debug.h"
31 WINE_DEFAULT_DEBUG_CHANNEL(urlmon
);
33 static const WCHAR currentlevelW
[] = {'C','u','r','r','e','n','t','L','e','v','e','l',0};
34 static const WCHAR descriptionW
[] = {'D','e','s','c','r','i','p','t','i','o','n',0};
35 static const WCHAR displaynameW
[] = {'D','i','s','p','l','a','y','N','a','m','e',0};
36 static const WCHAR fileW
[] = {'f','i','l','e',0};
37 static const WCHAR flagsW
[] = {'F','l','a','g','s',0};
38 static const WCHAR iconW
[] = {'I','c','o','n',0};
39 static const WCHAR minlevelW
[] = {'M','i','n','L','e','v','e','l',0};
40 static const WCHAR recommendedlevelW
[] = {'R','e','c','o','m','m','e','n','d','e','d',
41 'L','e','v','e','l',0};
42 static const WCHAR wszZonesKey
[] = {'S','o','f','t','w','a','r','e','\\',
43 'M','i','c','r','o','s','o','f','t','\\',
44 'W','i','n','d','o','w','s','\\',
45 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
46 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
47 'Z','o','n','e','s','\\',0};
49 /********************************************************************
50 * get_string_from_reg [internal]
52 * helper to get a string from the reg.
55 static void get_string_from_reg(HKEY hcu
, HKEY hklm
, LPCWSTR name
, LPWSTR out
, DWORD maxlen
)
58 DWORD len
= maxlen
* sizeof(WCHAR
);
61 res
= RegQueryValueExW(hcu
, name
, NULL
, &type
, (LPBYTE
) out
, &len
);
64 len
= maxlen
* sizeof(WCHAR
);
66 res
= RegQueryValueExW(hklm
, name
, NULL
, &type
, (LPBYTE
) out
, &len
);
70 TRACE("%s failed: %d\n", debugstr_w(name
), res
);
75 /********************************************************************
76 * get_dword_from_reg [internal]
78 * helper to get a dword from the reg.
81 static void get_dword_from_reg(HKEY hcu
, HKEY hklm
, LPCWSTR name
, LPDWORD out
)
83 DWORD type
= REG_DWORD
;
84 DWORD len
= sizeof(DWORD
);
87 res
= RegQueryValueExW(hcu
, name
, NULL
, &type
, (LPBYTE
) out
, &len
);
92 res
= RegQueryValueExW(hklm
, name
, NULL
, &type
, (LPBYTE
) out
, &len
);
96 TRACE("%s failed: %d\n", debugstr_w(name
), res
);
101 static HRESULT
get_zone_from_reg(LPCWSTR schema
, DWORD
*zone
)
106 static const WCHAR wszZoneMapProtocolKey
[] =
107 {'S','o','f','t','w','a','r','e','\\',
108 'M','i','c','r','o','s','o','f','t','\\',
109 'W','i','n','d','o','w','s','\\',
110 'C','u','r','r','e','n','t','V','e','r','s','i','o','n','\\',
111 'I','n','t','e','r','n','e','t',' ','S','e','t','t','i','n','g','s','\\',
112 'Z','o','n','e','M','a','p','\\',
113 'P','r','o','t','o','c','o','l','D','e','f','a','u','l','t','s',0};
115 res
= RegOpenKeyW(HKEY_CURRENT_USER
, wszZoneMapProtocolKey
, &hkey
);
116 if(res
!= ERROR_SUCCESS
) {
117 ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey
));
121 size
= sizeof(DWORD
);
122 res
= RegQueryValueExW(hkey
, schema
, NULL
, NULL
, (PBYTE
)zone
, &size
);
124 if(res
== ERROR_SUCCESS
)
127 res
= RegOpenKeyW(HKEY_LOCAL_MACHINE
, wszZoneMapProtocolKey
, &hkey
);
128 if(res
!= ERROR_SUCCESS
) {
129 ERR("Could not open key %s\n", debugstr_w(wszZoneMapProtocolKey
));
133 size
= sizeof(DWORD
);
134 res
= RegQueryValueExW(hkey
, schema
, NULL
, NULL
, (PBYTE
)zone
, &size
);
136 if(res
== ERROR_SUCCESS
)
143 static HRESULT
