Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

3632 lines
86 KiB

/*++
Copyright (c) 1996 Microsoft Corporation
Module Name:
proxysup.cxx
Abstract:
Contains class implementation for proxy server and proxy bypass list
Contents:
IsLocalMacro
PROXY_SERVER_LIST_ENTRY::WriteEntry
PROXY_SERVER_LIST::AddList
PROXY_SERVER_LIST::Find
PROXY_SERVER_LIST::Add
PROXY_SERVER_LIST::ProxyScheme
PROXY_SERVER_LIST::GetProxyHostName
PROXY_SERVER_LIST::AddToBypassList
PROXY_SERVER_LIST::GetList
PROXY_BYPASS_LIST_ENTRY::WriteEntry
PROXY_BYPASS_LIST::AddList
PROXY_BYPASS_LIST::Find
PROXY_BYPASS_LIST::Add
PROXY_BYPASS_LIST::IsBypassed
PROXY_BYPASS_LIST::IsHostInBypassList
PROXY_BYPASS_LIST::GetList
PROXY_INFO::GetProxyStringInfo
PROXY_INFO::HostBypassesProxy
PROXY_INFO::RedoSendRequest
PROXY_INFO::Terminate
PROXY_INFO::CleanOutLists
PROXY_STATE::GetNextProxy
(GetRegistryProxyParameter)
Author:
Richard L Firth (rfirth) 03-Feb-1996
Revision History:
03-Feb-1996 rfirth
Created
--*/
#include <wininetp.h>
//
// private manifests
//
#define DEFAULT_PROXY_BUFFER_LENGTH (4 K)
#define MAX_IP_ADDRESS_STRING_LENGTH (4 * 4 - 1) // ###.###.###.###
#define PROXY_REGISTRY_STRING_LENGTH (4 K)
//
// private types
//
typedef enum {
STATE_START,
STATE_PROTOCOL,
STATE_SCHEME,
STATE_SERVER,
STATE_PORT,
STATE_END,
STATE_ERROR
} PARSER_STATE;
//
// private prototypes
//
PRIVATE
LPSTR
GetRegistryProxyParameter(
IN LPSTR lpszParameterName
);
//
// functions
//
BOOL
IsLocalMacro(
IN LPSTR lpszMetaName,
IN DWORD dwMetaNameLength
)
/*++
Routine Description:
Checks for local macro name
Arguments:
lpszMetaName - name to check
dwMetaNameLength - length
Return Value:
BOOL
TRUE - it is <local>
FALSE - not
--*/
{
INET_ASSERT(lpszMetaName != NULL);
static const char s_local[] = "<local>";
return (strnicmp(s_local, lpszMetaName, dwMetaNameLength) == 0);
}
//
// member functions
//
BOOL
PROXY_SERVER_LIST_ENTRY::WriteEntry(
OUT LPSTR lpszBuffer,
IN OUT LPDWORD lpdwBufferLength
)
/*++
Routine Description:
Writes this proxy server list entry as a string in the supplied buffer
Arguments:
lpszBuffer - pointer to buffer where string is written
lpdwBufferLength - IN: amount of space in buffer
OUT: number of bytes copied, or required size
Return Value:
BOOL
TRUE - entry written to buffer
FALSE - entry not written to buffer - *lpdwBufferLength contains
required size
--*/
{
DWORD requiredLength;
LPSTR protocolName;
DWORD protocolNameLength;
LPSTR schemeName;
DWORD schemeNameLength;
INTERNET_PORT magnitude = 1;
protocolName = MapUrlScheme(_Protocol, &protocolNameLength);
if (protocolName != NULL) {
requiredLength = protocolNameLength + 1; // for '='
} else {
requiredLength = 0;
}
schemeName = MapUrlScheme(_Scheme, &schemeNameLength);
if (schemeName != NULL) {
requiredLength += schemeNameLength + sizeof("://") - 1;
}
requiredLength += _ProxyName.StringLength();
if (_ProxyPort != INTERNET_INVALID_PORT_NUMBER) {
for (INTERNET_PORT n = 10000, i = 5; n > 0; n /= 10, --i) {
if (_ProxyPort / n) {
requiredLength += i + 1; // for ':'
magnitude = n;
break;
}
}
}
BOOL success;
if (*lpdwBufferLength > requiredLength) {
if (protocolName != NULL) {
memcpy(lpszBuffer, protocolName, protocolNameLength);
lpszBuffer += protocolNameLength;
*lpszBuffer++ = '=';
}
if (schemeName != NULL) {
memcpy(lpszBuffer, schemeName, schemeNameLength);
lpszBuffer += schemeNameLength;
memcpy(lpszBuffer, "://", sizeof("://") - 1);
lpszBuffer += sizeof("://") - 1;
}
_ProxyName.CopyTo(lpszBuffer);
lpszBuffer += _ProxyName.StringLength();
if (_ProxyPort != INTERNET_INVALID_PORT_NUMBER) {
*lpszBuffer++ = ':';
for (INTERNET_PORT n = _ProxyPort, i = magnitude; i; i /= 10) {
*lpszBuffer++ = (char)(n / i) + '0';
n %= i;
}
}
success = TRUE;
} else {
success = FALSE;
}
*lpdwBufferLength = requiredLength;
return success;
}
DWORD
PROXY_SERVER_LIST::AddList(
IN LPSTR lpszList
)
/*++
Routine Description:
Parses a list of proxy servers and creates a PROXY_SERVER_LIST_ENTRY for
each one
Arguments:
lpszList - pointer to list of proxies of the form:
[<scheme>=][<scheme>"://"]<server>[":"<port>][";"*]
The list can be NULL, in which case we read it from the
registry
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
At least one entry in lpszList is bogus
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_SERVER_LIST::AddList",
"%.80q",
lpszList
));
DWORD entryLength;
LPSTR protocolName;
DWORD protocolLength;
LPSTR schemeName;
DWORD schemeLength;
LPSTR serverName;
DWORD serverLength;
PARSER_STATE state;
DWORD nSlashes;
INTERNET_PORT port;
BOOL done;
entryLength = 0;
protocolName = lpszList;
protocolLength = 0;
schemeName = NULL;
schemeLength = 0;
serverName = NULL;
serverLength = 0;
state = STATE_PROTOCOL;
nSlashes = 0;
port = 0;
done = FALSE;
//
// walk the list, pulling out the various scheme parts
//
do {
char ch = *lpszList++;
if ((nSlashes == 1) && (ch != '/')) {
state = STATE_ERROR;
break;
}
switch (ch) {
case '=':
if ((state == STATE_PROTOCOL) && (entryLength != 0)) {
protocolLength = entryLength;
entryLength = 0;
state = STATE_SCHEME;
schemeName = lpszList;
} else {
//
// '=' can't legally appear anywhere else
//
state = STATE_ERROR;
}
break;
case ':':
switch (state) {
case STATE_PROTOCOL:
if (*lpszList == '/') {
schemeName = protocolName;
protocolName = NULL;
schemeLength = entryLength;
protocolLength = 0;
state = STATE_SCHEME;
} else if (*lpszList != '\0') {
serverName = protocolName;
serverLength = entryLength;
state = STATE_PORT;
} else {
state = STATE_ERROR;
}
entryLength = 0;
break;
case STATE_SCHEME:
if (*lpszList == '/') {
schemeLength = entryLength;
} else if (*lpszList != '\0') {
serverName = schemeName;
serverLength = entryLength;
state = STATE_PORT;
} else {
state = STATE_ERROR;
}
entryLength = 0;
break;
case STATE_SERVER:
serverLength = entryLength;
state = STATE_PORT;
entryLength = 0;
break;
default:
state = STATE_ERROR;
break;
}
break;
case '/':
if ((state == STATE_SCHEME) && (nSlashes < 2) && (entryLength == 0)) {
if (++nSlashes == 2) {
state = STATE_SERVER;
serverName = lpszList;
}
} else {
state = STATE_ERROR;
}
break;
default:
if (state != STATE_PORT) {
++entryLength;
} else if (isdigit(ch)) {
//
// BUGBUG - we will overflow if >65535
//
port = port * 10 + (ch - '0');
} else {
//
// STATE_PORT && non-digit character - error
//
state = STATE_ERROR;
}
break;
case '\0':
done = TRUE;
//
// fall through
//
case '\t':
case '\n':
case '\v': // vertical tab, 0x0b
case '\f': // form feed, 0x0c
case '\r':
case ' ':
case ';':
case ',':
if (serverLength == 0) {
serverLength = entryLength;
}
if (serverLength != 0) {
