xref: /reactos/dll/win32/urlmon/internet.c (revision 682f85ad)
1 /*
2  * Copyright 2005 Jacek Caban
3  * Copyright 2011 Thomas Mullaly for CodeWeavers
4  *
5  * This library is free software; you can redistribute it and/or
6  * modify it under the terms of the GNU Lesser General Public
7  * License as published by the Free Software Foundation; either
8  * version 2.1 of the License, or (at your option) any later version.
9  *
10  * This library is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  * Lesser General Public License for more details.
14  *
15  * You should have received a copy of the GNU Lesser General Public
16  * License along with this library; if not, write to the Free Software
17  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18  */
19 
20 #include "urlmon_main.h"
21 #include "winreg.h"
22 #include "shlwapi.h"
23 
24 #include "wine/debug.h"
25 
26 WINE_DEFAULT_DEBUG_CHANNEL(urlmon);
27 
28 static const WCHAR feature_control_keyW[] =
29     {'S','o','f','t','w','a','r','e','\\',
30      'M','i','c','r','o','s','o','f','t','\\',
31      'I','n','t','e','r','n','e','t',' ','E','x','p','l','o','r','e','r','\\',
32      'M','a','i','n','\\',
33      'F','e','a','t','u','r','e','C','o','n','t','r','o','l',0};
34 
35 static const WCHAR feature_object_cachingW[] =
36     {'F','E','A','T','U','R','E','_','O','B','J','E','C','T','_','C','A','C','H','I','N','G',0};
37 static const WCHAR feature_zone_elevationW[] =
38     {'F','E','A','T','U','R','E','_','Z','O','N','E','_','E','L','E','V','A','T','I','O','N',0};
39 static const WCHAR feature_mime_handlingW[] =
40     {'F','E','A','T','U','R','E','_','M','I','M','E','_','H','A','N','D','L','I','N','G',0};
41 static const WCHAR feature_mime_sniffingW[] =
42     {'F','E','A','T','U','R','E','_','M','I','M','E','_','S','N','I','F','F','I','N','G',0};
43 static const WCHAR feature_window_restrictionsW[] =
44     {'F','E','A','T','U','R','E','_','W','I','N','D','O','W','_','R','E','S','T','R','I','C','T','I','O','N','S',0};
45 static const WCHAR feature_weboc_popupmanagementW[] =
46     {'F','E','A','T','U','R','E','_','W','E','B','O','C','_','P','O','P','U','P','M','A','N','A','G','E','M','E','N','T',0};
47 static const WCHAR feature_behaviorsW[] =
48     {'F','E','A','T','U','R','E','_','B','E','H','A','V','I','O','R','S',0};
49 static const WCHAR feature_disable_mk_protocolW[] =
50     {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','M','K','_','P','R','O','T','O','C','O','L',0};
51 static const WCHAR feature_localmachine_lockdownW[] =
52     {'F','E','A','T','U','R','E','_','L','O','C','A','L','M','A','C','H','I','N','E','_','L','O','C','K','D','O','W','N',0};
53 static const WCHAR feature_securitybandW[] =
54     {'F','E','A','T','U','R','E','_','S','E','C','U','R','I','T','Y','B','A','N','D',0};
55 static const WCHAR feature_restrict_activexinstallW[] =
56     {'F','E','A','T','U','R','E','_','R','E','S','T','R','I','C','T','_','A','C','T','I','V','E','X','I','N','S','T','A','L','L',0};
57 static const WCHAR feature_validate_navigate_urlW[] =
58     {'F','E','A','T','U','R','E','_','V','A','L','I','D','A','T','E','_','N','A','V','I','G','A','T','E','_','U','R','L',0};
59 static const WCHAR feature_restrict_filedownloadW[] =
60     {'F','E','A','T','U','R','E','_','R','E','S','T','R','I','C','T','_','F','I','L','E','D','O','W','N','L','O','A','D',0};
