| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include <htiframe.h> | |
| 6 #include <mshtml.h> | |
| 7 #include <algorithm> | |
| 8 | |
| 9 #include "chrome_frame/protocol_sink_wrap.h" | |
| 10 | |
| 11 #include "base/logging.h" | |
| 12 #include "base/memory/singleton.h" | |
| 13 #include "base/strings/string_number_conversions.h" | |
| 14 #include "base/strings/string_util.h" | |
| 15 #include "base/strings/stringprintf.h" | |
| 16 #include "base/strings/utf_string_conversions.h" | |
| 17 #include "base/win/scoped_bstr.h" | |
| 18 #include "chrome_frame/bho.h" | |
| 19 #include "chrome_frame/bind_context_info.h" | |
| 20 #include "chrome_frame/exception_barrier.h" | |
| 21 #include "chrome_frame/function_stub.h" | |
| 22 #include "chrome_frame/policy_settings.h" | |
| 23 #include "chrome_frame/utils.h" | |
| 24 | |
| 25 using std::min; | |
| 26 | |
| 27 // BINDSTATUS_SERVER_MIMETYPEAVAILABLE == 54. Introduced in IE 8, so | |
| 28 // not in everyone's headers yet. See: | |
| 29 // http://msdn.microsoft.com/en-us/library/ms775133(VS.85,loband).aspx | |
| 30 #ifndef BINDSTATUS_SERVER_MIMETYPEAVAILABLE | |
| 31 #define BINDSTATUS_SERVER_MIMETYPEAVAILABLE 54 | |
| 32 #endif | |
| 33 | |
| 34 bool ProtocolSinkWrap::ignore_xua_ = false; | |
| 35 | |
| 36 static const char kTextHtmlMimeType[] = "text/html"; | |
| 37 const wchar_t kUrlMonDllName[] = L"urlmon.dll"; | |
| 38 | |
| 39 static const int kInternetProtocolStartIndex = 3; | |
| 40 static const int kInternetProtocolReadIndex = 9; | |
| 41 static const int kInternetProtocolStartExIndex = 13; | |
| 42 static const int kInternetProtocolLockRequestIndex = 11; | |
| 43 static const int kInternetProtocolUnlockRequestIndex = 12; | |
| 44 static const int kInternetProtocolAbortIndex = 5; | |
| 45 static const int kInternetProtocolTerminateIndex = 6; | |
| 46 | |
| 47 | |
| 48 // IInternetProtocol/Ex patches. | |
| 49 STDMETHODIMP Hook_Start(InternetProtocol_Start_Fn orig_start, | |
| 50 IInternetProtocol* protocol, | |
| 51 LPCWSTR url, | |
| 52 IInternetProtocolSink* prot_sink, | |
| 53 IInternetBindInfo* bind_info, | |
| 54 DWORD flags, | |
| 55 HANDLE_PTR reserved); | |
| 56 | |
| 57 STDMETHODIMP Hook_StartEx(InternetProtocol_StartEx_Fn orig_start_ex, | |
| 58 IInternetProtocolEx* protocol, | |
| 59 IUri* uri, | |
| 60 IInternetProtocolSink* prot_sink, | |
| 61 IInternetBindInfo* bind_info, | |
| 62 DWORD flags, | |
| 63 HANDLE_PTR reserved); | |
| 64 | |
| 65 STDMETHODIMP Hook_Read(InternetProtocol_Read_Fn orig_read, | |
| 66 IInternetProtocol* protocol, | |
| 67 void* buffer, | |
| 68 ULONG size, | |
| 69 ULONG* size_read); | |
| 70 | |
| 71 STDMETHODIMP Hook_LockRequest(InternetProtocol_LockRequest_Fn orig_req, | |
| 72 IInternetProtocol* protocol, | |
| 73 DWORD options); | |
| 74 | |
| 75 STDMETHODIMP Hook_UnlockRequest(InternetProtocol_UnlockRequest_Fn orig_req, | |
| 76 IInternetProtocol* protocol); | |
| 77 | |
| 78 STDMETHODIMP Hook_Abort(InternetProtocol_Abort_Fn orig_req, | |
| 79 IInternetProtocol* protocol, | |
| 80 HRESULT hr, | |
| 81 DWORD options); | |
| 82 | |
| 83 STDMETHODIMP Hook_Terminate(InternetProtocol_Terminate_Fn orig_req, | |
| 84 IInternetProtocol* protocol, | |
| 85 DWORD options); | |
| 86 | |
| 87 ///////////////////////////////////////////////////////////////////////////// | |
| 88 BEGIN_VTABLE_PATCHES(CTransaction) | |
| 89 VTABLE_PATCH_ENTRY(kInternetProtocolStartIndex, Hook_Start) | |
| 90 VTABLE_PATCH_ENTRY(kInternetProtocolReadIndex, Hook_Read) | |
| 91 VTABLE_PATCH_ENTRY(kInternetProtocolLockRequestIndex, Hook_LockRequest) | |
| 92 VTABLE_PATCH_ENTRY(kInternetProtocolUnlockRequestIndex, Hook_UnlockRequest) | |
| 93 VTABLE_PATCH_ENTRY(kInternetProtocolAbortIndex, Hook_Abort) | |
| 94 VTABLE_PATCH_ENTRY(kInternetProtocolTerminateIndex, Hook_Terminate) | |
| 95 END_VTABLE_PATCHES() | |
| 96 | |
| 97 BEGIN_VTABLE_PATCHES(CTransaction2) | |
| 98 VTABLE_PATCH_ENTRY(kInternetProtocolStartExIndex, Hook_StartEx) | |
| 99 END_VTABLE_PATCHES() | |
| 100 | |
| 101 // | |
| 102 // ProtocolSinkWrap implementation | |
| 103 | |
| 104 // Static map initialization | |
| 105 ProtData::ProtocolDataMap ProtData::datamap_; | |
| 106 base::Lock ProtData::datamap_lock_; | |
| 107 | |
| 108 ProtocolSinkWrap::ProtocolSinkWrap() { | |
| 109 DVLOG(1) << __FUNCTION__ << base::StringPrintf(" 0x%08X", this); | |
| 110 } | |
| 111 | |
| 112 ProtocolSinkWrap::~ProtocolSinkWrap() { | |
| 113 DVLOG(1) << __FUNCTION__ << base::StringPrintf(" 0x%08X", this); | |
| 114 } | |
| 115 | |
| 116 base::win::ScopedComPtr<IInternetProtocolSink> ProtocolSinkWrap::CreateNewSink( | |
| 117 IInternetProtocolSink* sink, ProtData* data) { | |
| 118 DCHECK(sink != NULL); | |
| 119 DCHECK(data != NULL); | |
| 120 CComObject<ProtocolSinkWrap>* new_sink = NULL; | |
| 121 CComObject<ProtocolSinkWrap>::CreateInstance(&new_sink); | |
| 122 new_sink->delegate_ = sink; | |
| 123 new_sink->prot_data_ = data; | |
| 124 return base::win::ScopedComPtr<IInternetProtocolSink>(new_sink); | |
| 125 } | |
| 126 | |
| 127 // IInternetProtocolSink methods | |
| 128 STDMETHODIMP ProtocolSinkWrap::Switch(PROTOCOLDATA* protocol_data) { | |
| 129 HRESULT hr = E_FAIL; | |