if (serverName == NULL) {
serverName = (schemeName != NULL)
? schemeName
: protocolName;
}
INET_ASSERT(serverName != NULL);
INTERNET_SCHEME protocol;
if (protocolLength != 0) {
protocol = MapUrlSchemeName(protocolName, protocolLength);
} else {
protocol = INTERNET_SCHEME_DEFAULT;
}
INTERNET_SCHEME scheme;
if (schemeLength != 0) {
scheme = MapUrlSchemeName(schemeName, schemeLength);
} else {
scheme = INTERNET_SCHEME_DEFAULT;
}
//
// add an entry if this is a protocol we handle and we don't
// already have an entry for it
//
if ((protocol != INTERNET_SCHEME_UNKNOWN)
&& (scheme != INTERNET_SCHEME_UNKNOWN)
//
// we can only currently handle CERN (secure or unsecure) and
// FTP proxies, so kick out anything that wants to go via any
// other proxy scheme
//
&& ((scheme == INTERNET_SCHEME_DEFAULT)
|| (scheme == INTERNET_SCHEME_HTTP)
|| (scheme == INTERNET_SCHEME_HTTPS))) {
if (!Find(protocol)) {
//
// don't worry if Add() fails - we just continue
//
Add(protocol, scheme, serverName, serverLength, port);
}
}
}
entryLength = 0;
protocolName = lpszList;
protocolLength = 0;
schemeName = NULL;
schemeLength = 0;
serverName = NULL;
serverLength = 0;
nSlashes = 0;
port = 0;
state = STATE_PROTOCOL;
break;
}
if (state == STATE_ERROR) {
break;
}
} while (!done);
DWORD error;
if (state == STATE_ERROR) {
error = ERROR_INVALID_PARAMETER;
} else {
error = ERROR_SUCCESS;
}
DEBUG_LEAVE(error);
return error;
}
BOOL
PROXY_SERVER_LIST::Find(
IN INTERNET_SCHEME tScheme
)
/*++
Routine Description:
Find a PROXY_SERVER_LIST_ENTRY based on the scheme
Arguments:
tScheme - protocol scheme to find
Return Value:
BOOL
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_SERVER_LIST::Find",
"%s",
InternetMapScheme(tScheme)
));
BOOL found = FALSE;
if (!LockSerializedList(&_List))
goto quit;
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_SERVER_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_SERVER_LIST_ENTRY, _List);
if (info->_Protocol == tScheme) {
found = TRUE;
break;
}
}
UnlockSerializedList(&_List);
quit:
DEBUG_LEAVE(found);
return found;
}
DWORD
PROXY_SERVER_LIST::Add(
IN INTERNET_SCHEME tProtocol,
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName,
IN DWORD dwHostNameLength,
IN INTERNET_PORT nPort
)
/*++
Routine Description:
Create an add a PROXY_SERVER_LIST_ENTRY to the PROXY_SERVER_LIST
Arguments:
tProtocol - protocol which uses the proxy
tScheme - scheme used to talk to the proxy
lpszHostName - proxy host name
dwHostNameLength - length of proxy host name
nPort - port at proxy host
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_NOT_ENOUGH_MEMORY
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_SERVER_LIST::Add",
"%s, %s, %.*q, %d, %d",
InternetMapScheme(tProtocol),
InternetMapScheme(tScheme),
dwHostNameLength,
lpszHostName,
dwHostNameLength,
nPort
));
PROXY_SERVER_LIST_ENTRY * entry;
entry = New PROXY_SERVER_LIST_ENTRY(tProtocol,
tScheme,
lpszHostName,
dwHostNameLength,
nPort
);
DWORD error = ERROR_SUCCESS;
if (entry != NULL) {
//error = entry->ResolveAddress();
//if (error == ERROR_SUCCESS) {
// InsertAtTailOfSerializedList(&_List, &entry->_List);
//}
if (entry->_Protocol == INTERNET_SCHEME_DEFAULT) {
if (!InsertAtTailOfSerializedList(&_List, &entry->_List)) {
delete entry;
error = ERROR_NOT_ENOUGH_MEMORY;
}
} else {
if (!InsertAtHeadOfSerializedList(&_List, &entry->_List)) {
delete entry;
error = ERROR_NOT_ENOUGH_MEMORY;
}
}
} else {
error = ERROR_NOT_ENOUGH_MEMORY;
}
DEBUG_LEAVE(error);
return error;
}
INTERNET_SCHEME
PROXY_SERVER_LIST::ProxyScheme(
IN INTERNET_SCHEME tProtocol
)
/*++
Routine Description:
Determines protocol over which tScheme goes through proxy
Arguments:
tProtocol - protocol scheme used to retrieve data (e.g. FTP)
Return Value:
INTERNET_SCHEME
Success - scheme by which protocol goes via proxy
Failure - INTERNET_SCHEME_UNKNOWN
--*/
{
DEBUG_ENTER((DBG_PROXY,
Int,
"PROXY_SERVER_LIST::ProxyScheme",
"%s",
InternetMapScheme(tProtocol)
));
INTERNET_SCHEME tScheme = INTERNET_SCHEME_UNKNOWN;
if (!LockSerializedList(&_List))
goto quit;
//
// the list really shouldn't be empty if we're here
//
INET_ASSERT(!IsSerializedListEmpty(&_List));
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_SERVER_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_SERVER_LIST_ENTRY, _List);
//
// if we find a match for the protocol, or this protocol is handled by
// the default proxy entry then we are done
//
if ((info->_Protocol == tProtocol)
|| (info->_Protocol == INTERNET_SCHEME_DEFAULT)) {
tScheme = info->_Scheme;
//
// the default scheme is HTTP (CERN proxy)
//
if (tScheme == INTERNET_SCHEME_DEFAULT) {
tScheme = INTERNET_SCHEME_HTTP;
}
break;
}
}
UnlockSerializedList(&_List);
quit:
DEBUG_LEAVE(tScheme);
return tScheme;
}
BOOL
PROXY_SERVER_LIST::GetProxyHostName(
IN INTERNET_SCHEME tProtocol,
IN OUT LPINTERNET_SCHEME lptScheme,
OUT LPSTR * lplpszHostName,
OUT LPBOOL lpbFreeHostName,
OUT LPDWORD lpdwHostNameLength,
OUT LPINTERNET_PORT lpHostPort
)
/*++
Routine Description:
Given a protocol, map it to the proxy we use to retrieve the data
Arguments:
tProtocol - protocol to map (e.g. find the proxy for FTP)
lptScheme - IN: preferred scheme if INTERNET_SCHEME_DEFAULT
OUT: returned scheme
lplpszHostName - pointer to returned pointer to host name
lpbFreeHostName - returned TRUE if *lplpszHostName allocated
lpdwHostNameLength - pointer to returned host name length
lpHostPort - pointer to returned host port
Return Value:
BOOL
TRUE - requested info has been returned
FALSE - requested info was not found
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_SERVER_LIST::GetProxyHostName",
"%s, %#x, %#x, %#x, %#x, %#x",
InternetMapScheme(tProtocol),
lptScheme,
lplpszHostName,
lpbFreeHostName,
lpdwHostNameLength,
lpHostPort
));
INET_ASSERT(tProtocol != INTERNET_SCHEME_UNKNOWN);
//
// *lptScheme must now be one of the recognized schemes, or the default
//
INET_ASSERT((*lptScheme == INTERNET_SCHEME_DEFAULT)
|| (*lptScheme == INTERNET_SCHEME_HTTP)
|| (*lptScheme == INTERNET_SCHEME_HTTPS)
|| (*lptScheme == INTERNET_SCHEME_SOCKS)
);
BOOL found = FALSE;
if (!LockSerializedList(&_List))
goto quit;
//
// the list really shouldn't be empty if we're here
//
INET_ASSERT(!IsSerializedListEmpty(&_List));
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_SERVER_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_SERVER_LIST_ENTRY, _List);
//
// if we find a match for the protocol, or this protocol is handled by
// the default proxy entry then we are done
//
// Hack: But make sure its NOT socks since, socks must be
// an exact match !!! No defaults.