61 static const WCHAR feature_addon_managementW[] =
62     {'F','E','A','T','U','R','E','_','A','D','D','O','N','_','M','A','N','A','G','E','M','E','N','T',0};
63 static const WCHAR feature_protocol_lockdownW[] =
64     {'F','E','A','T','U','R','E','_','P','R','O','T','O','C','O','L','_','L','O','C','K','D','O','W','N',0};
65 static const WCHAR feature_http_username_password_disableW[] =
66     {'F','E','A','T','U','R','E','_','H','T','T','P','_','U','S','E','R','N','A','M','E','_',
67      'P','A','S','S','W','O','R','D','_','D','I','S','A','B','L','E',0};
68 static const WCHAR feature_safe_bindtoobjectW[] =
69     {'F','E','A','T','U','R','E','_','S','A','F','E','_','B','I','N','D','T','O','O','B','J','E','C','T',0};
70 static const WCHAR feature_unc_savedfilecheckW[] =
71     {'F','E','A','T','U','R','E','_','U','N','C','_','S','A','V','E','D','F','I','L','E','C','H','E','C','K',0};
72 static const WCHAR feature_get_url_dom_filepath_unencodedW[] =
73     {'F','E','A','T','U','R','E','_','G','E','T','_','U','R','L','_','D','O','M','_',
74      'F','I','L','E','P','A','T','H','_','U','N','E','N','C','O','D','E','D',0};
75 static const WCHAR feature_tabbed_browsingW[] =
76     {'F','E','A','T','U','R','E','_','T','A','B','B','E','D','_','B','R','O','W','S','I','N','G',0};
77 static const WCHAR feature_ssluxW[] =
78     {'F','E','A','T','U','R','E','_','S','S','L','U','X',0};
79 static const WCHAR feature_disable_navigation_soundsW[] =
80     {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','N','A','V','I','G','A','T','I','O','N','_',
81      'S','O','U','N','D','S',0};
82 static const WCHAR feature_disable_legacy_compressionW[] =
83     {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','L','E','G','A','C','Y','_',
84      'C','O','M','P','R','E','S','S','I','O','N',0};
85 static const WCHAR feature_force_addr_and_statusW[] =
86     {'F','E','A','T','U','R','E','_','F','O','R','C','E','_','A','D','D','R','_','A','N','D','_',
87      'S','T','A','T','U','S',0};
88 static const WCHAR feature_xmlhttpW[] =
89     {'F','E','A','T','U','R','E','_','X','M','L','H','T','T','P',0};
90 static const WCHAR feature_disable_telnet_protocolW[] =
91     {'F','E','A','T','U','R','E','_','D','I','S','A','B','L','E','_','T','E','L','N','E','T','_',
92      'P','R','O','T','O','C','O','L',0};
93 static const WCHAR feature_feedsW[] =
94     {'F','E','A','T','U','R','E','_','F','E','E','D','S',0};
95 static const WCHAR feature_block_input_promptsW[] =
96     {'F','E','A','T','U','R','E','_','B','L','O','C','K','_','I','N','P','U','T','_','P','R','O','M','P','T','S',0};
97 
98 static CRITICAL_SECTION process_features_cs;
99 static CRITICAL_SECTION_DEBUG process_features_cs_dbg =
100 {
101     0, 0, &process_features_cs,
102     { &process_features_cs_dbg.ProcessLocksList, &process_features_cs_dbg.ProcessLocksList },
103       0, 0, { (DWORD_PTR)(__FILE__ ": process features") }
104 };
105 static CRITICAL_SECTION process_features_cs = { &process_features_cs_dbg, -1, 0, 0, 0, 0 };
106 
107 typedef struct feature_control {
108     LPCWSTR feature_name;
109     BOOL    enabled;
110     BOOL    check_registry;
111 } feature_control;
112 
113 /* IMPORTANT!!!
114  *
115  * This array is indexed using INTERNETFEATURELIST values, so everything must
116  * appear in the same order as it does in INTERNETFEATURELIST.