map_url_to_zone(LPCWSTR url
, DWORD
*zone
, LPWSTR
*ret_url
)
150 secur_url
= heap_alloc(INTERNET_MAX_URL_LENGTH
*sizeof(WCHAR
));
153 hres
= CoInternetParseUrl(url
, PARSE_SECURITY_URL
, 0, secur_url
, INTERNET_MAX_URL_LENGTH
, &size
, 0);
155 strcpyW(secur_url
, url
);
157 hres
= CoInternetParseUrl(secur_url
, PARSE_SCHEMA
, 0, schema
, sizeof(schema
)/sizeof(WCHAR
), &size
, 0);
158 if(FAILED(hres
) || !*schema
) {
159 heap_free(secur_url
);
163 /* file protocol is a special case */
164 if(!strcmpW(schema
, fileW
)) {
165 WCHAR path
[MAX_PATH
], root
[20];
168 hres
= CoInternetParseUrl(secur_url
, PARSE_PATH_FROM_URL
, 0, path
,
169 sizeof(path
)/sizeof(WCHAR
), &size
, 0);
171 if(SUCCEEDED(hres
) && (ptr
= strchrW(path
, '\\')) && ptr
-path
< sizeof(root
)/sizeof(WCHAR
)) {
174 memcpy(root
, path
, (ptr
-path
)*sizeof(WCHAR
));
177 type
= GetDriveTypeW(root
);
181 case DRIVE_NO_ROOT_DIR
:
183 case DRIVE_REMOVABLE
:
195 FIXME("unsupported drive type %d\n", type
);
201 WARN("domains are not yet implemented\n");
202 hres
= get_zone_from_reg(schema
, zone
);
205 if(FAILED(hres
) || !ret_url
)
206 heap_free(secur_url
);
208 *ret_url
= secur_url
;
213 static HRESULT
open_zone_key(HKEY parent_key
, DWORD zone
, HKEY
*hkey
)
215 static const WCHAR wszFormat
[] = {'%','s','%','l','d',0};
217 WCHAR key_name
[sizeof(wszZonesKey
)/sizeof(WCHAR
)+8];
220 wsprintfW(key_name
, wszFormat
, wszZonesKey
, zone
);
222 res
= RegOpenKeyW(parent_key
, key_name
, hkey
);
224 if(res
!= ERROR_SUCCESS
) {
225 WARN("RegOpenKey failed\n");
232 static HRESULT
get_action_policy(DWORD zone
, DWORD action
, BYTE
*policy
, DWORD size
, URLZONEREG zone_reg
)
240 case URLACTION_SCRIPT_OVERRIDE_SAFETY
:
241 *(DWORD
*)policy
= URLPOLICY_DISALLOW
;
246 case URLZONEREG_DEFAULT
:
247 case URLZONEREG_HKCU
:
248 parent_key
= HKEY_CURRENT_USER
;
250 case URLZONEREG_HKLM
:
251 parent_key
= HKEY_LOCAL_MACHINE
;
254 WARN("Unknown URLZONEREG: %d\n", zone_reg
);
258 hres
= open_zone_key(parent_key
, zone
, &hkey
);
259 if(SUCCEEDED(hres
)) {
260 WCHAR action_str
[16];
263 static const WCHAR formatW
[] = {'%','X',0};
265 wsprintfW(action_str
, formatW
, action
);
267 res
= RegQueryValueExW(hkey
, action_str
, NULL
, NULL
, policy
, &len
);
268 if(res
== ERROR_MORE_DATA
) {
270 }else if(res
== ERROR_FILE_NOT_FOUND
) {
272 }else if(res
!= ERROR_SUCCESS
) {
273 ERR("RegQueryValue failed: %d\n", res
);
280 if(FAILED(hres
) && zone_reg
== URLZONEREG_DEFAULT
)
281 return get_action_policy(zone
, action
, policy
, size
, URLZONEREG_HKLM
);
286 /***********************************************************************
287 * InternetSecurityManager implementation
291 const IInternetSecurityManagerVtbl
* lpInternetSecurityManagerVtbl
;
295 IInternetSecurityMgrSite
*mgrsite
;
296 IInternetSecurityManager
*custom_manager
;
299 #define SECMGR_THIS(iface) DEFINE_THIS(SecManagerImpl, InternetSecurityManager, iface)
301 static HRESULT WINAPI
SecManagerImpl_QueryInterface(IInternetSecurityManager
* iface
,REFIID riid
,void** ppvObject
)
303 SecManagerImpl
*This
= SECMGR_THIS(iface
);
305 TRACE("(%p)->(%s,%p)\n",This
,debugstr_guid(riid
),ppvObject
);
307 /* Perform a sanity check on the parameters.*/