//
if ((info->_Protocol == tProtocol)
|| ((info->_Protocol == INTERNET_SCHEME_DEFAULT)
&& (tProtocol != INTERNET_SCHEME_SOCKS) )) {
INTERNET_SCHEME scheme = info->_Scheme;
//
// the returned scheme is the input preferred scheme unless it was
// the default scheme in which case we return HTTP (CERN proxy)
//
if (scheme == INTERNET_SCHEME_DEFAULT) {
scheme = (*lptScheme == INTERNET_SCHEME_DEFAULT)
? INTERNET_SCHEME_HTTP
: *lptScheme;
}
*lptScheme = scheme;
*lpbFreeHostName = FALSE;
*lpdwHostNameLength = 0;
*lplpszHostName = NewString(info->_ProxyName.StringAddress(),
info->_ProxyName.StringLength()
);
if (*lplpszHostName != NULL) {
*lpbFreeHostName = TRUE;
*lpdwHostNameLength = info->_ProxyName.StringLength();
}
INTERNET_PORT port = info->_ProxyPort;
//
// map the default port value
//
if (port == INTERNET_INVALID_PORT_NUMBER) {
switch (scheme) {
case INTERNET_SCHEME_HTTP:
port = INTERNET_DEFAULT_HTTP_PORT;
break;
case INTERNET_SCHEME_HTTPS:
port = INTERNET_DEFAULT_HTTPS_PORT;
break;
case INTERNET_SCHEME_SOCKS:
port = INTERNET_DEFAULT_SOCKS_PORT;
break;
}
}
*lpHostPort = port;
found = TRUE;
DEBUG_PRINT(PROXY,
INFO,
("proxy = %s://%s:%d\n",
MapUrlSchemeToName(scheme),
info->_ProxyName.StringAddress(),
port
));
break;
}
}
UnlockSerializedList(&_List);
quit:
DEBUG_LEAVE(found);
return found;
}
DWORD
PROXY_SERVER_LIST::AddToBypassList(
IN PROXY_BYPASS_LIST * lpBypassList
)
/*++
Routine Description:
For all proxy servers in the server list, we add the details to the bypass
list. By default, an app mustn't send a request to the proxy via the proxy!
Additionally, the app should not have to specifically nominate the proxy
server(s) as bypassing the proxy
Arguments:
lpBypassList - pointer to bypass proxy list where proxy servers will be
added
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_NOT_ENOUGH_MEMORY
--*/
{
DWORD error = ERROR_SUCCESS;
PLIST_ENTRY entry = HeadOfSerializedList(&_List);
while ((entry != (PLIST_ENTRY)SlSelf(&_List)) && (error == ERROR_SUCCESS)) {
PROXY_SERVER_LIST_ENTRY * info = (PROXY_SERVER_LIST_ENTRY *)entry;
if (!lpBypassList->Find(info->_Scheme,
info->_ProxyName.StringAddress(),
info->_ProxyName.StringLength(),
info->_ProxyPort)) {
error = lpBypassList->Add(info->_Scheme,
info->_ProxyName.StringAddress(),
info->_ProxyName.StringLength(),
info->_ProxyPort
);
}
entry = entry->Flink;
}
return error;
}
VOID
PROXY_SERVER_LIST::GetList(
OUT LPSTR * lplpszList,
IN DWORD dwBufferLength,
IN OUT LPDWORD lpdwRequiredLength
)
/*++
Routine Description:
Writes the list of proxy servers to a buffer, and/or returns the required
buffer length
Arguments:
lplpszList - pointer to pointer to buffer where list is written, if
sufficient space
dwBufferLength - amount of space in *lplpszList
lpdwRequiredLength - OUT: cumulative size of data
Return Value:
None.
--*/
{
LPSTR lpszList = *lplpszList;
BOOL firstTime = TRUE;
BOOL outOfBuffer = FALSE;
if (!LockSerializedList(&_List))
return;
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_SERVER_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_SERVER_LIST_ENTRY, _List);
if (!firstTime) {
//
// write delimiter if enough space
//
if (dwBufferLength >= 1) {
*lpszList++ = ' ';
--dwBufferLength;
}
++*lpdwRequiredLength;
} else {
firstTime = FALSE;
}
//
// find the length of the current entry & write it to the buffer if
// enough space
//
DWORD length = dwBufferLength;
info->WriteEntry(lpszList, &length);
if (dwBufferLength >= length) {
//
// we wrote it
//
dwBufferLength -= length;
} else {
//
// no buffer left
//
dwBufferLength = 0;
outOfBuffer = TRUE;
}
*lpdwRequiredLength += length;
lpszList += length;
}
if (!outOfBuffer) {
if (dwBufferLength > 0) {
*lpszList++ = '\0';
*lplpszList = lpszList;
}
}
//
// add 1 for the terminating NUL
//
++*lpdwRequiredLength;
UnlockSerializedList(&_List);
}
BOOL
PROXY_BYPASS_LIST_ENTRY::WriteEntry(
OUT LPSTR lpszBuffer,
IN OUT LPDWORD lpdwBufferLength
)
/*++
Routine Description:
Writes this proxy bypass list entry as a string in the supplied buffer
Arguments:
lpszBuffer - pointer to buffer where string is written
lpdwBufferLength - IN: amount of space in buffer
OUT: number of bytes copied, or required size
Return Value:
BOOL
TRUE - entry written to buffer
FALSE - entry not written to buffer - *lpdwBufferLength contains
required size
--*/
{
DWORD requiredLength;
LPSTR schemeName;
DWORD schemeNameLength;
INTERNET_PORT magnitude = 1;
if (_Scheme != INTERNET_SCHEME_DEFAULT) {
schemeName = MapUrlScheme(_Scheme, &schemeNameLength);
requiredLength = schemeNameLength + sizeof("://") - 1;
} else {
schemeName = NULL;
requiredLength = 0;
}
if (IsLocal()) {
requiredLength += sizeof("<local>") - 1;
} else {
requiredLength += _Name.StringLength();
}
if (_Port != INTERNET_INVALID_PORT_NUMBER) {
for (INTERNET_PORT n = 10000, i = 5; n > 0; n /= 10, --i) {
if (_Port / n) {
requiredLength += i + 1;
magnitude = n;
break;
}
}
}
BOOL success;
if (*lpdwBufferLength > requiredLength) {
if (schemeName != NULL) {
memcpy(lpszBuffer, schemeName, schemeNameLength);
lpszBuffer += schemeNameLength;
memcpy(lpszBuffer, "://", sizeof("://") - 1);
lpszBuffer += sizeof("://") - 1;
}
if (IsLocal()) {
memcpy(lpszBuffer, "<local>", sizeof("<local>") - 1);
lpszBuffer += sizeof("<local>") - 1;
} else {
_Name.CopyTo(lpszBuffer);
lpszBuffer += _Name.StringLength();
}
if (_Port != INTERNET_INVALID_PORT_NUMBER) {
*lpszBuffer++ = ':';
for (INTERNET_PORT n = _Port, i = magnitude; i; i /= 10) {
*lpszBuffer++ = (char)(n / i) + '0';
n %= i;
}
}
success = TRUE;
} else {
success = FALSE;
}
*lpdwBufferLength = requiredLength;
return success;
}
DWORD
PROXY_BYPASS_LIST::AddList(
IN LPSTR lpszList
)
/*++
Routine Description:
Parses a list of proxy bypass specifiers and adds them to the list
Arguments:
lpszList - pointer to string containing list of proxy bypass specifiers.