| 130 if (delegate_) | |
| 131 hr = delegate_->Switch(protocol_data); | |
| 132 return hr; | |
| 133 } | |
| 134 | |
| 135 STDMETHODIMP ProtocolSinkWrap::ReportProgress(ULONG status_code, | |
| 136 LPCWSTR status_text) { | |
| 137 DVLOG(1) << "ProtocolSinkWrap::ReportProgress: " | |
| 138 << BindStatus2Str(status_code) | |
| 139 << " Status: " << (status_text ? status_text : L""); | |
| 140 | |
| 141 HRESULT hr = prot_data_->ReportProgress(delegate_, status_code, status_text); | |
| 142 return hr; | |
| 143 } | |
| 144 | |
| 145 STDMETHODIMP ProtocolSinkWrap::ReportData(DWORD flags, ULONG progress, | |
| 146 ULONG max_progress) { | |
| 147 DCHECK(delegate_); | |
| 148 DVLOG(1) << "ProtocolSinkWrap::ReportData: " << Bscf2Str(flags) | |
| 149 << " progress: " << progress << " progress_max: " << max_progress; | |
| 150 | |
| 151 HRESULT hr = prot_data_->ReportData(delegate_, flags, progress, max_progress); | |
| 152 return hr; | |
| 153 } | |
| 154 | |
| 155 STDMETHODIMP ProtocolSinkWrap::ReportResult(HRESULT result, DWORD error, | |
| 156 LPCWSTR result_text) { | |
| 157 DVLOG(1) << "ProtocolSinkWrap::ReportResult: result: " << result | |
| 158 << " error: " << error | |
| 159 << " Text: " << (result_text ? result_text : L""); | |
| 160 ExceptionBarrier barrier; | |
| 161 HRESULT hr = prot_data_->ReportResult(delegate_, result, error, result_text); | |
| 162 return hr; | |
| 163 } | |
| 164 | |
| 165 | |
| 166 // Helpers | |
| 167 base::win::ScopedComPtr<IBindCtx> BindCtxFromIBindInfo( | |
| 168 IInternetBindInfo* bind_info) { | |
| 169 LPOLESTR bind_ctx_string = NULL; | |
| 170 ULONG count; | |
| 171 base::win::ScopedComPtr<IBindCtx> bind_ctx; | |
| 172 bind_info->GetBindString(BINDSTRING_PTR_BIND_CONTEXT, &bind_ctx_string, 1, | |
| 173 &count); | |
| 174 if (bind_ctx_string) { | |
| 175 int bind_ctx_int; | |
| 176 base::StringToInt(bind_ctx_string, &bind_ctx_int); | |
| 177 IBindCtx* pbc = reinterpret_cast<IBindCtx*>(bind_ctx_int); | |
| 178 bind_ctx.Attach(pbc); | |
| 179 CoTaskMemFree(bind_ctx_string); | |
| 180 } | |
| 181 | |
| 182 return bind_ctx; | |
| 183 } | |
| 184 | |
| 185 bool ShouldWrapSink(IInternetProtocolSink* sink, const wchar_t* url) { | |
| 186 // Ignore everything that does not start with http:// or https://. | |
| 187 // |url| is already normalized (i.e. no leading spaces, capital letters in | |
| 188 // protocol etc) and non-null (we check in Hook_Start). | |
| 189 DCHECK(url != NULL); | |
| 190 | |
| 191 if (ProtocolSinkWrap::ignore_xua()) | |
| 192 return false; // No need to intercept, we're ignoring X-UA-Compatible tags | |
| 193 | |
| 194 if ((url != StrStrW(url, L"http://")) && (url != StrStrW(url, L"https://"))) | |
| 195 return false; | |
| 196 | |
| 197 base::win::ScopedComPtr<IHttpNegotiate> http_negotiate; | |
| 198 HRESULT hr = DoQueryService(GUID_NULL, sink, http_negotiate.Receive()); | |
| 199 if (http_negotiate && !IsSubFrameRequest(http_negotiate)) | |
| 200 return true; | |
| 201 | |
| 202 return false; | |
| 203 } | |
| 204 | |
| 205 // High level helpers | |
| 206 bool IsCFRequest(IBindCtx* pbc) { | |
| 207 base::win::ScopedComPtr<BindContextInfo> info; | |
| 208 BindContextInfo::FromBindContext(pbc, info.Receive()); | |
| 209 if (info && info->chrome_request()) | |
| 210 return true; | |
| 211 | |
| 212 return false; | |
| 213 } | |
| 214 | |
| 215 bool HasProtData(IBindCtx* pbc) { | |
| 216 base::win::ScopedComPtr<BindContextInfo> info; | |
| 217 BindContextInfo::FromBindContext(pbc, info.Receive()); | |
| 218 bool result = false; | |
| 219 if (info) | |
| 220 result = info->has_prot_data(); | |
| 221 return result; | |
| 222 } | |
| 223 | |
| 224 void PutProtData(IBindCtx* pbc, ProtData* data) { | |
| 225 // AddRef and Release to avoid a potential leak of a ProtData instance if | |
| 226 // FromBindContext fails. | |
| 227 data->AddRef(); | |
| 228 base::win::ScopedComPtr<BindContextInfo> info; | |
| 229 BindContextInfo::FromBindContext(pbc, info.Receive()); | |
| 230 if (info) | |
| 231 info->set_prot_data(data); | |
| 232 data->Release(); | |
| 233 } | |
| 234 | |
| 235 bool IsTextHtml(const wchar_t* status_text) { | |
| 236 const std::wstring str = status_text; | |
| 237 bool is_text_html = LowerCaseEqualsASCII(str, kTextHtmlMimeType); | |
| 238 return is_text_html; | |
| 239 } | |
| 240 | |
| 241 bool IsAdditionallySupportedContentType(const wchar_t* status_text) { | |
| 242 static const char* kHeaderContentTypes[] = { | |
| 243 "application/xhtml+xml", | |
| 244 "application/xml", | |
| 245 "image/svg", | |
| 246 "image/svg+xml", | |
| 247 "text/xml", | |
| 248 "video/ogg", | |
| 249 "video/webm", | |
| 250 "video/mp4" | |
| 251 }; | |
| 252 | |
| 253 const std::wstring str = status_text; | |
| 254 for (int i = 0; i < arraysize(kHeaderContentTypes); ++i) { | |
| 255 if (LowerCaseEqualsASCII(str, kHeaderContentTypes[i])) | |
| 256 return true; | |
| 257 } | |
| 258 | |
| 259 if (PolicySettings::GetInstance()->GetRendererForContentType( | |
| 260 status_text) == PolicySettings::RENDER_IN_CHROME_FRAME) { | |
| 261 return true; | |
| 262 } | |
| 263 | |
| 264 return false; | |
| 265 } | |
| 266 | |
| 267 // Returns: | |
| 268 // RENDERER_TYPE_OTHER: if suggested mime type is not text/html. | |