308 if ( (This
==0) || (ppvObject
==0) )
311 /* Initialize the return parameter */
314 /* Compare the riid with the interface IDs implemented by this object.*/
315 if (IsEqualIID(&IID_IUnknown
, riid
) ||
316 IsEqualIID(&IID_IInternetSecurityManager
, riid
))
319 /* Check that we obtained an interface.*/
321 WARN("not supported interface %s\n", debugstr_guid(riid
));
322 return E_NOINTERFACE
;
325 /* Query Interface always increases the reference count by one when it is successful */
326 IInternetSecurityManager_AddRef(iface
);
331 static ULONG WINAPI
SecManagerImpl_AddRef(IInternetSecurityManager
* iface
)
333 SecManagerImpl
*This
= SECMGR_THIS(iface
);
334 ULONG refCount
= InterlockedIncrement(&This
->ref
);
336 TRACE("(%p) ref=%u\n", This
, refCount
);
341 static ULONG WINAPI
SecManagerImpl_Release(IInternetSecurityManager
* iface
)
343 SecManagerImpl
*This
= SECMGR_THIS(iface
);
344 ULONG refCount
= InterlockedDecrement(&This
->ref
);
346 TRACE("(%p) ref=%u\n", This
, refCount
);
348 /* destroy the object if there's no more reference on it */
351 IInternetSecurityMgrSite_Release(This
->mgrsite
);
352 if(This
->custom_manager
)
353 IInternetSecurityManager_Release(This
->custom_manager
);
357 URLMON_UnlockModule();
363 static HRESULT WINAPI
SecManagerImpl_SetSecuritySite(IInternetSecurityManager
*iface
,
364 IInternetSecurityMgrSite
*pSite
)
366 SecManagerImpl
*This
= SECMGR_THIS(iface
);
368 TRACE("(%p)->(%p)\n", This
, pSite
);
371 IInternetSecurityMgrSite_Release(This
->mgrsite
);
373 if(This
->custom_manager
) {
374 IInternetSecurityManager_Release(This
->custom_manager
);
375 This
->custom_manager
= NULL
;
378 This
->mgrsite
= pSite
;
381 IServiceProvider
*servprov
;
384 IInternetSecurityMgrSite_AddRef(pSite
);
386 hres
= IInternetSecurityMgrSite_QueryInterface(pSite
, &IID_IServiceProvider
,
388 if(SUCCEEDED(hres
)) {
389 IServiceProvider_QueryService(servprov
, &SID_SInternetSecurityManager
,
390 &IID_IInternetSecurityManager
, (void**)&This
->custom_manager
);
391 IServiceProvider_Release(servprov
);
398 static HRESULT WINAPI
SecManagerImpl_GetSecuritySite(IInternetSecurityManager
*iface
,
399 IInternetSecurityMgrSite
**ppSite
)
401 SecManagerImpl
*This
= SECMGR_THIS(iface
);
403 TRACE("(%p)->(%p)\n", This
, ppSite
);
409 IInternetSecurityMgrSite_AddRef(This
->mgrsite
);
411 *ppSite
= This
->mgrsite
;
415 static HRESULT WINAPI
SecManagerImpl_MapUrlToZone(IInternetSecurityManager
*iface
,
416 LPCWSTR pwszUrl
, DWORD
*pdwZone
,
419 SecManagerImpl
*This
= SECMGR_THIS(iface
);
422 TRACE("(%p)->(%s %p %08x)\n", iface
, debugstr_w(pwszUrl
), pdwZone
, dwFlags
);
424 if(This
->custom_manager
) {
425 hres
= IInternetSecurityManager_MapUrlToZone(This
->custom_manager
,
426 pwszUrl
, pdwZone
, dwFlags
);
427 if(hres
!= INET_E_DEFAULT_ACTION
)
437 FIXME("not supported flags: %08x\n", dwFlags
);
439 return map_url_to_zone(pwszUrl
, pdwZone
, NULL
);
442 static HRESULT WINAPI
SecManagerImpl_GetSecurityId(IInternetSecurityManager
*iface
,
443 LPCWSTR pwszUrl
, BYTE
*pbSecurityId
, DWORD
*pcbSecurityId
, DWORD_PTR dwReserved
)
445 SecManagerImpl
*This
= SECMGR_THIS(iface
);
446 LPWSTR url
, ptr