The format is:
[<scheme>"://"][<server>][":"<port>"]
The list can be NULL, in which case we read it from the
registry
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_BYPASS_LIST::AddList",
"%.80q",
lpszList
));
DWORD entryLength;
LPSTR schemeName;
DWORD schemeLength;
LPSTR serverName;
DWORD serverLength;
PARSER_STATE state;
DWORD nSlashes;
INTERNET_PORT port;
BOOL done;
entryLength = 0;
schemeName = lpszList;
schemeLength = 0;
serverName = NULL;
serverLength = 0;
state = STATE_SCHEME;
nSlashes = 0;
port = 0;
done = FALSE;
//
// walk the list, pulling out the various scheme parts
//
do {
char ch = *lpszList++;
if ((nSlashes == 1) && (ch != '/')) {
state = STATE_ERROR;
break;
}
switch (ch) {
case ':':
switch (state) {
case STATE_SCHEME:
if (*lpszList == '/') {
schemeLength = entryLength;
} else if (*lpszList != '\0') {
serverName = schemeName;
serverLength = entryLength;
if (serverLength == 0) {
serverLength = 1;
serverName = "*";
}
state = STATE_PORT;
} else {
state = STATE_ERROR;
}
entryLength = 0;
break;
case STATE_SERVER:
serverLength = entryLength;
state = STATE_PORT;
entryLength = 0;
break;
default:
state = STATE_ERROR;
break;
}
break;
case '/':
if ((state == STATE_SCHEME) && (nSlashes < 2) && (entryLength == 0)) {
if (++nSlashes == 2) {
state = STATE_SERVER;
serverName = lpszList;
}
} else {
state = STATE_ERROR;
}
break;
default:
if (state != STATE_PORT) {
++entryLength;
} else if (isdigit(ch)) {
//
// BUGBUG - we will overflow if >65535
//
port = port * 10 + (ch - '0');
} else {
//
// STATE_PORT && non-digit character - error
//
state = STATE_ERROR;
}
break;
case '\0':
done = TRUE;
//
// fall through
//
case '\t':
case '\n':
case '\v': // vertical tab, 0x0b
case '\f': // form feed, 0x0c
case '\r':
case ' ':
case ';':
case ',':
if (serverLength == 0) {
serverLength = entryLength;
if ((serverLength == 0)
&& ((state == STATE_SERVER) || (state == STATE_PORT))) {
//
// we found e.g. "http://" or "http://:80". We allow this as
// "http://*" or "http://*:80"
//
serverLength = 1;
serverName = "*";
}
}
if (serverLength != 0) {
if (serverName == NULL) {
serverName = schemeName;
}
INTERNET_SCHEME scheme;
if (schemeLength != 0) {
scheme = MapUrlSchemeName(schemeName, schemeLength);
} else {
scheme = INTERNET_SCHEME_DEFAULT;
}
//
// add an entry if this is a protocol we handle and we don't
// already have an entry for it
//
if ((scheme != INTERNET_SCHEME_UNKNOWN)
&& !Find(scheme, serverName, serverLength, port)) {
//
// don't worry if Add() fails - we just continue
//
Add(scheme, serverName, serverLength, port);
}
}
entryLength = 0;
schemeName = lpszList;
schemeLength = 0;
serverName = NULL;
serverLength = 0;
nSlashes = 0;
port = 0;
state = STATE_SCHEME;
break;
}
if (state == STATE_ERROR) {
break;
}
} while (!done);
DWORD error;
if (state == STATE_ERROR) {
error = ERROR_INVALID_PARAMETER;
} else {
error = ERROR_SUCCESS;
}
DEBUG_LEAVE(error);
return error;
}
BOOL
PROXY_BYPASS_LIST::Find(
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName OPTIONAL,
IN DWORD dwHostNameLength,
IN INTERNET_PORT nPort
)
/*++
Routine Description:
Determines if a proxy bypass entry matches the criteria.
Currently, name matching is simplistic: e.g. "*.com" and "**.com" are
treated as 2 separate strings, where we should collapse multiple wildcard
specifiers, etc. Also: "w*" should replace "ww*", etc.
Arguments:
tScheme - scheme for this entry
lpszHostName - host name or address. May contain wildcards (*)
dwHostNameLength - length of host name or address
nPort - port
Return Value:
BOOL
TRUE - an entry corresponding to the arguments was found
FALSE - didn't find entry
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_BYPASS_LIST::Find",
"%s, %.*q, %d, %d",
InternetMapScheme(tScheme),
dwHostNameLength,
lpszHostName,
dwHostNameLength,
nPort
));
BOOL isLocal = IsLocalMacro(lpszHostName, dwHostNameLength);
BOOL found = FALSE;
if (!LockSerializedList(&_List))
goto quit;
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_BYPASS_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_BYPASS_LIST_ENTRY, _List);
//
// do the easy bits first
//
if (!((info->_Scheme == tScheme)
|| (info->_Scheme == INTERNET_SCHEME_DEFAULT))) {
continue;
}
if (!((info->_Port == nPort)
|| (info->_Port == INTERNET_INVALID_PORT_NUMBER))) {
continue;
}
//
// check for name match
//
if (info->_LocalSemantics) {
if (isLocal) {
found = TRUE;
break;
} else {
continue;
}
}
//
// not local semantics, have to match target
//
//
// BUGBUG - we only do simplistic matching. If the strings don't match
// exactly, except for case, they are deemed to be different
//
if (info->_Name.Strnicmp(lpszHostName, (int)dwHostNameLength) != 0) {
continue;
}
//
// any path that didn't continue, or has not already broken out has
// succeeded in finding a match
//
DEBUG_PRINT(PROXY,
INFO,
("Matched: %q, %q\n",
lpszHostName,
info->_Name.StringAddress()
));
found = TRUE;
break;
}
UnlockSerializedList(&_List);
quit:
DEBUG_LEAVE(found);
return found;
}
DWORD
PROXY_BYPASS_LIST::Add(
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName,
IN DWORD dwHostNameLength,
IN INTERNET_PORT nPort
)
/*++
Routine Description:
Create and add a PROXY_BYPASS_LIST_ENTRY to the PROXY_BYPASS_LIST
Arguments:
tScheme - scheme to bypass. May be 0 meaning any protocol
lpszHostName - name of host to bypass. May be name or IP address and
may contain wildcard characters
dwHostNameLength - length of bypass name string
nPort - port to bypass. May be 0, meaning any port
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_NOT_ENOUGH_MEMORY
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_BYPASS_LIST::Add",
"%s, %.*q, %d, %d",
InternetMapScheme(tScheme),
dwHostNameLength,
lpszHostName,
dwHostNameLength,
nPort
));
PROXY_BYPASS_LIST_ENTRY * entry;
entry = New PROXY_BYPASS_LIST_ENTRY(tScheme,
lpszHostName,
dwHostNameLength,
nPort
);
DWORD error = ERROR_SUCCESS;
if (entry != NULL) {
//
// if the bypass entry uses local name matching semantics, then we add
// it to the end of the list, else the head. The reason we do this is
// to allow <local> to be a default after all other (possibly also
// local) entries are checked
//
if (entry->IsLocal()) {
if (!InsertAtTailOfSerializedList(&_List, &entry->_List)) {
delete entry;
error = ERROR_NOT_ENOUGH_MEMORY;
}
} else {
if (!InsertAtHeadOfSerializedList(&_List, &entry->_List)) {
delete entry;
error = ERROR_NOT_ENOUGH_MEMORY;
}
}
} else {
error = ERROR_NOT_ENOUGH_MEMORY;
}
DEBUG_LEAVE(error);
return error;
}
BOOL
PROXY_BYPASS_LIST::IsBypassed(
IN INTERNET_HANDLE_OBJECT* pSessionObject,
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName,
IN DWORD dwHostNameLength,
IN INTERNET_PORT nPort
)
/*++
Routine Description:
Determines if a scheme/name/port is bypassed
Arguments:
tScheme - can be 0, meaning match any scheme
lpszHostName - can contain wildcards. May be name or IP address
dwHostNameLength - length of name/address part. May be 0, meaning match
any name/address
nPort - can be 0, meaning match any port
Return Value:
BOOL
TRUE - an entry on the bypass list matched the criteria
FALSE - the host identified by the parameters is not on this bypass
list
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_BYPASS_LIST::IsBypassed",
"%s, %.*q, %d, %d",
InternetMapScheme(tScheme),
dwHostNameLength,
lpszHostName,
dwHostNameLength,
nPort
));
INET_ASSERT(lpszHostName != NULL);
INET_ASSERT(dwHostNameLength != 0);
//
// determine if what we were given is an address, in which case we don't
// perform <local> semantics matching
//
BOOL isAddress = FALSE;
LPSTR mappedName = NULL;
LPSTR allocedName = NULL;
if (dwHostNameLength <= MAX_IP_ADDRESS_STRING_LENGTH) {
char addressBuffer[MAX_IP_ADDRESS_STRING_LENGTH + 1];
//
// make the host name/address an ASCIIZ string
//
memcpy((LPVOID)addressBuffer, (LPVOID)lpszHostName, dwHostNameLength);
addressBuffer[dwHostNameLength] = '\0';
if (_I_inet_addr(addressBuffer) != INADDR_NONE) {
//
// looks like we were given an IP address
//
//
// maybe this is the IP address of a known server (in cache)
//
mappedName = MapNetAddressToName(pSessionObject, addressBuffer, &allocedName);
if (mappedName == addressBuffer) {
//
// BUGBUG - transport independence?