| 269 // RENDERER_TYPE_UNDETERMINED: if suggested mime type is text/html. | |
| 270 // RENDERER_TYPE_CHROME_RESPONSE_HEADER: X-UA-Compatible tag is in HTTP headers. | |
| 271 // RENDERER_TYPE_CHROME_DEFAULT_RENDERER: GCF is the default renderer and the | |
| 272 // Url is not listed in the | |
| 273 // RenderInHostUrls registry key. | |
| 274 // RENDERER_TYPE_CHROME_OPT_IN_URL: GCF is not the default renderer and the Url | |
| 275 // is listed in the RenderInGcfUrls registry | |
| 276 // key. | |
| 277 RendererType DetermineRendererTypeFromMetaData( | |
| 278 const wchar_t* suggested_mime_type, | |
| 279 const std::wstring& url, | |
| 280 IWinInetHttpInfo* info) { | |
| 281 bool is_text_html = IsTextHtml(suggested_mime_type); | |
| 282 bool is_supported_content_type = is_text_html || | |
| 283 IsAdditionallySupportedContentType(suggested_mime_type); | |
| 284 | |
| 285 if (!is_supported_content_type) | |
| 286 return RENDERER_TYPE_OTHER; | |
| 287 | |
| 288 if (!url.empty()) { | |
| 289 RendererType renderer_type = RendererTypeForUrl(url); | |
| 290 if (IsChrome(renderer_type)) { | |
| 291 return renderer_type; | |
| 292 } | |
| 293 } | |
| 294 | |
| 295 if (info) { | |
| 296 char buffer[512] = "x-ua-compatible"; | |
| 297 DWORD len = sizeof(buffer); | |
| 298 DWORD flags = 0; | |
| 299 HRESULT hr = info->QueryInfo(HTTP_QUERY_CUSTOM, buffer, &len, &flags, NULL); | |
| 300 | |
| 301 if (hr == S_OK && len > 0) { | |
| 302 if (CheckXUaCompatibleDirective(buffer, GetIEMajorVersion())) { | |
| 303 return RENDERER_TYPE_CHROME_RESPONSE_HEADER; | |
| 304 } | |
| 305 } | |
| 306 } | |
| 307 | |
| 308 // We can (and want) to sniff the content. | |
| 309 if (is_text_html) { | |
| 310 return RENDERER_TYPE_UNDETERMINED; | |
| 311 } | |
| 312 | |
| 313 // We cannot sniff the content. | |
| 314 return RENDERER_TYPE_OTHER; | |
| 315 } | |
| 316 | |
| 317 RendererType DetermineRendererType(void* buffer, DWORD size, bool last_chance) { | |
| 318 RendererType renderer_type = RENDERER_TYPE_UNDETERMINED; | |
| 319 if (last_chance) | |
| 320 renderer_type = RENDERER_TYPE_OTHER; | |
| 321 | |
| 322 std::wstring html_contents; | |
| 323 // TODO(joshia): detect and handle different content encodings | |
| 324 base::UTF8ToWide(reinterpret_cast<char*>(buffer), size, &html_contents); | |
| 325 | |
| 326 // Note that document_contents_ may have NULL characters in it. While | |
| 327 // browsers may handle this properly, we don't and will stop scanning | |
| 328 // for the XUACompat content value if we encounter one. | |
| 329 std::wstring xua_compat_content; | |
| 330 if (SUCCEEDED(UtilGetXUACompatContentValue(html_contents, | |
| 331 &xua_compat_content))) { | |
| 332 if (CheckXUaCompatibleDirective(WideToASCII(xua_compat_content), | |
| 333 GetIEMajorVersion())) { | |
| 334 renderer_type = RENDERER_TYPE_CHROME_HTTP_EQUIV; | |
| 335 } | |
| 336 } | |
| 337 | |
| 338 return renderer_type; | |
| 339 } | |
| 340 | |
| 341 // ProtData | |
| 342 ProtData::ProtData(IInternetProtocol* protocol, | |
| 343 InternetProtocol_Read_Fn read_fun, const wchar_t* url) | |
| 344 : has_suggested_mime_type_(false), has_server_mime_type_(false), | |
| 345 buffer_size_(0), buffer_pos_(0), | |
| 346 renderer_type_(RENDERER_TYPE_UNDETERMINED), protocol_(protocol), | |
| 347 read_fun_(read_fun), url_(url) { | |
| 348 memset(buffer_, 0, arraysize(buffer_)); | |
| 349 DVLOG(1) << __FUNCTION__ << " " << this; | |
| 350 | |
| 351 // Add to map. | |
| 352 base::AutoLock lock(datamap_lock_); | |
| 353 DCHECK(datamap_.end() == datamap_.find(protocol_)); | |
| 354 datamap_[protocol] = this; | |
| 355 } | |
| 356 | |
| 357 ProtData::~ProtData() { | |
| 358 DVLOG(1) << __FUNCTION__ << " " << this; | |
| 359 Invalidate(); | |
| 360 } | |
| 361 | |
| 362 HRESULT ProtData::Read(void* buffer, ULONG size, ULONG* size_read) { | |
| 363 if (renderer_type_ == RENDERER_TYPE_UNDETERMINED) { | |
| 364 return E_PENDING; | |
| 365 } | |
| 366 | |
| 367 const ULONG bytes_available = buffer_size_ - buffer_pos_; | |
| 368 const ULONG bytes_to_copy = std::min(bytes_available, size); | |
| 369 if (bytes_to_copy) { | |
| 370 // Copy from the local buffer. | |
| 371 memcpy(buffer, buffer_ + buffer_pos_, bytes_to_copy); | |
| 372 *size_read = bytes_to_copy; | |
| 373 buffer_pos_ += bytes_to_copy; | |
| 374 | |
| 375 HRESULT hr = S_OK; | |
| 376 ULONG new_data = 0; | |
| 377 if (size > bytes_available) { | |
| 378 // User buffer is greater than what we have. | |
| 379 buffer = reinterpret_cast<uint8*>(buffer) + bytes_to_copy; | |
| 380 size -= bytes_to_copy; | |
| 381 hr = read_fun_(protocol_, buffer, size, &new_data); | |
| 382 } | |
| 383 | |
| 384 if (size_read) | |
| 385 *size_read = bytes_to_copy + new_data; | |
| 386 return hr; | |
| 387 } | |
| 388 | |
| 389 return read_fun_(protocol_, buffer, size, size_read); | |
| 390 } | |
| 391 | |
| 392 // Attempt to detect ChromeFrame from HTTP headers when | |
| 393 // BINDSTATUS_MIMETYPEAVAILABLE is received. | |
| 394 // There are three possible outcomes: CHROME_*/OTHER/UNDETERMINED. | |
| 395 // If RENDERER_TYPE_UNDETERMINED we are going to sniff the content later in | |
| 396 // ReportData(). | |