, ptr2
;
450 static const WCHAR wszFile
[] = {'f','i','l','e',':'};
452 TRACE("(%p)->(%s %p %p %08lx)\n", iface
, debugstr_w(pwszUrl
), pbSecurityId
,
453 pcbSecurityId
, dwReserved
);
455 if(This
->custom_manager
) {
456 hres
= IInternetSecurityManager_GetSecurityId(This
->custom_manager
,
457 pwszUrl
, pbSecurityId
, pcbSecurityId
, dwReserved
);
458 if(hres
!= INET_E_DEFAULT_ACTION
)
462 if(!pwszUrl
|| !pbSecurityId
|| !pcbSecurityId
)
466 FIXME("dwReserved is not supported\n");
468 hres
= map_url_to_zone(pwszUrl
, &zone
, &url
);
470 return hres
== 0x80041001 ? E_INVALIDARG
: hres
;
472 /* file protocol is a special case */
473 if(strlenW(url
) >= sizeof(wszFile
)/sizeof(WCHAR
)
474 && !memcmp(url
, wszFile
, sizeof(wszFile
)) && strchrW(url
, '\\')) {
476 static const BYTE secidFile
[] = {'f','i','l','e',':'};
480 if(*pcbSecurityId
< sizeof(secidFile
)+sizeof(zone
))
481 return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER
);
483 memcpy(pbSecurityId
, secidFile
, sizeof(secidFile
));
484 *(DWORD
*)(pbSecurityId
+sizeof(secidFile
)) = zone
;
486 *pcbSecurityId
= sizeof(secidFile
)+sizeof(zone
);
490 ptr
= strchrW(url
, ':');
495 memmove(ptr
, ptr2
, (strlenW(ptr2
)+1)*sizeof(WCHAR
));
497 ptr
= strchrW(ptr
, '/');
501 len
= WideCharToMultiByte(CP_ACP
, 0, url
, -1, NULL
, 0, NULL
, NULL
)-1;
503 if(len
+sizeof(DWORD
) > *pcbSecurityId
) {
505 return HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER
);
508 WideCharToMultiByte(CP_ACP
, 0, url
, -1, (LPSTR
)pbSecurityId
, len
, NULL
, NULL
);
511 *(DWORD
*)(pbSecurityId
+len
) = zone
;
513 *pcbSecurityId
= len
+sizeof(DWORD
);
519 static HRESULT WINAPI
SecManagerImpl_ProcessUrlAction(IInternetSecurityManager
*iface
,
520 LPCWSTR pwszUrl
, DWORD dwAction
,
521 BYTE
*pPolicy
, DWORD cbPolicy
,
522 BYTE
*pContext
, DWORD cbContext
,
523 DWORD dwFlags
, DWORD dwReserved
)
525 SecManagerImpl
*This
= SECMGR_THIS(iface
);
529 TRACE("(%p)->(%s %08x %p %08x %p %08x %08x %08x)\n", iface
, debugstr_w(pwszUrl
), dwAction
,
530 pPolicy
, cbPolicy
, pContext
, cbContext
, dwFlags
, dwReserved
);
532 if(This
->custom_manager
) {
533 hres
= IInternetSecurityManager_ProcessUrlAction(This
->custom_manager
, pwszUrl
, dwAction
,
534 pPolicy
, cbPolicy
, pContext
, cbContext
, dwFlags
, dwReserved
);
535 if(hres
!= INET_E_DEFAULT_ACTION
)
539 if(pContext
|| cbContext
|| dwFlags
|| dwReserved
)
540 FIXME("Unsupported arguments\n");
545 hres
= map_url_to_zone(pwszUrl
, &zone
, NULL
);
549 hres
= get_action_policy(zone
, dwAction
, (BYTE
*)&policy
, sizeof(policy
), URLZONEREG_DEFAULT
);
553 TRACE("policy %x\n", policy
);
555 switch(GetUrlPolicyPermissions(policy
)) {
556 case URLPOLICY_ALLOW
:
557 case URLPOLICY_CHANNEL_SOFTDIST_PRECACHE
:
559 case URLPOLICY_DISALLOW
:
561 case URLPOLICY_QUERY
:
562 FIXME("URLPOLICY_QUERY not implemented\n");
565 FIXME("Not implemented policy %x\n", policy
);
572 static HRESULT WINAPI
SecManagerImpl_QueryCustomPolicy(IInternetSecurityManager
*iface
,
573 LPCWSTR pwszUrl
, REFGUID guidKey
,
574 BYTE
**ppPolicy
, DWORD
*pcbPolicy
,
575 BYTE
*pContext
, DWORD cbContext
,
578 SecManagerImpl
*This
= SECMGR_THIS(iface
);