//
isAddress = TRUE;
} else {
lpszHostName = mappedName;
dwHostNameLength = lstrlen(lpszHostName);
}
}
}
BOOL found;
found = IsHostInBypassList (
tScheme,
lpszHostName,
dwHostNameLength,
nPort,
isAddress);
if (allocedName != NULL) {
allocedName = (LPSTR)FREE_MEMORY(allocedName);
INET_ASSERT(allocedName == NULL);
}
DEBUG_LEAVE(found);
return found;
}
BOOL
PROXY_BYPASS_LIST::IsHostInBypassList(
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName,
IN DWORD dwHostNameLength,
IN INTERNET_PORT nPort,
IN BOOL isAddress
)
/*++
Routine Description:
description-of-function.
Arguments:
tScheme -
lpszHostName -
dwHostNameLength -
nPort -
isAddress -
Return Value:
BOOL
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_BYPASS_LIST::IsHostInBypassList",
"%d (%s), %.*q, %d, %d, %B",
tScheme,
InternetMapScheme(tScheme),
dwHostNameLength,
lpszHostName,
dwHostNameLength,
nPort,
isAddress
));
BOOL found = FALSE;
//
// if not an address, determine if the name contains at least one dot
//
BOOL isDot;
if (!isAddress) {
isDot = FALSE;
for (DWORD i = 0; i < dwHostNameLength; ++i) {
if (lpszHostName[i] == '.') {
isDot = TRUE;
break;
}
}
} else {
//
// addresses have dots
//
isDot = TRUE;
}
if (!LockSerializedList(&_List))
goto quit;
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_BYPASS_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_BYPASS_LIST_ENTRY, _List);
//
// do the easy bits first
//
if (!((info->_Scheme == tScheme)
|| (info->_Scheme == INTERNET_SCHEME_DEFAULT))) {
continue;
}
if (!((info->_Port == nPort)
|| (info->_Port == INTERNET_INVALID_PORT_NUMBER))) {
continue;
}
//
// check local semantics
//
if (info->_LocalSemantics) {
if (!isDot) {
DEBUG_PRINT(PROXY,
INFO,
("%q matched by <local>\n",
lpszHostName
));
found = TRUE;
//
// <local> is in the bypass list and the name does not contain a
// dot. It bypasses the proxy
//
break;
} else {
//
// the name contains a dot, but it may be matched by another
// proxy bypass entry
//
continue;
}
}
//
// check for name match. Note that we take no special action if the host
// name contains wildcard characters
//
LPSTR target = info->_Name.StringAddress();
//
// NULL target name matches any server name/address
//
if (target != NULL) {
DEBUG_PRINT(PROXY,
INFO,
("trying to match %q with %q\n",
lpszHostName,
target
));
DWORD i = 0;
DWORD j = 0;
DWORD i_back = (DWORD)-1;
while ((target[i] != '\0') && (j < dwHostNameLength)) {
if (target[i] == tolower(lpszHostName[j])) {
++i;
++j;
} else if (target[i] == '*') {
while (target[i + 1] == '*') {
++i;
}
i_back = i;
++i;
while ((tolower(lpszHostName[j]) != target[i])
&& (j < dwHostNameLength)) {
++j;
}
} else if (i_back != (DWORD)-1) {
//
// '*' is greedy closure. We already saw a '*' but later we
// discovered a mismatch. We will go back and try to eat as
// many characters as we can till the next match, or we hit
// the end of the string
//
i = i_back;
} else {
//
// no match; quit
//
j = 0;
break;
}
//
// if we reached the end of the target, but not the host name
// AND we already met a '*' then back up
//
if ((target[i] == '\0')
&& (j != dwHostNameLength)
&& (i_back != (DWORD)-1)) {
i = i_back;
}
}
//
// if we hit the end of the host name while matching any character,
// bump the target to the next non-star character
//
while (target[i] == '*') {
++i;
}
//
// the host name matched if we reached the end of the target and end
// of the host name
//
if (!((target[i] == '\0') && (j == dwHostNameLength))) {
continue;
}
}
//
// any path that didn't continue, or has not already broken out has
// succeeded in finding a match
//
DEBUG_PRINT(PROXY,
INFO,
("Matched: %q, %q\n",
lpszHostName,
target
));
found = TRUE;
break;
}
UnlockSerializedList(&_List);
//
// "localhost", "loopback" and "127.0.0.1" always bypass proxy
//
if (!found)
{
if ((strnicmp(lpszHostName, "localhost", dwHostNameLength) == 0) ||
(strnicmp(lpszHostName, "loopback", dwHostNameLength) == 0))
{
found = TRUE;
}
else //
// if the host name length is of reasonable size, it may represent
// the IP address of loopback (127.0.0.1 or its variations).
//
if (dwHostNameLength < 16)
{
static ULONG ipAddr127_0_0_1 = INADDR_NONE;
char szHostName[16];
INET_ASSERT(dwHostNameLength < 16);
lstrcpyn(szHostName,
lpszHostName,
(dwHostNameLength + 1) // must add in "+1" for the NULL char
);
//
// convert "127.0.0.1" to a DWORD once, and save it.
//
if (ipAddr127_0_0_1 == INADDR_NONE)
{
ipAddr127_0_0_1 = _I_inet_addr("127.0.0.1");
INET_ASSERT(ipAddr127_0_0_1 != INADDR_NONE);
}
found = (_I_inet_addr(szHostName) == ipAddr127_0_0_1);
}
}
quit:
DEBUG_LEAVE(found);
return found;
}
VOID
PROXY_BYPASS_LIST::GetList(
OUT LPSTR * lplpszList,
IN DWORD dwBufferLength,
IN OUT LPDWORD lpdwRequiredLength
)
/*++
Routine Description:
Writes the list of proxy bypass servers to a buffer, and/or returns the
required buffer length
Arguments:
lplpszList - pointer to pointer to buffer where list is written, if
sufficient space
dwBufferLength - amount of space in *lplpszList
lpdwRequiredLength - OUT: cumulative size of data
Return Value:
None.