117  */
118 static feature_control process_feature_controls[FEATURE_ENTRY_COUNT] = {
119     {feature_object_cachingW,                   TRUE ,TRUE},
120     {feature_zone_elevationW,                   FALSE,TRUE},
121     {feature_mime_handlingW,                    FALSE,TRUE},
122     {feature_mime_sniffingW,                    FALSE,TRUE},
123     {feature_window_restrictionsW,              FALSE,TRUE},
124     {feature_weboc_popupmanagementW,            FALSE,TRUE},
125     {feature_behaviorsW,                        TRUE ,TRUE},
126     {feature_disable_mk_protocolW,              TRUE ,TRUE},
127     {feature_localmachine_lockdownW,            FALSE,TRUE},
128     {feature_securitybandW,                     FALSE,TRUE},
129     {feature_restrict_activexinstallW,          FALSE,TRUE},
130     {feature_validate_navigate_urlW,            FALSE,TRUE},
131     {feature_restrict_filedownloadW,            FALSE,TRUE},
132     {feature_addon_managementW,                 FALSE,TRUE},
133     {feature_protocol_lockdownW,                FALSE,TRUE},
134     {feature_http_username_password_disableW,   FALSE,TRUE},
135     {feature_safe_bindtoobjectW,                FALSE,TRUE},
136     {feature_unc_savedfilecheckW,               FALSE,TRUE},
137     {feature_get_url_dom_filepath_unencodedW,   TRUE ,TRUE},
138     {feature_tabbed_browsingW,                  FALSE,TRUE},
139     {feature_ssluxW,                            FALSE,TRUE},
140     {feature_disable_navigation_soundsW,        FALSE,TRUE},
141     {feature_disable_legacy_compressionW,       TRUE ,TRUE},
142     {feature_force_addr_and_statusW,            FALSE,TRUE},
143     {feature_xmlhttpW,                          TRUE ,TRUE},
144     {feature_disable_telnet_protocolW,          FALSE,TRUE},
145     {feature_feedsW,                            FALSE,TRUE},
146     {feature_block_input_promptsW,              FALSE,TRUE}
147 };
148 
149 static HRESULT parse_schema(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
150 {
151     WCHAR *ptr;
152     DWORD len = 0;
153 
154     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
155 
156     if(flags)
157         ERR("wrong flags\n");
158 
159     ptr = wcschr(url, ':');
160     if(ptr)
161         len = ptr-url;
162 
163     if(rsize)
164         *rsize = len;
165 
166     if(len >= size)
167         return E_POINTER;
168 
169     if(len)
170         memcpy(result, url, len*sizeof(WCHAR));
171     result[len] = 0;
172 
173     return S_OK;
174 }
175 
176 static HRESULT parse_canonicalize_url(LPCWSTR url, DWORD flags, LPWSTR result,
177         DWORD size, DWORD *rsize)
178 {
179     IInternetProtocolInfo *protocol_info;
180     DWORD prsize = size;
181     HRESULT hres;
182 
183     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
184 
185     protocol_info = get_protocol_info(url);
186 
187     if(protocol_info) {
188         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_CANONICALIZE,
189                 flags, result, size, rsize, 0);
190         IInternetProtocolInfo_Release(protocol_info);
191         if(SUCCEEDED(hres))
192             return hres;
193     }
194 
195     hres = UrlCanonicalizeW(url, result, &prsize, flags);
196 
197     if(rsize)
198         *rsize = prsize;
199     return hres;
200 }
201 
202 static HRESULT parse_security_url(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
203 {
204     IInternetProtocolInfo *protocol_info;
205     HRESULT hres;
206 
207     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
208 
209     protocol_info = get_protocol_info(url);
210 
211     if(protocol_info) {
212         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_URL,
213                 flags, result, size, rsize, 0);
214         IInternetProtocolInfo_Release(protocol_info);
215         return hres;
216     }
217 
218     return E_FAIL;
219 }
220 
221 static HRESULT parse_encode(LPCWSTR url, PARSEACTION action, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