581 TRACE("(%p)->(%s %s %p %p %p %08x %08x )\n", iface
, debugstr_w(pwszUrl
), debugstr_guid(guidKey
),
582 ppPolicy
, pcbPolicy
, pContext
, cbContext
, dwReserved
);
584 if(This
->custom_manager
) {
585 hres
= IInternetSecurityManager_QueryCustomPolicy(This
->custom_manager
, pwszUrl
, guidKey
,
586 ppPolicy
, pcbPolicy
, pContext
, cbContext
, dwReserved
);
587 if(hres
!= INET_E_DEFAULT_ACTION
)
591 FIXME("Default action is not implemented\n");
595 static HRESULT WINAPI
SecManagerImpl_SetZoneMapping(IInternetSecurityManager
*iface
,
596 DWORD dwZone
, LPCWSTR pwszPattern
, DWORD dwFlags
)
598 SecManagerImpl
*This
= SECMGR_THIS(iface
);
601 TRACE("(%p)->(%08x %s %08x)\n", iface
, dwZone
, debugstr_w(pwszPattern
),dwFlags
);
603 if(This
->custom_manager
) {
604 hres
= IInternetSecurityManager_SetZoneMapping(This
->custom_manager
, dwZone
,
605 pwszPattern
, dwFlags
);
606 if(hres
!= INET_E_DEFAULT_ACTION
)
610 FIXME("Default action is not implemented\n");
614 static HRESULT WINAPI
SecManagerImpl_GetZoneMappings(IInternetSecurityManager
*iface
,
615 DWORD dwZone
, IEnumString
**ppenumString
, DWORD dwFlags
)
617 SecManagerImpl
*This
= SECMGR_THIS(iface
);
620 TRACE("(%p)->(%08x %p %08x)\n", iface
, dwZone
, ppenumString
,dwFlags
);
622 if(This
->custom_manager
) {
623 hres
= IInternetSecurityManager_GetZoneMappings(This
->custom_manager
, dwZone
,
624 ppenumString
, dwFlags
);
625 if(hres
!= INET_E_DEFAULT_ACTION
)
629 FIXME("Default action is not implemented\n");
633 static const IInternetSecurityManagerVtbl VT_SecManagerImpl
=
635 SecManagerImpl_QueryInterface
,
636 SecManagerImpl_AddRef
,
637 SecManagerImpl_Release
,
638 SecManagerImpl_SetSecuritySite
,
639 SecManagerImpl_GetSecuritySite
,
640 SecManagerImpl_MapUrlToZone
,
641 SecManagerImpl_GetSecurityId
,
642 SecManagerImpl_ProcessUrlAction
,
643 SecManagerImpl_QueryCustomPolicy
,
644 SecManagerImpl_SetZoneMapping
,
645 SecManagerImpl_GetZoneMappings
648 HRESULT
SecManagerImpl_Construct(IUnknown
*pUnkOuter
, LPVOID
*ppobj
)
650 SecManagerImpl
*This
;
652 TRACE("(%p,%p)\n",pUnkOuter
,ppobj
);
653 This
= heap_alloc(sizeof(*This
));
655 /* Initialize the virtual function table. */
656 This
->lpInternetSecurityManagerVtbl
= &VT_SecManagerImpl
;
659 This
->mgrsite
= NULL
;
660 This
->custom_manager
= NULL
;
669 /***********************************************************************
670 * InternetZoneManager implementation
674 const IInternetZoneManagerVtbl
* lpVtbl
;
681 /***********************************************************************
682 * build_zonemap_from_reg [internal]
684 * Enumerate the Zones in the Registry and return the Zones in a DWORD-array
685 * The number of the Zones is returned in data[0]
687 static LPDWORD
build_zonemap_from_reg(void)
692 DWORD allocated
= 6; /* space for the zonecount and Zone "0" upto Zone "4" */
698 res
= RegOpenKeyW(HKEY_CURRENT_USER
, wszZonesKey
, &hkey
);
702 data
= heap_alloc(allocated
* sizeof(DWORD
));
708 len
= sizeof(name
) / sizeof(name
[0]);
709 res
= RegEnumKeyExW(hkey
, used
, name
, &len
, NULL
, NULL
, NULL
, NULL
);
713 if (used
== allocated
) {
717 new_data
= heap_realloc_zero(data
, allocated
* sizeof(DWORD
));
723 data