--*/
{
LPSTR lpszList = *lplpszList;
BOOL firstTime = TRUE;
BOOL outOfBuffer = FALSE;
if (!LockSerializedList(&_List))
return;
for (PLIST_ENTRY entry = HeadOfSerializedList(&_List);
entry != (PLIST_ENTRY)SlSelf(&_List);
entry = entry->Flink) {
PROXY_BYPASS_LIST_ENTRY * info;
info = CONTAINING_RECORD(entry, PROXY_BYPASS_LIST_ENTRY, _List);
if (!firstTime) {
//
// write delimiter if enough space
//
if (dwBufferLength >= 1) {
*lpszList++ = ' ';
--dwBufferLength;
}
++*lpdwRequiredLength;
} else {
firstTime = FALSE;
}
//
// find the length of the current entry & write it to the buffer if
// enough space
//
DWORD length = dwBufferLength;
info->WriteEntry(lpszList, &length);
if (dwBufferLength >= length) {
//
// we wrote it
//
dwBufferLength -= length;
} else {
//
// no buffer left
//
dwBufferLength = 0;
outOfBuffer = TRUE;
}
*lpdwRequiredLength += length;
lpszList += length;
}
if (!outOfBuffer) {
if (dwBufferLength > 0) {
*lpszList++ = '\0';
*lplpszList = lpszList;
}
}
//
// add 1 for the terminating NUL
//
++*lpdwRequiredLength;
UnlockSerializedList(&_List);
}
//
// PROXY_INFO - methods are defined below
//
VOID
PROXY_INFO::InitializeProxySettings(
VOID
)
/*++
Routine Description:
Initalizes Proxy_Info objects
Arguments:
None.
Return Value:
None.
--*/
{
_ProxyServerList = NULL;
_ProxyBypassList = NULL;
_fDisableDirect = FALSE;
_fModifiedInProcess = FALSE;
_Lock.Initialize();
_Error = _Lock.IsInitialized()
? ERROR_SUCCESS
: ERROR_WINHTTP_INTERNAL_ERROR;
}
VOID
PROXY_INFO::TerminateProxySettings(
VOID
)
/*++
Routine Description:
Cleans up and destroys Proxy_Info objects
Arguments:
None.
Return Value:
None.
--*/
{
//DEBUG_ENTER((DBG_OBJECTS,
// None,
// "PROXY_INFO::TerminateProxySettings",
// NULL
// ));
Lock(TRUE);
CleanOutLists();
Unlock();
//DEBUG_LEAVE(0);
}
DWORD
PROXY_INFO::SetProxySettings(
IN LPINTERNET_PROXY_INFO_EX lpProxySettings,
IN BOOL fModifiedInProcess
)
/*++
Routine Description:
Sets the proxy info. Either creates new proxy server and bypass lists, or
removes them (proxy to direct)
Assumes: 1. The parameters have already been validated in the API that calls
this method (i.e. InternetOpen(), InternetSetOption())
Arguments:
lpProxySettings - a set of relevent fields describing proxy settings
fModifiedInProcess - TRUE, if this object keeps a seperate set of values from those
stored in the registry store
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
The lpszProxy or lpszProxyBypass list was bad
ERROR_NOT_ENOUGH_MEMORY
Failed to create an object or allocate space for a list,
etc.
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO::SetProxySettings",
"%x, %B",
lpProxySettings,
fModifiedInProcess
));
//
// parameters should already be validated by caller
//
BOOL newList;
BOOL possibleNewAutoProxy;
LPCTSTR serverList;
LPCTSTR bypassList;
DWORD error = ERROR_SUCCESS;
serverList = NULL;
bypassList = NULL;
newList = FALSE;
_fModifiedInProcess = fModifiedInProcess;
_dwSettingsVersion = lpProxySettings->dwCurrentSettingsVersion;
UPDATE_GLOBAL_PROXY_VERSION();
if ( lpProxySettings->dwFlags & PROXY_TYPE_PROXY )
{
serverList = lpProxySettings->lpszProxy;
bypassList = lpProxySettings->lpszProxyBypass;
if (serverList != NULL) {
newList = TRUE;
}
}
//
// about to start changing contents - acquire lock
//
Lock(TRUE);
// remember disable direct flag...
SetDisableDirect( (lpProxySettings->dwFlags & PROXY_TYPE_DIRECT) ? FALSE : TRUE );
//
// clear out current contents,
//
CleanOutLists();
//
// Set the Static Proxy Lists
//
if (newList)
{
INET_ASSERT((serverList != NULL) && (*serverList != 0));
_ProxyServerList = New PROXY_SERVER_LIST(serverList);
_ProxyBypassList = New PROXY_BYPASS_LIST(bypassList);
if ((_ProxyServerList != NULL) && (_ProxyBypassList != NULL)) {
_Error = _ProxyServerList->GetError();
if (_Error == ERROR_SUCCESS) {
_Error = _ProxyBypassList->GetError();
if (_Error == ERROR_SUCCESS) {
//
// add all proxy servers to bypass list
//
_ProxyServerList->AddToBypassList(_ProxyBypassList);
}
}
} else {
_Error = ERROR_NOT_ENOUGH_MEMORY;
CleanOutLists();
}
error = _Error;
}
//
// other threads free to access this PROXY_INFO again
//
Unlock();
DEBUG_LEAVE(error);
return error;
}
DWORD
PROXY_INFO::GetProxySettings(
OUT LPINTERNET_PROXY_INFO_EX lpProxySettings,
IN BOOL fCheckVersion = FALSE
)
/*++
Routine Description:
Gets the proxy info.
Assumes: 1. The parameters have already been validated in the API that calls
this method (i.e. InternetOpen(), InternetSetOption())
Arguments:
lpProxySettings - a set of relevent fields describing proxy settings
fCheckVersion - ignored
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure -
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO::GetProxySettings",
"%x, %B",
lpProxySettings,
fCheckVersion
));
DWORD error = ERROR_SUCCESS;
if ( fCheckVersion == TRUE )
{
INET_ASSERT(FALSE);
error = ERROR_INVALID_PARAMETER;
goto quit;
}
//
// about to start reading contents - acquire lock
//
Lock(FALSE);
if ( ! IsDisableDirect() ) {
lpProxySettings->dwFlags |= PROXY_TYPE_DIRECT;
}
if ( IsProxySettingsConfigured() )
{
lpProxySettings->dwFlags |= PROXY_TYPE_PROXY;
lpProxySettings->lpszProxy = _ProxyServerList->CopyString();
lpProxySettings->lpszProxyBypass = _ProxyBypassList->CopyString();
if ( lpProxySettings->lpszProxy == NULL ||
lpProxySettings->lpszProxyBypass == NULL )
{
error = ERROR_NOT_ENOUGH_MEMORY;
}
}
//
// other threads free to access this PROXY_INFO again
//
Unlock();
quit:
DEBUG_LEAVE(error);
return error;
}
DWORD
PROXY_INFO::RefreshProxySettings(
IN BOOL fForceRefresh
)
/*++
Routine Description:
Refreshes the Proxy Information
This doesn't make sense on PROXY_INFO, nothing done
Arguments:
fForceRefresh - forces a resync of all settings, turning this on slows things down
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure -
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO::RefreshProxySettings",
"%B",
fForceRefresh
));
DEBUG_LEAVE(ERROR_SUCCESS);
return ERROR_SUCCESS;
}
DWORD
PROXY_INFO::QueryProxySettings(
IN AUTO_PROXY_ASYNC_MSG **ppQueryForProxyInfo
)
/*++
Routine Description:
Determines what proxy type, proxy name, and port the caller should use
given an Url, its length, a target host, a target port, and output space
to store the result.
The result may be a complete string containing a Netscape style string with
a delimited set of proxies, and access methods. An example of this may
look like:
"PROXY itgproxy:80; PROXY proxy:80; PROXY 192.168.100.2:1080; SOCKS 192.168.100.2; DIRECT"
This means we must try itgproxy, if this proxy fails we go on to proxy, and on to 192.168.100.2, etc.
Note that if itgproxy, proxy, and 192.168.100.2 all fail we can try a SOCKS proxy, and if this fails we
can try a direct connection.
If there is an external proxy DLL registered and valid, we defer to it to decide
what proxy to use, and thus ignore internal proxy information.