| 397 // | |
| 398 // With not-so-well-written software (mime filters/protocols/protocol patchers) | |
| 399 // BINDSTATUS_MIMETYPEAVAILABLE might be fired multiple times with different | |
| 400 // values for the same client. | |
| 401 // If the renderer_type_ member is: | |
| 402 // RENDERER_TYPE_CHROME_* - 2nd (and any subsequent) | |
| 403 // BINDSTATUS_MIMETYPEAVAILABLE is ignored. | |
| 404 // RENDERER_TYPE_OTHER - 2nd (and any subsequent) BINDSTATUS_MIMETYPEAVAILABLE | |
| 405 // is passed through. | |
| 406 // RENDERER_TYPE_UNDETERMINED - Try to detect ChromeFrame from HTTP headers | |
| 407 // (acts as if this is the first time | |
| 408 // BINDSTATUS_MIMETYPEAVAILABLE is received). | |
| 409 HRESULT ProtData::ReportProgress(IInternetProtocolSink* delegate, | |
| 410 ULONG status_code, LPCWSTR status_text) { | |
| 411 switch (status_code) { | |
| 412 case BINDSTATUS_DIRECTBIND: | |
| 413 renderer_type_ = RENDERER_TYPE_OTHER; | |
| 414 break; | |
| 415 | |
| 416 case BINDSTATUS_REDIRECTING: | |
| 417 url_.clear(); | |
| 418 if (status_text) | |
| 419 url_ = status_text; | |
| 420 break; | |
| 421 | |
| 422 case BINDSTATUS_SERVER_MIMETYPEAVAILABLE: | |
| 423 has_server_mime_type_ = true; | |
| 424 SaveSuggestedMimeType(status_text); | |
| 425 return S_OK; | |
| 426 | |
| 427 // TODO(stoyan): BINDSTATUS_RAWMIMETYPE | |
| 428 case BINDSTATUS_MIMETYPEAVAILABLE: | |
| 429 case BINDSTATUS_VERIFIEDMIMETYPEAVAILABLE: | |
| 430 SaveSuggestedMimeType(status_text); | |
| 431 // When Transaction is attached i.e. when existing BTS it terminated | |
| 432 // and "converted" to BTO, events will be re-fired for the new sink, | |
| 433 // but we may skip the renderer_type_ determination since it's already | |
| 434 // done. | |
| 435 if (renderer_type_ == RENDERER_TYPE_UNDETERMINED) { | |
| 436 // This may seem awkward. CBinding's implementation of IWinInetHttpInfo | |
| 437 // will forward to CTransaction that will forward to the real protocol. | |
| 438 // We may ask CTransaction (our protocol_ member) for IWinInetHttpInfo. | |
| 439 base::win::ScopedComPtr<IWinInetHttpInfo> info; | |
| 440 info.QueryFrom(delegate); | |
| 441 renderer_type_ = DetermineRendererTypeFromMetaData(suggested_mime_type_, | |
| 442 url_, info); | |
| 443 } | |
| 444 | |
| 445 if (IsChrome(renderer_type_)) { | |
| 446 // Suggested mime type is "text/html" and we have DEFAULT_RENDERER, | |
| 447 // OPT_IN_URL, or RESPONSE_HEADER. | |
| 448 DVLOG(1) << "Forwarding BINDSTATUS_MIMETYPEAVAILABLE " | |
| 449 << kChromeMimeType; | |
| 450 SaveReferrer(delegate); | |
| 451 delegate->ReportProgress(BINDSTATUS_MIMETYPEAVAILABLE, kChromeMimeType); | |
| 452 } else if (renderer_type_ == RENDERER_TYPE_OTHER) { | |
| 453 // Suggested mime type is not "text/html" - we are not interested in | |
| 454 // this request anymore. | |
| 455 FireSuggestedMimeType(delegate); | |
| 456 } else { | |
| 457 // Suggested mime type is "text/html"; We will try to sniff the | |
| 458 // HTML content in ReportData. | |
| 459 DCHECK_EQ(RENDERER_TYPE_UNDETERMINED, renderer_type_); | |
| 460 } | |
| 461 return S_OK; | |
| 462 } | |
| 463 | |
| 464 // We are just pass through at this point, avoid false positive crash reports. | |
| 465 ExceptionBarrierReportOnlyModule barrier; | |
| 466 return delegate->ReportProgress(status_code, status_text); | |
| 467 } | |
| 468 | |
| 469 HRESULT ProtData::ReportData(IInternetProtocolSink* delegate, | |
| 470 DWORD flags, ULONG progress, ULONG max_progress) { | |
| 471 if (renderer_type_ != RENDERER_TYPE_UNDETERMINED) { | |
| 472 // We are just pass through now, avoid false positive crash reports. | |
| 473 ExceptionBarrierReportOnlyModule barrier; | |
| 474 return delegate->ReportData(flags, progress, max_progress); | |
| 475 } | |
| 476 | |
| 477 HRESULT hr = FillBuffer(); | |
| 478 | |
| 479 bool last_chance = false; | |
| 480 if (hr == S_OK || hr == S_FALSE) { | |
| 481 last_chance = true; | |
| 482 } | |
| 483 | |
| 484 renderer_type_ = SkipMetadataCheck() ? RENDERER_TYPE_OTHER | |
| 485 : DetermineRendererType(buffer_, buffer_size_, last_chance); | |
| 486 | |
| 487 if (renderer_type_ == RENDERER_TYPE_UNDETERMINED) { | |
| 488 // do not report anything, we need more data. | |
| 489 return S_OK; | |
| 490 } | |
| 491 | |
| 492 if (IsChrome(renderer_type_)) { | |
| 493 DVLOG(1) << "Forwarding BINDSTATUS_MIMETYPEAVAILABLE " << kChromeMimeType; | |
| 494 SaveReferrer(delegate); | |
| 495 delegate->ReportProgress(BINDSTATUS_MIMETYPEAVAILABLE, kChromeMimeType); | |
| 496 } | |
| 497 | |
| 498 if (renderer_type_ == RENDERER_TYPE_OTHER) { | |
| 499 FireSuggestedMimeType(delegate); | |
| 500 } | |
| 501 | |
| 502 // This is the first data notification we forward, since up to now we hold | |
| 503 // the content received. | |
| 504 flags |= BSCF_FIRSTDATANOTIFICATION; | |
| 505 | |
| 506 if (hr == S_FALSE) { | |
| 507 flags |= (BSCF_LASTDATANOTIFICATION | BSCF_DATAFULLYAVAILABLE); | |
| 508 } | |
| 509 | |
| 510 return delegate->ReportData(flags, progress, max_progress); | |
| 511 } | |
| 512 | |
| 513 HRESULT ProtData::ReportResult(IInternetProtocolSink* delegate, HRESULT result, | |
| 514 DWORD error, LPCWSTR result_text) { | |