[used
] = atoiW(name
);
733 /* something failed */
739 /********************************************************************
740 * IInternetZoneManager_QueryInterface
742 static HRESULT WINAPI
ZoneMgrImpl_QueryInterface(IInternetZoneManager
* iface
, REFIID riid
, void** ppvObject
)
744 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
746 TRACE("(%p)->(%s,%p)\n", This
, debugstr_guid(riid
), ppvObject
);
748 if(!This
|| !ppvObject
)
751 if(!IsEqualIID(&IID_IUnknown
, riid
) && !IsEqualIID(&IID_IInternetZoneManager
, riid
)) {
752 FIXME("Unknown interface: %s\n", debugstr_guid(riid
));
754 return E_NOINTERFACE
;
758 IInternetZoneManager_AddRef(iface
);
763 /********************************************************************
764 * IInternetZoneManager_AddRef
766 static ULONG WINAPI
ZoneMgrImpl_AddRef(IInternetZoneManager
* iface
)
768 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
769 ULONG refCount
= InterlockedIncrement(&This
->ref
);
771 TRACE("(%p)->(ref before=%u)\n",This
, refCount
- 1);
776 /********************************************************************
777 * IInternetZoneManager_Release
779 static ULONG WINAPI
ZoneMgrImpl_Release(IInternetZoneManager
* iface
)
781 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
782 ULONG refCount
= InterlockedDecrement(&This
->ref
);
784 TRACE("(%p)->(ref before=%u)\n",This
, refCount
+ 1);
787 while (This
->zonemap_count
) heap_free(This
->zonemaps
[--This
->zonemap_count
]);
788 heap_free(This
->zonemaps
);
790 URLMON_UnlockModule();
796 /********************************************************************
797 * IInternetZoneManager_GetZoneAttributes
799 static HRESULT WINAPI
ZoneMgrImpl_GetZoneAttributes(IInternetZoneManager
* iface
,
801 ZONEATTRIBUTES
* pZoneAttributes
)
803 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
808 TRACE("(%p)->(%d %p)\n", This
, dwZone
, pZoneAttributes
);
810 if (!pZoneAttributes
)
813 hr
= open_zone_key(HKEY_CURRENT_USER
, dwZone
, &hcu
);
815 return S_OK
; /* IE6 and older returned E_FAIL here */
817 hr
= open_zone_key(HKEY_LOCAL_MACHINE
, dwZone
, &hklm
);
819 TRACE("Zone %d not in HKLM\n", dwZone
);
821 get_string_from_reg(hcu
, hklm
, displaynameW
, pZoneAttributes
->szDisplayName
, MAX_ZONE_PATH
);
822 get_string_from_reg(hcu
, hklm
, descriptionW
, pZoneAttributes
->szDescription
, MAX_ZONE_DESCRIPTION
);
823 get_string_from_reg(hcu
, hklm
, iconW
, pZoneAttributes
->szIconPath
, MAX_ZONE_PATH
);
824 get_dword_from_reg(hcu
, hklm
, minlevelW
, &pZoneAttributes
->dwTemplateMinLevel
);
825 get_dword_from_reg(hcu
, hklm
, currentlevelW
, &pZoneAttributes
->dwTemplateCurrentLevel
);
826 get_dword_from_reg(hcu
, hklm
, recommendedlevelW
, &pZoneAttributes
->dwTemplateRecommended
);
827 get_dword_from_reg(hcu
, hklm
, flagsW
, &pZoneAttributes
->dwFlags
);
834 /********************************************************************
835 * IInternetZoneManager_SetZoneAttributes
837 static HRESULT WINAPI
ZoneMgrImpl_SetZoneAttributes(IInternetZoneManager
* iface
,
839 ZONEATTRIBUTES
* pZoneAttributes
)
841 FIXME("(%p)->(%08x %p) stub\n", iface
, dwZone
, pZoneAttributes
);
845 /********************************************************************