Note this function can also be used to retrive mapping of protocol to proxy. For example,
if tUrlProtocol == INTERNET_SCHEME_FTP, the result *lptProxyScheme == INTERNET_SCHEME_SOCKS
which means we should use a socks proxy/firewall for FTP accesss.
Arguments:
tScheme - can be 0, meaning match any scheme
lpszHostName - can contain wildcards. May be name or IP address
nPort - can be 0, meaning match any port
pfAutoProxy - TRUE if an auto-proxy is being used.
Return Value:
BOOL
TRUE - an entry on the bypass list matched the criteria
FALSE - the host identified by the parameters is not on this bypass
list
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO::QueryProxySettings",
"%#X",
ppQueryForProxyInfo
));
AUTO_PROXY_ASYNC_MSG *pQueryForProxyInfo = *ppQueryForProxyInfo;
INTERNET_SCHEME tProxyScheme = pQueryForProxyInfo->_tUrlProtocol;
BOOL fIsByPassed = FALSE;
BOOL fProxyConnect = FALSE;
DWORD error = ERROR_SUCCESS;
Lock(FALSE);
if (!IsProxySettingsConfigured()) // virtual func, perhaps replace with faster internal?
{
fProxyConnect = FALSE;
goto quit;
}
//
// Ok, if we're here we are NOT using the Auto-Proxy DLL.
// 1. Determine if we are Bypassed ( and thus prevented from using a proxy )
// 2. Map the Protocol to a Proxy type.
// 3. Grab the hostname of the proxy we wish to use.
//
if ( pQueryForProxyInfo->_lpszUrlHostName && pQueryForProxyInfo->_dwUrlHostNameLength > 0 )
{
fIsByPassed = IsBypassed(
pQueryForProxyInfo->_tUrlProtocol,
pQueryForProxyInfo->_lpszUrlHostName,
pQueryForProxyInfo->_dwUrlHostNameLength,
pQueryForProxyInfo->_nUrlPort
);
if ( fIsByPassed )
{
goto quit;
}
}
pQueryForProxyInfo->_tProxyScheme = ProxyScheme(pQueryForProxyInfo->_tUrlProtocol);
if ( pQueryForProxyInfo->_tProxyScheme == INTERNET_SCHEME_UNKNOWN )
{
pQueryForProxyInfo->_tProxyScheme = INTERNET_SCHEME_SOCKS;
pQueryForProxyInfo->_tUrlProtocol = INTERNET_SCHEME_SOCKS;
}
if (pQueryForProxyInfo->_bFreeProxyHostName
&& (pQueryForProxyInfo->_lpszProxyHostName != NULL)) {
FREE_MEMORY(pQueryForProxyInfo->_lpszProxyHostName);
}
fProxyConnect = GetProxyHostName(
pQueryForProxyInfo->_tUrlProtocol,
&(pQueryForProxyInfo->_tProxyScheme),
&(pQueryForProxyInfo->_lpszProxyHostName),
&(pQueryForProxyInfo->_bFreeProxyHostName),
&(pQueryForProxyInfo->_dwProxyHostNameLength),
&(pQueryForProxyInfo->_nProxyHostPort)
);
quit:
pQueryForProxyInfo->_dwQueryResult = (DWORD) fProxyConnect;
//
// If we've disabled direct connections, then fail
// when there is no proxy
//
if ( !fProxyConnect && IsDisableDirect() ) {
error = ERROR_WINHTTP_CANNOT_CONNECT;
}
Unlock();
DEBUG_LEAVE(error);
return error;
}
DWORD
PROXY_INFO::GetProxyStringInfo(
OUT LPVOID lpBuffer,
IN OUT LPDWORD lpdwBufferLength
)
/*++
Routine Description:
IMPORTANT PLEASE READ: LEGACY FUNCTION, this does not support all the new
proxy behaviors, left here for Wininet compat with older programs
Returns the proxy server and bypass lists in an INTERNET_PROXY_INFO. Called
by InternetQueryOption(WINHTTP_OPTION_PROXY)
Assumes: Access to this is serialized while we are getting this info
Arguments:
lpBuffer - pointer to buffer where information will be returned
lpdwBufferLength - IN: size of lpBuffer in BYTEs
OUT: number of BYTEs returned in lpBuffer
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INSUFFICIENT_BUFFER
*lpdwBufferLength contains the required buffer length
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO::GetProxyStringInfo",
"%#x, %#x [%d]",
lpBuffer,
lpdwBufferLength,
*lpdwBufferLength
));
DEBUG_PRINT(PROXY,
INFO,
("Calling Legacy GetProxyStringInfo, NEW CODE SHOULD AVOID THIS CODE PATH\n"
));
DWORD requiredSize = sizeof(WINHTTP_PROXY_INFOA);
LPSTR lpVariable = (LPSTR)(((WINHTTP_PROXY_INFOA *)lpBuffer) + 1);
LPSTR lpszProxy;
Lock(FALSE);
if (_ProxyServerList != NULL) {
lpszProxy = lpVariable;
_ProxyServerList->GetList(&lpVariable,
(*lpdwBufferLength > requiredSize)
? (*lpdwBufferLength - requiredSize)
: 0,
&requiredSize
);
} else {
lpszProxy = NULL;
}
LPSTR lpszProxyBypass;
if (_ProxyBypassList != NULL) {
DWORD size = requiredSize;
lpszProxyBypass = lpVariable;
_ProxyBypassList->GetList(&lpVariable,
(*lpdwBufferLength > requiredSize)
? (*lpdwBufferLength - requiredSize)
: 0,
&requiredSize
);
if (requiredSize == size) {
lpszProxyBypass = NULL;
}
} else {
lpszProxyBypass = NULL;
}
DWORD error;
if (*lpdwBufferLength >= requiredSize) {
LPINTERNET_PROXY_INFO lpInfo = (LPINTERNET_PROXY_INFO)lpBuffer;
lpInfo->dwAccessType = (lpszProxy == NULL)
? INTERNET_OPEN_TYPE_DIRECT
: INTERNET_OPEN_TYPE_PROXY;
lpInfo->lpszProxy = lpszProxy;
lpInfo->lpszProxyBypass = lpszProxyBypass;
error = ERROR_SUCCESS;
} else {
error = ERROR_INSUFFICIENT_BUFFER;
}
*lpdwBufferLength = requiredSize;
Unlock();
DEBUG_LEAVE(error);
return error;
}
BOOL
PROXY_INFO::RedoSendRequest(
IN OUT LPDWORD lpdwError,
IN DWORD dwSecureStatus,
IN AUTO_PROXY_ASYNC_MSG *pQueryForProxyInfo,
IN CServerInfo *pOriginServer,
IN CServerInfo *pProxyServer
)
/*++
Routine Description:
Determines whether a connection needs to be retried do to a failed proxy.
Arguments:
lpdwError - Error code of connection.
pProxyState - Pointer to proxy_state returned when acquiring the proxy information.
Return Value:
LPSTR
Success - pointer to allocated buffer
Failure - NULL
--*/
{
DEBUG_ENTER((DBG_PROXY,
Bool,
"PROXY_INFO::RedoSendRequest",
"%#x [%d, %d], %#x",
lpdwError,
lpdwError ? *lpdwError : 0,
dwSecureStatus,
pQueryForProxyInfo
));
BOOL fReturn = FALSE;
PROXY_STATE *pProxyState = NULL;
DWORD dwVersion;
LPSTR lpszConnection;
BOOL fCanCache = FALSE;
if ( pQueryForProxyInfo )
{
pProxyState = pQueryForProxyInfo->_pProxyState;
//
// On success,
//
if ( *lpdwError == ERROR_SUCCESS )
{
if ( pQueryForProxyInfo->IsCanCacheResult() &&
pProxyState &&
pOriginServer &&
pProxyServer )
{
pOriginServer->SetCachedProxyServerInfo(
pProxyServer,
pQueryForProxyInfo->GetVersion(),
pQueryForProxyInfo->IsUseProxy(),
pQueryForProxyInfo->_tUrlProtocol,
pQueryForProxyInfo->_nUrlPort,
pQueryForProxyInfo->_tProxyScheme,
pQueryForProxyInfo->_nProxyHostPort
);
}
}
else if ( *lpdwError != ERROR_SUCCESS &&
*lpdwError != ERROR_WINHTTP_OPERATION_CANCELLED &&
(*lpdwError != ERROR_WINHTTP_SECURE_FAILURE ||
dwSecureStatus & ~(WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA |
WINHTTP_CALLBACK_STATUS_FLAG_CERT_DATE_INVALID |
WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID |
WINHTTP_CALLBACK_STATUS_FLAG_SECURITY_CHANNEL_ERROR |
WINHTTP_CALLBACK_STATUS_FLAG_CERT_REVOKED |
WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED)) &&
*lpdwError != ERROR_WINHTTP_CLIENT_AUTH_CERT_NEEDED )
{
//
// For backround detection, we need to retry
// waiting for the backround results to complete
//
// Otherwise, If we have additional proxies,
// we need to retry them as well.