222 {
223     IInternetProtocolInfo *protocol_info;
224     DWORD prsize;
225     HRESULT hres;
226 
227     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
228 
229     protocol_info = get_protocol_info(url);
230 
231     if(protocol_info) {
232         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, action,
233                 flags, result, size, rsize, 0);
234         IInternetProtocolInfo_Release(protocol_info);
235         if(SUCCEEDED(hres))
236             return hres;
237     }
238 
239     prsize = size;
240     hres = UrlUnescapeW((LPWSTR)url, result, &prsize, flags);
241 
242     if(rsize)
243         *rsize = prsize;
244 
245     return hres;
246 }
247 
248 static HRESULT parse_path_from_url(LPCWSTR url, DWORD flags, LPWSTR result, DWORD size, DWORD *rsize)
249 {
250     IInternetProtocolInfo *protocol_info;
251     DWORD prsize;
252     HRESULT hres;
253 
254     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
255 
256     protocol_info = get_protocol_info(url);
257 
258     if(protocol_info) {
259         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_PATH_FROM_URL,
260                 flags, result, size, rsize, 0);
261         IInternetProtocolInfo_Release(protocol_info);
262         if(SUCCEEDED(hres))
263             return hres;
264     }
265 
266     prsize = size;
267     hres = PathCreateFromUrlW(url, result, &prsize, 0);
268 
269     if(rsize)
270         *rsize = prsize;
271     return hres;
272 }
273 
274 static HRESULT parse_security_domain(LPCWSTR url, DWORD flags, LPWSTR result,
275         DWORD size, DWORD *rsize)
276 {
277     IInternetProtocolInfo *protocol_info;
278     HRESULT hres;
279 
280     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
281 
282     protocol_info = get_protocol_info(url);
283 
284     if(protocol_info) {
285         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_SECURITY_DOMAIN,
286                 flags, result, size, rsize, 0);
287         IInternetProtocolInfo_Release(protocol_info);
288         if(SUCCEEDED(hres))
289             return hres;
290     }
291 
292     return E_FAIL;
293 }
294 
295 static HRESULT parse_domain(LPCWSTR url, DWORD flags, LPWSTR result,
296         DWORD size, DWORD *rsize)
297 {
298     IInternetProtocolInfo *protocol_info;
299     HRESULT hres;
300 
301     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
302 
303     protocol_info = get_protocol_info(url);
304 
305     if(protocol_info) {
306         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_DOMAIN,
307                 flags, result, size, rsize, 0);
308         IInternetProtocolInfo_Release(protocol_info);
309         if(SUCCEEDED(hres))
310             return hres;
311     }
312 
313     hres = UrlGetPartW(url, result, &size, URL_PART_HOSTNAME, flags);
314     if(rsize)
315         *rsize = size;
316 
317     if(hres == E_POINTER)
318         return S_FALSE;
319 
320     if(FAILED(hres))
321         return E_FAIL;
322     return S_OK;
323 }
324 
325 static HRESULT parse_rootdocument(LPCWSTR url, DWORD flags, LPWSTR result,
326         DWORD size, DWORD *rsize)
327 {
328     IInternetProtocolInfo *protocol_info;
329     PARSEDURLW url_info;
330     HRESULT hres;
331 
332     TRACE("(%s %08x %p %d %p)\n", debugstr_w(url), flags, result, size, rsize);
333 
334     protocol_info = get_protocol_info(url);
335 
336     if(protocol_info) {
337         hres = IInternetProtocolInfo_ParseUrl(protocol_info, url, PARSE_ROOTDOCUMENT,
338                 flags, result, size, rsize, 0);
339         IInternetProtocolInfo_Release(protocol_info);
340         if(SUCCEEDED(hres))
341             return hres;
342     }
343 
344     url_info.cbSize = sizeof(url_info);
345     if(FAILED(ParseURLW(url, &url_info)))
346         return E_FAIL;
347 
348     switch(url_info.nScheme) {
349         case URL_SCHEME_FTP:
350         case URL_SCHEME_HTTP:
351         case URL_SCHEME_HTTPS:
352             if(url_info.cchSuffix<3 || *(url_info.pszSuffix)!='/'
353                     || *(url_info.pszSuffix+1)!='/')
354                 return E_FAIL;
355 
356             if(size < url_info.cchProtocol+3) {
357                 size = 0;
358                 hres = UrlGetPartW(url, result, &size, URL_PART_HOSTNAME, flags);
359 
360                 if(rsize)
361                     *rsize = size+url_info.cchProtocol+3;
362 
363                 if(hres == E_POINTER)
364                     return S_FALSE;
365 
366                 return hres;
367             }
368 
369             size -= url_info.cchProtocol+3;
370             hres = UrlGetPartW(url, result+url_info.cchProtocol+3,
371                     &size, URL_PART_HOSTNAME, flags);
372 
373             if(hres == E_POINTER)
374                 return S_FALSE;
375 
376             if(FAILED(hres))
377                 return E_FAIL;
378 
379             if(rsize)
380                 *rsize = size+url_info.cchProtocol+3;
381 
382             memcpy(result, url, (url_info.cchProtocol+3)*sizeof(WCHAR));
383             return hres;
384         default:
385             return E_FAIL;
386     }
387 }
388 
389 /**************************************************************************
390  *          CoInternetParseUrl    (URLMON.@)
391  */
392 HRESULT WINAPI CoInternetParseUrl(LPCWSTR pwzUrl, PARSEACTION ParseAction, DWORD dwFlags,
393         LPWSTR pszResult, DWORD cchResult, DWORD *pcchResult, DWORD dwReserved)
394 {
395     if(dwReserved)
396         WARN("dwReserved = %d\n", dwReserved);
397 
398     switch(ParseAction) {
399     case PARSE_CANONICALIZE:
400         return parse_canonicalize_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
401     case PARSE_SECURITY_URL:
402         return parse_security_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
403     case PARSE_ENCODE:
404     case PARSE_UNESCAPE:
405         return parse_encode(pwzUrl, ParseAction, dwFlags, pszResult, cchResult, pcchResult);
406     case PARSE_PATH_FROM_URL:
407         return parse_path_from_url(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
408     case PARSE_SCHEMA:
409         return parse_schema(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
410     case PARSE_SECURITY_DOMAIN:
411         return parse_security_domain(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
412     case PARSE_DOMAIN:
413         return parse_domain(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
414     case PARSE_ROOTDOCUMENT:
415         return parse_rootdocument(pwzUrl, dwFlags, pszResult, cchResult, pcchResult);
416     default:
417         FIXME("not supported action %d\n", ParseAction);
418     }
419 
420     return E_NOTIMPL;
421 }
422 
423 /**************************************************************************
424  *          CoInternetCombineUrl    (URLMON.@)
425  */
426 HRESULT WINAPI CoInternetCombineUrl(LPCWSTR pwzBaseUrl, LPCWSTR pwzRelativeUrl,
427         DWORD dwCombineFlags, LPWSTR pwzResult, DWORD cchResult, DWORD *pcchResult,
428         DWORD dwReserved)
429 {
430     IInternetProtocolInfo *protocol_info;
431     DWORD size = cchResult;
432     HRESULT hres;
433 
434     TRACE("(%s,%s,0x%08x,%p,%d,%p,%d)\n", debugstr_w(pwzBaseUrl),
435           debugstr_w(pwzRelativeUrl), dwCombineFlags, pwzResult, cchResult, pcchResult,
436           dwReserved);
437 
438     protocol_info = get_protocol_info(pwzBaseUrl);
439 
440     if(protocol_info) {
441         hres = IInternetProtocolInfo_CombineUrl(protocol_info, pwzBaseUrl, pwzRelativeUrl,
442                 dwCombineFlags, pwzResult, cchResult, pcchResult, dwReserved);
443         IInternetProtocolInfo_Release(protocol_info);
444         if(SUCCEEDED(hres))
445             return hres;
446     }
447 
448 
449     hres = UrlCombineW(pwzBaseUrl, pwzRelativeUrl, pwzResult, &size, dwCombineFlags);
450 
451     if(pcchResult)