846 * IInternetZoneManager_GetZoneCustomPolicy
848 static HRESULT WINAPI
ZoneMgrImpl_GetZoneCustomPolicy(IInternetZoneManager
* iface
,
853 URLZONEREG ulrZoneReg
)
855 FIXME("(%p)->(%08x %s %p %p %08x) stub\n", iface
, dwZone
, debugstr_guid(guidKey
),
856 ppPolicy
, pcbPolicy
, ulrZoneReg
);
860 /********************************************************************
861 * IInternetZoneManager_SetZoneCustomPolicy
863 static HRESULT WINAPI
ZoneMgrImpl_SetZoneCustomPolicy(IInternetZoneManager
* iface
,
868 URLZONEREG ulrZoneReg
)
870 FIXME("(%p)->(%08x %s %p %08x %08x) stub\n", iface
, dwZone
, debugstr_guid(guidKey
),
871 ppPolicy
, cbPolicy
, ulrZoneReg
);
875 /********************************************************************
876 * IInternetZoneManager_GetZoneActionPolicy
878 static HRESULT WINAPI
ZoneMgrImpl_GetZoneActionPolicy(IInternetZoneManager
* iface
,
879 DWORD dwZone
, DWORD dwAction
, BYTE
* pPolicy
, DWORD cbPolicy
, URLZONEREG urlZoneReg
)
881 TRACE("(%p)->(%d %08x %p %d %d)\n", iface
, dwZone
, dwAction
, pPolicy
,
882 cbPolicy
, urlZoneReg
);
887 return get_action_policy(dwZone
, dwAction
, pPolicy
, cbPolicy
, urlZoneReg
);
890 /********************************************************************
891 * IInternetZoneManager_SetZoneActionPolicy
893 static HRESULT WINAPI
ZoneMgrImpl_SetZoneActionPolicy(IInternetZoneManager
* iface
,
898 URLZONEREG urlZoneReg
)
900 FIXME("(%p)->(%08x %08x %p %08x %08x) stub\n", iface
, dwZone
, dwAction
, pPolicy
,
901 cbPolicy
, urlZoneReg
);
905 /********************************************************************
906 * IInternetZoneManager_PromptAction
908 static HRESULT WINAPI
ZoneMgrImpl_PromptAction(IInternetZoneManager
* iface
,
915 FIXME("%p %08x %p %s %s %08x\n", iface
, dwAction
, hwndParent
,
916 debugstr_w(pwszUrl
), debugstr_w(pwszText
), dwPromptFlags
);
920 /********************************************************************
921 * IInternetZoneManager_LogAction
923 static HRESULT WINAPI
ZoneMgrImpl_LogAction(IInternetZoneManager
* iface
,
929 FIXME("(%p)->(%08x %s %s %08x) stub\n", iface
, dwAction
, debugstr_w(pwszUrl
),
930 debugstr_w(pwszText
), dwLogFlags
);
934 /********************************************************************
935 * IInternetZoneManager_CreateZoneEnumerator
937 static HRESULT WINAPI
ZoneMgrImpl_CreateZoneEnumerator(IInternetZoneManager
* iface
,
942 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
947 TRACE("(%p)->(%p, %p, 0x%08x)\n", This
, pdwEnum
, pdwCount
, dwFlags
);
948 if (!pdwEnum
|| !pdwCount
|| (dwFlags
!= 0))
951 data
= build_zonemap_from_reg();
952 TRACE("found %d zones\n", data
? data
[0] : -1);
957 for (i
= 0; i
< This
->zonemap_count
; i
++) {
958 if (This
->zonemaps
&& !This
->zonemaps
[i
]) {
959 This
->zonemaps
[i
] = data
;
966 if (This
->zonemaps
) {
967 /* try to double the nr. of pointers in the array */
968 new_maps
= heap_realloc_zero(This
->zonemaps
, This
->zonemap_count
* 2 * sizeof(LPDWORD
));
970 This
->zonemap_count
*= 2;
974 This
->zonemap_count
= 2;
975 new_maps
= heap_alloc_zero(This
->zonemap_count
* sizeof(LPDWORD
));
982 This
->zonemaps
= new_maps
;
983 This