| 515 // We may receive ReportResult without ReportData, if the connection fails | |
| 516 // for example. | |
| 517 if (renderer_type_ == RENDERER_TYPE_UNDETERMINED) { | |
| 518 DVLOG(1) << "ReportResult received but renderer type is yet unknown."; | |
| 519 renderer_type_ = RENDERER_TYPE_OTHER; | |
| 520 FireSuggestedMimeType(delegate); | |
| 521 } | |
| 522 | |
| 523 HRESULT hr = S_OK; | |
| 524 if (delegate) | |
| 525 hr = delegate->ReportResult(result, error, result_text); | |
| 526 return hr; | |
| 527 } | |
| 528 | |
| 529 | |
| 530 void ProtData::UpdateUrl(const wchar_t* url) { | |
| 531 url_ = url; | |
| 532 } | |
| 533 | |
| 534 // S_FALSE - EOF | |
| 535 // S_OK - buffer fully filled | |
| 536 // E_PENDING - some data added to buffer, but buffer is not yet full | |
| 537 // E_XXXX - some other error. | |
| 538 HRESULT ProtData::FillBuffer() { | |
| 539 HRESULT hr_read = S_OK; | |
| 540 | |
| 541 while ((hr_read == S_OK) && (buffer_size_ < kMaxContentSniffLength)) { | |
| 542 ULONG size_read = 0; | |
| 543 hr_read = read_fun_(protocol_, buffer_ + buffer_size_, | |
| 544 kMaxContentSniffLength - buffer_size_, &size_read); | |
| 545 buffer_size_ += size_read; | |
| 546 } | |
| 547 | |
| 548 return hr_read; | |
| 549 } | |
| 550 | |
| 551 void ProtData::SaveSuggestedMimeType(LPCWSTR status_text) { | |
| 552 has_suggested_mime_type_ = true; | |
| 553 suggested_mime_type_.Allocate(status_text); | |
| 554 } | |
| 555 | |
| 556 void ProtData::FireSuggestedMimeType(IInternetProtocolSink* delegate) { | |
| 557 if (has_server_mime_type_) { | |
| 558 DVLOG(1) << "Forwarding BINDSTATUS_SERVER_MIMETYPEAVAILABLE " | |
| 559 << suggested_mime_type_; | |
| 560 delegate->ReportProgress(BINDSTATUS_SERVER_MIMETYPEAVAILABLE, | |
| 561 suggested_mime_type_); | |
| 562 } | |
| 563 | |
| 564 if (has_suggested_mime_type_) { | |
| 565 DVLOG(1) << "Forwarding BINDSTATUS_MIMETYPEAVAILABLE " | |
| 566 << suggested_mime_type_; | |
| 567 delegate->ReportProgress(BINDSTATUS_MIMETYPEAVAILABLE, | |
| 568 suggested_mime_type_); | |
| 569 } | |
| 570 } | |
| 571 | |
| 572 void ProtData::SaveReferrer(IInternetProtocolSink* delegate) { | |
| 573 DCHECK(IsChrome(renderer_type_)); | |
| 574 base::win::ScopedComPtr<IWinInetHttpInfo> info; | |
| 575 info.QueryFrom(delegate); | |
| 576 if (info) { | |
| 577 char buffer[4096] = {0}; | |
| 578 DWORD len = sizeof(buffer); | |
| 579 DWORD flags = 0; | |
| 580 HRESULT hr = info->QueryInfo( | |
| 581 HTTP_QUERY_REFERER | HTTP_QUERY_FLAG_REQUEST_HEADERS, | |
| 582 buffer, &len, &flags, 0); | |
| 583 if (hr == S_OK && len > 0) | |
| 584 referrer_.assign(buffer); | |
| 585 } else { | |
| 586 DLOG(WARNING) << "Failed to QI for IWinInetHttpInfo"; | |
| 587 } | |
| 588 } | |
| 589 | |
| 590 scoped_refptr<ProtData> ProtData::DataFromProtocol( | |
| 591 IInternetProtocol* protocol) { | |
| 592 scoped_refptr<ProtData> instance; | |
| 593 base::AutoLock lock(datamap_lock_); | |
| 594 ProtocolDataMap::iterator it = datamap_.find(protocol); | |
| 595 if (datamap_.end() != it) | |
| 596 instance = it->second; | |
| 597 return instance; | |
| 598 } | |
| 599 | |
| 600 void ProtData::Invalidate() { | |
| 601 if (protocol_) { | |
| 602 // Remove from map. | |
| 603 base::AutoLock lock(datamap_lock_); | |
| 604 DCHECK(datamap_.end() != datamap_.find(protocol_)); | |
| 605 datamap_.erase(protocol_); | |
| 606 protocol_ = NULL; | |
| 607 } | |
| 608 } | |
| 609 | |
| 610 // This function looks for the url pattern indicating that this request needs | |
| 611 // to be forced into chrome frame. | |
| 612 // This hack is required because window.open requests from Chrome don't have | |
| 613 // the URL up front. The URL comes in much later when the renderer initiates a | |
| 614 // top level navigation for the url passed into window.open. | |
| 615 // The new page must be rendered in ChromeFrame to preserve the opener | |
| 616 // relationship with its parent even if the new page does not have the chrome | |
| 617 // meta tag. | |
| 618 bool HandleAttachToExistingExternalTab(LPCWSTR url, | |
| 619 IInternetProtocol* protocol, | |
| 620 IInternetProtocolSink* prot_sink, | |
| 621 IBindCtx* bind_ctx) { | |
| 622 ChromeFrameUrl cf_url; | |
| 623 if (cf_url.Parse(url) && cf_url.attach_to_external_tab()) { | |
| 624 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 625 if (!prot_data) { | |
| 626 // Pass NULL as the read function which indicates that always return EOF | |
| 627 // without calling the underlying protocol. | |
| 628 prot_data = new ProtData(protocol, NULL, url); | |
| 629 PutProtData(bind_ctx, prot_data); | |
| 630 } | |
| 631 | |
| 632 prot_sink->ReportProgress(BINDSTATUS_MIMETYPEAVAILABLE, kChromeMimeType); | |
| 633 | |
| 634 int data_flags = BSCF_FIRSTDATANOTIFICATION | BSCF_LASTDATANOTIFICATION; | |
| 635 prot_sink->ReportData(data_flags, 0, 0); | |
| 636 | |
| 637 prot_sink->ReportResult(S_OK, 0, NULL); | |
| 638 return true; | |
| 639 } | |
| 640 return false; | |
| 641 } | |
| 642 | |
| 643 HRESULT ForwardHookStart(InternetProtocol_Start_Fn orig_start, | |
| 644 IInternetProtocol* protocol, LPCWSTR url, IInternetProtocolSink* prot_sink, | |