452         *pcchResult = size;
453 
454     return hres;
455 }
456 
457 /**************************************************************************
458  *          CoInternetCompareUrl    (URLMON.@)
459  */
460 HRESULT WINAPI CoInternetCompareUrl(LPCWSTR pwzUrl1, LPCWSTR pwzUrl2, DWORD dwCompareFlags)
461 {
462     IInternetProtocolInfo *protocol_info;
463     HRESULT hres;
464 
465     TRACE("(%s,%s,%08x)\n", debugstr_w(pwzUrl1), debugstr_w(pwzUrl2), dwCompareFlags);
466 
467     protocol_info = get_protocol_info(pwzUrl1);
468 
469     if(protocol_info) {
470         hres = IInternetProtocolInfo_CompareUrl(protocol_info, pwzUrl1, pwzUrl2, dwCompareFlags);
471         IInternetProtocolInfo_Release(protocol_info);
472         if(SUCCEEDED(hres))
473             return hres;
474     }
475 
476     return UrlCompareW(pwzUrl1, pwzUrl2, dwCompareFlags) ? S_FALSE : S_OK;
477 }
478 
479 /***********************************************************************
480  *           CoInternetQueryInfo (URLMON.@)
481  *
482  * Retrieves information relevant to a specified URL
483  *
484  */
485 HRESULT WINAPI CoInternetQueryInfo(LPCWSTR pwzUrl, QUERYOPTION QueryOption,
486         DWORD dwQueryFlags, LPVOID pvBuffer, DWORD cbBuffer, DWORD *pcbBuffer,
487         DWORD dwReserved)
488 {
489     IInternetProtocolInfo *protocol_info;
490     HRESULT hres;
491 
492     TRACE("(%s, %x, %x, %p, %x, %p, %x)\n", debugstr_w(pwzUrl),
493           QueryOption, dwQueryFlags, pvBuffer, cbBuffer, pcbBuffer, dwReserved);
494 
495     protocol_info = get_protocol_info(pwzUrl);
496 
497     if(protocol_info) {
498         hres = IInternetProtocolInfo_QueryInfo(protocol_info, pwzUrl, QueryOption, dwQueryFlags,
499                 pvBuffer, cbBuffer, pcbBuffer, dwReserved);
500         IInternetProtocolInfo_Release(protocol_info);
501 
502         return SUCCEEDED(hres) ? hres : E_FAIL;
503     }
504 
505     switch(QueryOption) {
506     case QUERY_USES_NETWORK:
507         if(!pvBuffer || cbBuffer < sizeof(DWORD))
508             return E_FAIL;
509 
510         *(DWORD*)pvBuffer = 0;
511         if(pcbBuffer)
512             *pcbBuffer = sizeof(DWORD);
513         break;
514 
515     default:
516         FIXME("Not supported option %d\n", QueryOption);
517         return E_NOTIMPL;
518     }
519 
520     return S_OK;
521 }
522 
523 static void set_feature_on_process(INTERNETFEATURELIST feature, BOOL enable)
524 {
525     EnterCriticalSection(&process_features_cs);
526 
527     process_feature_controls[feature].enabled = enable;
528     process_feature_controls[feature].check_registry = FALSE;
529 
530     LeaveCriticalSection(&process_features_cs);
531 }
532 
533 static HRESULT set_internet_feature(INTERNETFEATURELIST feature, DWORD flags, BOOL enable)
534 {
535     const DWORD supported_flags = SET_FEATURE_ON_PROCESS;
536 
537     if(feature >= FEATURE_ENTRY_COUNT)
538         return E_FAIL;
539 
540     if(flags & ~supported_flags)
541         FIXME("Unsupported flags: %08x\n", flags & ~supported_flags);
542 
543     if(flags & SET_FEATURE_ON_PROCESS)
544         set_feature_on_process(feature, enable);
545 
546     return S_OK;
547 }
548 
549 static BOOL get_feature_from_reg(HKEY feature_control, LPCWSTR feature_name, LPCWSTR process_name, BOOL *enabled)
550 {
551     DWORD type, value, size;
552     HKEY feature;
553     DWORD res;
554 
555     static const WCHAR wildcardW[] = {'*',0};
556 
557     res = RegOpenKeyW(feature_control, feature_name, &feature);
558     if(res != ERROR_SUCCESS)
559         return FALSE;
560 
561     size = sizeof(DWORD);
562     res = RegQueryValueExW(feature, process_name, NULL, &type, (BYTE*)&value, &size);
563     if(res != ERROR_SUCCESS || type != REG_DWORD) {
564         size = sizeof(DWORD);
565         res = RegQueryValueExW(feature, wildcardW, NULL, &type, (BYTE*)&value, &size);
566     }
567 
568     RegCloseKey(feature);
569     if(res != ERROR_SUCCESS)