->zonemaps
[i
] = data
;
989 /********************************************************************
990 * IInternetZoneManager_GetZoneAt
992 static HRESULT WINAPI
ZoneMgrImpl_GetZoneAt(IInternetZoneManager
* iface
,
997 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
1000 TRACE("(%p)->(0x%08x, %d, %p)\n", This
, dwEnum
, dwIndex
, pdwZone
);
1002 /* make sure, that dwEnum and dwIndex are in the valid range */
1003 if (dwEnum
< This
->zonemap_count
) {
1004 if ((data
= This
->zonemaps
[dwEnum
])) {
1005 if (dwIndex
< data
[0]) {
1006 *pdwZone
= data
[dwIndex
+ 1];
1011 return E_INVALIDARG
;
1014 /********************************************************************
1015 * IInternetZoneManager_DestroyZoneEnumerator
1017 static HRESULT WINAPI
ZoneMgrImpl_DestroyZoneEnumerator(IInternetZoneManager
* iface
,
1020 ZoneMgrImpl
* This
= (ZoneMgrImpl
*)iface
;
1023 TRACE("(%p)->(0x%08x)\n", This
, dwEnum
);
1024 /* make sure, that dwEnum is valid */
1025 if (dwEnum
< This
->zonemap_count
) {
1026 if ((data
= This
->zonemaps
[dwEnum
])) {
1027 This
->zonemaps
[dwEnum
] = NULL
;
1032 return E_INVALIDARG
;
1035 /********************************************************************
1036 * IInternetZoneManager_CopyTemplatePoliciesToZone
1038 static HRESULT WINAPI
ZoneMgrImpl_CopyTemplatePoliciesToZone(IInternetZoneManager
* iface
,
1043 FIXME("(%p)->(%08x %08x %08x) stub\n", iface
, dwTemplate
, dwZone
, dwReserved
);
1047 /********************************************************************
1048 * IInternetZoneManager_Construct
1050 static const IInternetZoneManagerVtbl ZoneMgrImplVtbl
= {
1051 ZoneMgrImpl_QueryInterface
,
1053 ZoneMgrImpl_Release
,
1054 ZoneMgrImpl_GetZoneAttributes
,
1055 ZoneMgrImpl_SetZoneAttributes
,
1056 ZoneMgrImpl_GetZoneCustomPolicy
,
1057 ZoneMgrImpl_SetZoneCustomPolicy
,
1058 ZoneMgrImpl_GetZoneActionPolicy
,
1059 ZoneMgrImpl_SetZoneActionPolicy
,
1060 ZoneMgrImpl_PromptAction
,
1061 ZoneMgrImpl_LogAction
,
1062 ZoneMgrImpl_CreateZoneEnumerator
,
1063 ZoneMgrImpl_GetZoneAt
,
1064 ZoneMgrImpl_DestroyZoneEnumerator
,
1065 ZoneMgrImpl_CopyTemplatePoliciesToZone
,
1068 HRESULT
ZoneMgrImpl_Construct(IUnknown
*pUnkOuter
, LPVOID
*ppobj
)
1070 ZoneMgrImpl
* ret
= heap_alloc_zero(sizeof(ZoneMgrImpl
));
1072 TRACE("(%p %p)\n", pUnkOuter
, ppobj
);
1073 ret
->lpVtbl
= &ZoneMgrImplVtbl
;
1075 *ppobj
= (IInternetZoneManager
*)ret
;
1077 URLMON_LockModule();
1082 /***********************************************************************
1083 * CoInternetCreateSecurityManager (URLMON.@)
1086 HRESULT WINAPI
CoInternetCreateSecurityManager( IServiceProvider
*pSP
,
1087 IInternetSecurityManager
**ppSM
, DWORD dwReserved
)
1089 TRACE("%p %p %d\n", pSP
, ppSM
, dwReserved
);
1092 FIXME("pSP not supported\n");
1094 return SecManagerImpl_Construct(NULL
, (void**) ppSM
);
1097 /********************************************************************
1098 * CoInternetCreateZoneManager (URLMON.@)
1100 HRESULT WINAPI
CoInternetCreateZoneManager(IServiceProvider
* pSP
, IInternetZoneManager
** ppZM
, DWORD dwReserved
)
1102 TRACE("(%p %p %x)\n", pSP
, ppZM
, dwReserved
);
1103 return ZoneMgrImpl_Construct(NULL
, (void**)ppZM
);