| 645 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 646 ExceptionBarrierReportOnlyModule barrier; | |
| 647 return orig_start(protocol, url, prot_sink, bind_info, flags, reserved); | |
| 648 } | |
| 649 | |
| 650 HRESULT ForwardWrappedHookStart(InternetProtocol_Start_Fn orig_start, | |
| 651 IInternetProtocol* protocol, LPCWSTR url, IInternetProtocolSink* prot_sink, | |
| 652 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 653 ExceptionBarrier barrier; | |
| 654 return orig_start(protocol, url, prot_sink, bind_info, flags, reserved); | |
| 655 } | |
| 656 | |
| 657 // IInternetProtocol/Ex hooks. | |
| 658 STDMETHODIMP Hook_Start(InternetProtocol_Start_Fn orig_start, | |
| 659 IInternetProtocol* protocol, LPCWSTR url, IInternetProtocolSink* prot_sink, | |
| 660 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 661 DCHECK(orig_start); | |
| 662 if (!url || !prot_sink || !bind_info) | |
| 663 return E_INVALIDARG; | |
| 664 DVLOG_IF(1, url != NULL) << "OnStart: " << url << PiFlags2Str(flags); | |
| 665 | |
| 666 base::win::ScopedComPtr<IBindCtx> bind_ctx = BindCtxFromIBindInfo(bind_info); | |
| 667 if (!bind_ctx) { | |
| 668 // MSHTML sometimes takes a short path, skips the creation of | |
| 669 // moniker and binding, by directly grabbing protocol from InternetSession | |
| 670 DVLOG(1) << "DirectBind for " << url; | |
| 671 return ForwardHookStart(orig_start, protocol, url, prot_sink, bind_info, | |
| 672 flags, reserved); | |
| 673 } | |
| 674 | |
| 675 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 676 if (prot_data && !HasProtData(bind_ctx)) { | |
| 677 prot_data->Invalidate(); | |
| 678 prot_data = NULL; | |
| 679 } | |
| 680 | |
| 681 if (HandleAttachToExistingExternalTab(url, protocol, prot_sink, bind_ctx)) { | |
| 682 return S_OK; | |
| 683 } | |
| 684 | |
| 685 if (IsCFRequest(bind_ctx)) { | |
| 686 base::win::ScopedComPtr<BindContextInfo> info; | |
| 687 BindContextInfo::FromBindContext(bind_ctx, info.Receive()); | |
| 688 DCHECK(info); | |
| 689 if (info) { | |
| 690 info->set_protocol(protocol); | |
| 691 } | |
| 692 return ForwardHookStart(orig_start, protocol, url, prot_sink, bind_info, | |
| 693 flags, reserved); | |
| 694 } | |
| 695 | |
| 696 if (prot_data) { | |
| 697 DVLOG(1) << "Found existing ProtData!"; | |
| 698 prot_data->UpdateUrl(url); | |
| 699 base::win::ScopedComPtr<IInternetProtocolSink> new_sink = | |
| 700 ProtocolSinkWrap::CreateNewSink(prot_sink, prot_data); | |
| 701 return ForwardWrappedHookStart(orig_start, protocol, url, new_sink, | |
| 702 bind_info, flags, reserved); | |
| 703 } | |
| 704 | |
| 705 if (!ShouldWrapSink(prot_sink, url)) { | |
| 706 return ForwardHookStart(orig_start, protocol, url, prot_sink, bind_info, | |
| 707 flags, reserved); | |
| 708 } | |
| 709 | |
| 710 // Fresh request. | |
| 711 InternetProtocol_Read_Fn read_fun = reinterpret_cast<InternetProtocol_Read_Fn> | |
| 712 (CTransaction_PatchInfo[1].stub_->argument()); | |
| 713 prot_data = new ProtData(protocol, read_fun, url); | |
| 714 PutProtData(bind_ctx, prot_data); | |
| 715 | |
| 716 base::win::ScopedComPtr<IInternetProtocolSink> new_sink = | |
| 717 ProtocolSinkWrap::CreateNewSink(prot_sink, prot_data); | |
| 718 return ForwardWrappedHookStart(orig_start, protocol, url, new_sink, bind_info, | |
| 719 flags, reserved); | |
| 720 } | |
| 721 | |
| 722 HRESULT ForwardHookStartEx(InternetProtocol_StartEx_Fn orig_start_ex, | |
| 723 IInternetProtocolEx* protocol, IUri* uri, IInternetProtocolSink* prot_sink, | |
| 724 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 725 ExceptionBarrierReportOnlyModule barrier; | |
| 726 return orig_start_ex(protocol, uri, prot_sink, bind_info, flags, reserved); | |
| 727 } | |
| 728 | |
| 729 HRESULT ForwardWrappedHookStartEx(InternetProtocol_StartEx_Fn orig_start_ex, | |
| 730 IInternetProtocolEx* protocol, IUri* uri, IInternetProtocolSink* prot_sink, | |
| 731 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 732 ExceptionBarrier barrier; | |
| 733 return orig_start_ex(protocol, uri, prot_sink, bind_info, flags, reserved); | |
| 734 } | |
| 735 | |
| 736 STDMETHODIMP Hook_StartEx(InternetProtocol_StartEx_Fn orig_start_ex, | |
| 737 IInternetProtocolEx* protocol, IUri* uri, IInternetProtocolSink* prot_sink, | |
| 738 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 739 DCHECK(orig_start_ex); | |
| 740 if (!uri || !prot_sink || !bind_info) | |
| 741 return E_INVALIDARG; | |
| 742 | |
| 743 base::win::ScopedBstr url; | |
| 744 uri->GetPropertyBSTR(Uri_PROPERTY_ABSOLUTE_URI, url.Receive(), 0); | |
| 745 DVLOG_IF(1, url != NULL) << "OnStartEx: " << url << PiFlags2Str(flags); | |
| 746 | |
| 747 base::win::ScopedComPtr<IBindCtx> bind_ctx = BindCtxFromIBindInfo(bind_info); | |
| 748 if (!bind_ctx) { | |
| 749 // MSHTML sometimes takes a short path, skips the creation of | |
| 750 // moniker and binding, by directly grabbing protocol from InternetSession. | |
| 751 DVLOG(1) << "DirectBind for " << url; | |
| 752 return ForwardHookStartEx(orig_start_ex, protocol, uri, prot_sink, | |
| 753 bind_info, flags, reserved); | |
| 754 } | |
| 755 | |
| 756 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 757 if (prot_data && !HasProtData(bind_ctx)) { | |