570         return FALSE;
571 
572     if(type != REG_DWORD) {
573         WARN("Unexpected registry value type %d (expected REG_DWORD) for %s\n", type, debugstr_w(wildcardW));
574         return FALSE;
575     }
576 
577     *enabled = value == 1;
578     return TRUE;
579 }
580 
581 /* Assumes 'process_features_cs' is held. */
582 static HRESULT load_process_feature(INTERNETFEATURELIST feature)
583 {
584     DWORD res;
585     HKEY feature_control;
586     WCHAR module_name[MAX_PATH];
587     LPCWSTR process_name, feature_name;
588     HRESULT hres = S_FALSE;
589     BOOL check_hklm = FALSE;
590     BOOL enabled;
591 
592     if (!GetModuleFileNameW(NULL, module_name, ARRAY_SIZE(module_name))) {
593         ERR("Failed to get module file name: %u\n", GetLastError());
594         return E_UNEXPECTED;
595     }
596 
597     process_name = wcsrchr(module_name, '\\');
598     if(!process_name) {
599         ERR("Invalid module file name: %s\n", debugstr_w(module_name));
600         return E_UNEXPECTED;
601     }
602 
603     /* Skip past the '\\' in front of the filename. */
604     ++process_name;
605 
606     feature_name = process_feature_controls[feature].feature_name;
607 
608     res = RegOpenKeyW(HKEY_CURRENT_USER, feature_control_keyW, &feature_control);
609     if(res == ERROR_SUCCESS) {
610         if(get_feature_from_reg(feature_control, feature_name, process_name, &enabled)) {
611             hres = enabled ? S_OK : S_FALSE;
612             process_feature_controls[feature].enabled = enabled;
613         } else
614             /* We didn't find anything in HKCU, so check HKLM. */
615             check_hklm = TRUE;
616 
617         RegCloseKey(feature_control);
618     }
619 
620     if(check_hklm) {
621         res = RegOpenKeyW(HKEY_LOCAL_MACHINE, feature_control_keyW, &feature_control);
622         if(res == ERROR_SUCCESS) {
623             if(get_feature_from_reg(feature_control, feature_name, process_name, &enabled)) {
624                 hres = enabled ? S_OK : S_FALSE;
625                 process_feature_controls[feature].enabled = enabled;
626             }
627             RegCloseKey(feature_control);
628         }
629     }
630 
631     /* Don't bother checking the registry again for this feature. */
632     process_feature_controls[feature].check_registry = FALSE;
633 
634     return hres;
635 }
636 
637 static HRESULT get_feature_from_process(INTERNETFEATURELIST feature)
638 {
639     HRESULT hres = S_OK;
640 
641     EnterCriticalSection(&process_features_cs);
642 
643     /* Try loading the feature from the registry, if it hasn't already
644      * been done.
645      */
646     if(process_feature_controls[feature].check_registry)
647         hres = load_process_feature(feature);
648     if(SUCCEEDED(hres))
649         hres = process_feature_controls[feature].enabled ? S_OK : S_FALSE;
650 
651     LeaveCriticalSection(&process_features_cs);
652 
653     return hres;
654 }
655 
656 static HRESULT get_internet_feature(INTERNETFEATURELIST feature, DWORD flags)
657 {
658     HRESULT hres;
659 
660     if(feature >= FEATURE_ENTRY_COUNT)
661         return E_FAIL;
662 
663     if(flags == GET_FEATURE_FROM_PROCESS)
664         hres = get_feature_from_process(feature);
665     else {
666         FIXME("Unsupported flags: %08x\n", flags);
667         hres = E_NOTIMPL;
668     }
669 
670     return hres;
671 }
672 
673 /***********************************************************************
674  *             CoInternetSetFeatureEnabled (URLMON.@)
675  */
676 HRESULT WINAPI CoInternetSetFeatureEnabled(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags, BOOL fEnable)
677 {
678     TRACE("(%d, %08x, %x)\n", FeatureEntry, dwFlags, fEnable);
679     return set_internet_feature(FeatureEntry, dwFlags, fEnable);
680 }
681 
682 /***********************************************************************
683  *             CoInternetIsFeatureEnabled (URLMON.@)
684  */
685 HRESULT WINAPI CoInternetIsFeatureEnabled(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags)
686 {
687     TRACE("(%d, %08x)\n", FeatureEntry, dwFlags);
688     return get_internet_feature(FeatureEntry, dwFlags);
689 }
690 
691 /***********************************************************************
692  *             CoInternetIsFeatureEnabledForUrl (URLMON.@)
693  */
694 HRESULT WINAPI CoInternetIsFeatureEnabledForUrl(INTERNETFEATURELIST FeatureEntry, DWORD dwFlags, LPCWSTR szURL,
695         IInternetSecurityManager *pSecMgr)
696 {
697     DWORD urlaction = 0;
698     HRESULT hres;
699 
700     TRACE("(%d %08x %s %p)\n", FeatureEntry, dwFlags, debugstr_w(szURL), pSecMgr);
701 
702     if(FeatureEntry == FEATURE_MIME_SNIFFING)
703         urlaction = URLACTION_FEATURE_MIME_SNIFFING;
704     else if(FeatureEntry == FEATURE_WINDOW_RESTRICTIONS)
705         urlaction = URLACTION_FEATURE_WINDOW_RESTRICTIONS;
706     else if(FeatureEntry == FEATURE_ZONE_ELEVATION)
707         urlaction = URLACTION_FEATURE_ZONE_ELEVATION;
708 
709     if(!szURL || !urlaction || !pSecMgr)
710         return CoInternetIsFeatureEnabled(FeatureEntry, dwFlags);
711 
712     switch(dwFlags) {
713     case GET_FEATURE_FROM_THREAD:
714     case GET_FEATURE_FROM_THREAD_LOCALMACHINE:
715     case GET_FEATURE_FROM_THREAD_INTRANET:
716     case GET_FEATURE_FROM_THREAD_TRUSTED:
717     case GET_FEATURE_FROM_THREAD_INTERNET:
718     case GET_FEATURE_FROM_THREAD_RESTRICTED:
719         FIXME("unsupported flags %x\n", dwFlags);
720         return E_NOTIMPL;
721 
722     case GET_FEATURE_FROM_PROCESS:
723         hres = CoInternetIsFeatureEnabled(FeatureEntry, dwFlags);
724         if(hres != S_OK)
725             return hres;
726         /* fall through */
727 
728     default: {
729         DWORD policy = URLPOLICY_DISALLOW;
730 
731         hres = IInternetSecurityManager_ProcessUrlAction(pSecMgr, szURL, urlaction,
732                 (BYTE*)&policy, sizeof(DWORD), NULL, 0, PUAF_NOUI, 0);
733         if(hres!=S_OK || policy!=URLPOLICY_ALLOW)
734             return S_OK;
735         return S_FALSE;
736     }
737     }
738 }
739 
740 /***********************************************************************
741  *             CoInternetIsFeatureZoneElevationEnabled (URLMON.@)
742  */
743 HRESULT WINAPI CoInternetIsFeatureZoneElevationEnabled(LPCWSTR szFromURL, LPCWSTR szToURL,
744         IInternetSecurityManager *pSecMgr, DWORD dwFlags)
745 {
746     HRESULT hres;
747 
748     TRACE("(%s %s %p %x)\n", debugstr_w(szFromURL), debugstr_w(szToURL), pSecMgr, dwFlags);
749 
750     if(!pSecMgr || !szToURL)
751         return CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION, dwFlags);
752 
753     switch(dwFlags) {
754     case GET_FEATURE_FROM_THREAD:
755     case GET_FEATURE_FROM_THREAD_LOCALMACHINE:
756     case GET_FEATURE_FROM_THREAD_INTRANET:
757     case GET_FEATURE_FROM_THREAD_TRUSTED:
758     case GET_FEATURE_FROM_THREAD_INTERNET:
759     case GET_FEATURE_FROM_THREAD_RESTRICTED:
760         FIXME("unsupported flags %x\n", dwFlags);
761         return E_NOTIMPL;
762 
763     case GET_FEATURE_FROM_PROCESS:
764         hres = CoInternetIsFeatureEnabled(FEATURE_ZONE_ELEVATION, dwFlags);
765         if(hres != S_OK)
766             return hres;
767         /* fall through */
768 
769     default: {
770         DWORD policy = URLPOLICY_DISALLOW;
771 
772         hres = IInternetSecurityManager_ProcessUrlAction(pSecMgr, szToURL,
773                 URLACTION_FEATURE_ZONE_ELEVATION, (BYTE*)&policy, sizeof(DWORD),
774                 NULL, 0, PUAF_NOUI, 0);
775         if(FAILED(hres))
776             return S_OK;
777 
778         switch(policy) {
779         case URLPOLICY_ALLOW:
780             return S_FALSE;
781         case URLPOLICY_QUERY:
782             FIXME("Ask user dialog not implemented\n");
783         default:
784             return S_OK;
785         }
786     }
787     }
788 }
789