| 758 prot_data->Invalidate(); | |
| 759 prot_data = NULL; | |
| 760 } | |
| 761 | |
| 762 if (HandleAttachToExistingExternalTab(url, protocol, prot_sink, bind_ctx)) { | |
| 763 return S_OK; | |
| 764 } | |
| 765 | |
| 766 if (IsCFRequest(bind_ctx)) { | |
| 767 base::win::ScopedComPtr<BindContextInfo> info; | |
| 768 BindContextInfo::FromBindContext(bind_ctx, info.Receive()); | |
| 769 DCHECK(info); | |
| 770 if (info) { | |
| 771 info->set_protocol(protocol); | |
| 772 } | |
| 773 return ForwardHookStartEx(orig_start_ex, protocol, uri, prot_sink, | |
| 774 bind_info, flags, reserved); | |
| 775 } | |
| 776 | |
| 777 if (prot_data) { | |
| 778 DVLOG(1) << "Found existing ProtData!"; | |
| 779 prot_data->UpdateUrl(url); | |
| 780 base::win::ScopedComPtr<IInternetProtocolSink> new_sink = | |
| 781 ProtocolSinkWrap::CreateNewSink(prot_sink, prot_data); | |
| 782 return ForwardWrappedHookStartEx(orig_start_ex, protocol, uri, new_sink, | |
| 783 bind_info, flags, reserved); | |
| 784 } | |
| 785 | |
| 786 if (!ShouldWrapSink(prot_sink, url)) { | |
| 787 return ForwardHookStartEx(orig_start_ex, protocol, uri, prot_sink, | |
| 788 bind_info, flags, reserved); | |
| 789 } | |
| 790 | |
| 791 // Fresh request. | |
| 792 InternetProtocol_Read_Fn read_fun = reinterpret_cast<InternetProtocol_Read_Fn> | |
| 793 (CTransaction_PatchInfo[1].stub_->argument()); | |
| 794 prot_data = new ProtData(protocol, read_fun, url); | |
| 795 PutProtData(bind_ctx, prot_data); | |
| 796 | |
| 797 base::win::ScopedComPtr<IInternetProtocolSink> new_sink = | |
| 798 ProtocolSinkWrap::CreateNewSink(prot_sink, prot_data); | |
| 799 return ForwardWrappedHookStartEx(orig_start_ex, protocol, uri, new_sink, | |
| 800 bind_info, flags, reserved); | |
| 801 } | |
| 802 | |
| 803 STDMETHODIMP Hook_Read(InternetProtocol_Read_Fn orig_read, | |
| 804 IInternetProtocol* protocol, void* buffer, ULONG size, ULONG* size_read) { | |
| 805 DCHECK(orig_read); | |
| 806 HRESULT hr = E_FAIL; | |
| 807 | |
| 808 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 809 if (!prot_data) { | |
| 810 // We are not wrapping this request, avoid false positive crash reports. | |
| 811 ExceptionBarrierReportOnlyModule barrier; | |
| 812 hr = orig_read(protocol, buffer, size, size_read); | |
| 813 return hr; | |
| 814 } | |
| 815 | |
| 816 if (prot_data->is_attach_external_tab_request()) { | |
| 817 // return EOF always. | |
| 818 if (size_read) | |
| 819 *size_read = 0; | |
| 820 return S_FALSE; | |
| 821 } | |
| 822 | |
| 823 hr = prot_data->Read(buffer, size, size_read); | |
| 824 return hr; | |
| 825 } | |
| 826 | |
| 827 STDMETHODIMP Hook_LockRequest(InternetProtocol_LockRequest_Fn orig_req, | |
| 828 IInternetProtocol* protocol, | |
| 829 DWORD options) { | |
| 830 DCHECK(orig_req); | |
| 831 | |
| 832 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 833 if (prot_data && prot_data->is_attach_external_tab_request()) { | |
| 834 prot_data->AddRef(); | |
| 835 return S_OK; | |
| 836 } | |
| 837 | |
| 838 // We are just pass through at this point, avoid false positive crash | |
| 839 // reports. | |
| 840 ExceptionBarrierReportOnlyModule barrier; | |
| 841 return orig_req(protocol, options); | |
| 842 } | |
| 843 | |
| 844 STDMETHODIMP Hook_UnlockRequest(InternetProtocol_UnlockRequest_Fn orig_req, | |
| 845 IInternetProtocol* protocol) { | |
| 846 DCHECK(orig_req); | |
| 847 | |
| 848 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 849 if (prot_data && prot_data->is_attach_external_tab_request()) { | |
| 850 prot_data->Release(); | |
| 851 return S_OK; | |
| 852 } | |
| 853 | |
| 854 // We are just pass through at this point, avoid false positive crash | |
| 855 // reports. | |
| 856 ExceptionBarrierReportOnlyModule barrier; | |
| 857 return orig_req(protocol); | |
| 858 } | |
| 859 | |
| 860 STDMETHODIMP Hook_Abort(InternetProtocol_Abort_Fn orig_req, | |
| 861 IInternetProtocol* protocol, | |
| 862 HRESULT hr, | |
| 863 DWORD options) { | |
| 864 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 865 if (prot_data) | |
| 866 prot_data->Invalidate(); | |
| 867 | |
| 868 // We are just pass through at this point, avoid false positive crash | |
| 869 // reports. | |
| 870 ExceptionBarrierReportOnlyModule barrier; | |
| 871 return orig_req(protocol, hr, options); | |
| 872 } | |
| 873 | |
| 874 STDMETHODIMP Hook_Terminate(InternetProtocol_Terminate_Fn orig_req, | |
| 875 IInternetProtocol* protocol, | |
| 876 DWORD options) { | |
| 877 scoped_refptr<ProtData> prot_data = ProtData::DataFromProtocol(protocol); | |
| 878 // We should not be invalidating the cached protocol data in the following | |
| 879 // cases:- | |
| 880 // 1. Pages which are switching into ChromeFrame. | |
| 881 // When IE switches into ChromeFrame, we report the Chrome mime type as | |
| 882 // the handler for the page. This results in urlmon terminating the | |
| 883 // protocol. When Chrome attempts to read the data we need to report the | |
| 884 // cached data back to Chrome. | |
| 885 // 2. For the attach external tab requests which are temporary navigations | |
| 886 // to ensure that a top level URL is opened in IE from ChromeFrame. | |
| 887 // We rely on the mapping to identify these requests as attach tab | |
| 888 // requests. This mapping is referred to in the | |
| 889 // IInternetProtocol::LockRequest/IInternetProtocol::UnlockRequest | |
| 890 // intercepts. Invalidating the mapping after LockRequest is called and | |
| 891 // before UnlockRequest causes IE to crash. | |
| 892 if (prot_data && !IsChrome(prot_data->renderer_type()) && | |
| 893 !prot_data->is_attach_external_tab_request()) | |
| 894 prot_data->Invalidate(); | |
| 895 | |
| 896 // We are just pass through at this point, avoid false positive crash | |
| 897 // reports. | |
| 898 ExceptionBarrierReportOnlyModule barrier; | |
| 899 return orig_req(protocol, options); | |
| 900 } | |
| 901 | |
| 902 // Patching / Hooking code. | |
| 903 class FakeProtocol : public CComObjectRootEx<CComSingleThreadModel>, | |
| 904 public IInternetProtocol { | |
| 905 public: | |
| 906 BEGIN_COM_MAP(FakeProtocol) | |
| 907 COM_INTERFACE_ENTRY(IInternetProtocol) | |
| 908 COM_INTERFACE_ENTRY(IInternetProtocolRoot) | |
| 909 END_COM_MAP() | |
| 910 | |
| 911 STDMETHOD(Start)(LPCWSTR url, IInternetProtocolSink *protocol_sink, | |
| 912 IInternetBindInfo* bind_info, DWORD flags, HANDLE_PTR reserved) { | |
| 913 transaction_.QueryFrom(protocol_sink); | |
| 914 // Return some unusual error code. | |
| 915 return INET_E_INVALID_CERTIFICATE; | |
| 916 } | |
| 917 | |
| 918 STDMETHOD(Continue)(PROTOCOLDATA* protocol_data) { return S_OK; } | |
| 919 STDMETHOD(Abort)(HRESULT reason, DWORD options) { return S_OK; } | |
| 920 STDMETHOD(Terminate)(DWORD options) { return S_OK; } | |
| 921 STDMETHOD(Suspend)() { return S_OK; } | |
| 922 STDMETHOD(Resume)() { return S_OK; } | |
| 923 STDMETHOD(Read)(void *buffer, ULONG size, ULONG* size_read) { return S_OK; } | |
| 924 STDMETHOD(Seek)(LARGE_INTEGER move, DWORD origin, ULARGE_INTEGER* new_pos) | |
| 925 { return S_OK; } | |
| 926 STDMETHOD(LockRequest)(DWORD options) { return S_OK; } | |
| 927 STDMETHOD(UnlockRequest)() { return S_OK; } | |
| 928 | |
| 929 base::win::ScopedComPtr<IInternetProtocol> transaction_; | |
| 930 }; | |
| 931 | |
| 932 struct FakeFactory : public IClassFactory, | |
| 933 public CComObjectRootEx<CComSingleThreadModel> { | |
| 934 BEGIN_COM_MAP(FakeFactory) | |
| 935 COM_INTERFACE_ENTRY(IClassFactory) | |
| 936 END_COM_MAP() | |
| 937 | |
| 938 STDMETHOD(CreateInstance)(IUnknown *pUnkOuter, REFIID riid, void **ppvObj) { | |
| 939 if (pUnkOuter) | |
| 940 return CLASS_E_NOAGGREGATION; | |
| 941 HRESULT hr = obj_->QueryInterface(riid, ppvObj); | |
| 942 return hr; | |
| 943 } | |
| 944 | |
| 945 STDMETHOD(LockServer)(BOOL fLock) { | |
| 946 return S_OK; | |
| 947 } | |
| 948 | |
| 949 IUnknown* obj_; | |
| 950 }; | |
| 951 | |
| 952 static void HookTransactionVtable(IInternetProtocol* p) { | |
| 953 base::win::ScopedComPtr<IInternetProtocolEx> ex; | |
| 954 ex.QueryFrom(p); | |
| 955 | |
| 956 HRESULT hr = vtable_patch::PatchInterfaceMethods(p, CTransaction_PatchInfo); | |
| 957 if (hr == S_OK && ex) { | |
| 958 vtable_patch::PatchInterfaceMethods(ex.get(), CTransaction2_PatchInfo); | |
| 959 } | |
| 960 } | |
| 961 | |
| 962 void TransactionHooks::InstallHooks() { | |
| 963 if (IS_PATCHED(CTransaction)) { | |
| 964 DLOG(WARNING) << __FUNCTION__ << " called more than once."; | |
| 965 return; | |
| 966 } | |
| 967 | |
| 968 CComObjectStackEx<FakeProtocol> prot; | |
| 969 CComObjectStackEx<FakeFactory> factory; | |
| 970 factory.obj_ = &prot; | |
| 971 base::win::ScopedComPtr<IInternetSession> session; | |
| 972 HRESULT hr = ::CoInternetGetSession(0, session.Receive(), 0); | |
| 973 hr = session->RegisterNameSpace(&factory, CLSID_NULL, L"611", 0, 0, 0); | |
| 974 DLOG_IF(FATAL, FAILED(hr)) << "Failed to register namespace"; | |
| 975 if (hr != S_OK) | |
| 976 return; | |
| 977 | |
| 978 do { | |
| 979 base::win::ScopedComPtr<IMoniker> mk; | |
| 980 base::win::ScopedComPtr<IBindCtx> bc; | |
| 981 base::win::ScopedComPtr<IStream> stream; | |
| 982 hr = ::CreateAsyncBindCtxEx(0, 0, 0, 0, bc.Receive(), 0); | |
| 983 DLOG_IF(FATAL, FAILED(hr)) << "CreateAsyncBindCtxEx failed " << hr; | |
| 984 if (hr != S_OK) | |
| 985 break; | |
| 986 | |
| 987 hr = ::CreateURLMoniker(NULL, L"611://512", mk.Receive()); | |
| 988 DLOG_IF(FATAL, FAILED(hr)) << "CreateURLMoniker failed " << hr; | |
| 989 if (hr != S_OK) | |
| 990 break; | |
| 991 | |
| 992 hr = mk->BindToStorage(bc, NULL, IID_IStream, | |
| 993 reinterpret_cast<void**>(stream.Receive())); | |
| 994 DLOG_IF(FATAL, hr != INET_E_INVALID_CERTIFICATE) << | |
| 995 "BindToStorage failed " << hr; | |
| 996 } while (0); | |
| 997 | |
| 998 hr = session->UnregisterNameSpace(&factory, L"611"); | |
| 999 if (prot.transaction_) { | |
| 1000 HookTransactionVtable(prot.transaction_); | |
| 1001 // Explicit release, otherwise ~CComObjectStackEx will complain about | |
| 1002 // outstanding reference to us, because it runs before ~FakeProtocol | |
| 1003 prot.transaction_.Release(); | |
| 1004 } | |
| 1005 } | |
| 1006 | |
| 1007 void TransactionHooks::RevertHooks() { | |
| 1008 vtable_patch::UnpatchInterfaceMethods(CTransaction_PatchInfo); | |
| 1009 vtable_patch::UnpatchInterfaceMethods(CTransaction2_PatchInfo); | |
| 1010 } | |
| OLD | NEW |