//
if ( pQueryForProxyInfo->IsBackroundDetectionPending() )
{
*lpdwError = ERROR_SUCCESS;
fReturn = TRUE;
}
else if ( pProxyState &&
!pProxyState->IsEmpty() &&
pProxyState->IsAnotherProxyAvail() )
{
INTERNET_PORT LastProxyUsedPort;
LPSTR lpszLastProxyUsed = pProxyState->GetLastProxyUsed(&LastProxyUsedPort);
Lock(FALSE);
if ( ( lpszLastProxyUsed == NULL ) ||
_BadProxyList.AddEntry(lpszLastProxyUsed, LastProxyUsedPort) != ERROR_SUCCESS )
{
fReturn = FALSE;
}
else
{
*lpdwError = ERROR_SUCCESS;
fReturn = TRUE;
}
Unlock();
}
}
}
DEBUG_LEAVE(fReturn);
return fReturn;
}
VOID PROXY_INFO::SetSessionObject(INTERNET_HANDLE_OBJECT * pSessionObject)
{
INET_ASSERT(pSessionObject->GetHandleType() == TypeInternetHandle);
_pSessionObject = pSessionObject;
}
VOID
PROXY_INFO::CleanOutLists(
VOID
)
/*++
Routine Description:
Delete proxy server and bypass lists if not empty
N.B. Exclusive lock MUST be acquired before calling this method
Arguments:
None.
Return Value:
None.
--*/
{
DEBUG_ENTER((DBG_PROXY,
None,
"PROXY_INFO::CleanOutLists",
NULL
));
if (_ProxyServerList != NULL) {
delete _ProxyServerList;
_ProxyServerList = NULL;
}
if (_ProxyBypassList != NULL) {
delete _ProxyBypassList;
_ProxyBypassList = NULL;
}
DEBUG_LEAVE(0);
}
//
// PROXY_INFO_GLOBAL - Global Object thats inherits and expands the basic functionality
// of basic PROXY_INFO behavior. The new functionality includes wrapping Auto-Proxy
/// and Auto-detection routines
//
VOID
PROXY_INFO_GLOBAL::TerminateProxySettings(
VOID
)
/*++
Routine Description:
Destroy PROXY_INFO_GLOBAL object
Arguments:
None.
Return Value:
None.
--*/
{
PROXY_INFO::TerminateProxySettings();
}
DWORD
PROXY_INFO_GLOBAL::SetProxySettings(
IN LPINTERNET_PROXY_INFO_EX lpProxySettings,
IN BOOL fModifiedInProcess
)
/*++
Routine Description:
Sets the proxy info. Mainly handles Auto-Config, its decendent will handle static stuff
Assumes: 1. The parameters have already been validated in the API that calls
this method (i.e. InternetOpen(), InternetSetOption())
Arguments:
lpProxySettings - a set of relevent fields describing proxy settings
fModifiedInProcess - TRUE if this object is not from the registry, but
a modifed setting for this process (that overrides reg values)
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
The lpszProxy or lpszProxyBypass list was bad
ERROR_NOT_ENOUGH_MEMORY
Failed to create an object or allocate space for a list,
etc.
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO_GLOBAL::SetProxySettings",
"%x, %B",
lpProxySettings,
fModifiedInProcess
));
DWORD error = ERROR_SUCCESS;
//
// about to start changing contents - acquire lock
//
Lock(TRUE);
//
// Once we're set to Modified, we're modified for the lifetime of the
// the process, and thus we no longer accept Registry settings
//
if ( IsModifiedInProcess() &&
!fModifiedInProcess )
{
error = ERROR_SUCCESS;
goto quit;
}
if ( _lpszConnectionName != NULL ) {
FREE_MEMORY(_lpszConnectionName);
}
_lpszConnectionName = lpProxySettings->lpszConnectionName ?
NewString(lpProxySettings->lpszConnectionName) :
NULL;
_dwProxyFlags = lpProxySettings->dwFlags;
//
// Set the Static Proxy Lists
//
error = PROXY_INFO::SetProxySettings(lpProxySettings, fModifiedInProcess);
quit:
//
// other threads free to access this PROXY_INFO again
//
Unlock();
DEBUG_LEAVE(error);
return error;
}
DWORD
PROXY_INFO_GLOBAL::GetProxySettings(
IN LPINTERNET_PROXY_INFO_EX lpProxySettings,
IN BOOL fCheckVersion = FALSE
)
/*++
Routine Description:
Gather the proxy info. Mainly handles Auto-Config, its decendent will handle static stuff
Arguments:
lpProxySettings - a set of relevent fields describing proxy settings
fCheckVersion -
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
The lpszProxy or lpszProxyBypass list was bad
ERROR_NOT_ENOUGH_MEMORY
Failed to create an object or allocate space for a list,
etc.
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO_GLOBAL::GetProxySettings",
"%x, %B",
lpProxySettings,
fCheckVersion
));
//
// about to start reading contents - acquire lock
//
Lock(FALSE);
DWORD error = ERROR_SUCCESS;
lpProxySettings->lpszConnectionName =
_lpszConnectionName ?
NewString(_lpszConnectionName) :
NULL;
lpProxySettings->dwFlags = _dwProxyFlags;
//
// Get the Static Proxy Lists
//
error = PROXY_INFO::GetProxySettings(lpProxySettings, fCheckVersion);
//quit:
//
// other threads free to access this PROXY_INFO again
//
Unlock();
DEBUG_LEAVE(error);
return error;
}
DWORD
PROXY_INFO_GLOBAL::RefreshProxySettings(
IN BOOL fForceRefresh
)
/*++
Routine Description:
Force a refresh of automatic settings, such as auto-proxy, auto-detect
Arguments:
fForceRefresh - Forces a hard refresh
Return Value:
DWORD
Success - ERROR_SUCCESS
Failure - ERROR_INVALID_PARAMETER
The lpszProxy or lpszProxyBypass list was bad
ERROR_NOT_ENOUGH_MEMORY
Failed to create an object or allocate space for a list,
etc.
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO_GLOBAL::RefreshProxySettings",
"%B",
fForceRefresh
));
DWORD error = ERROR_SUCCESS;
Lock(FALSE);
//
// Force reload of registry settings and download of auto-proxy file from server
//
if ( IsRefreshDisabled())
{
QueueRefresh();
goto quit;
}
//
// Get the Static Proxy Lists
//
//error = PROXY_INFO::RefreshProxySettings(fForceRefresh);
quit:
//
// other threads free to access this PROXY_INFO again
//
Unlock();
DEBUG_LEAVE(error);
return error;
}
VOID
PROXY_INFO_GLOBAL::ReleaseQueuedRefresh(
VOID
)
/*++
Routine Description:
Force a refresh of automatic settings, such as auto-proxy, auto-detect,
When InternetOpen is called, allowing async threads.
Arguments:
None.
Return Value:
None.
--*/
{
DWORD error = ERROR_SUCCESS;
Lock(FALSE);
SetRefreshDisabled(FALSE);
if ( _fQueuedRefresh )
{
error = RefreshProxySettings(
FALSE
);
}
_fQueuedRefresh = FALSE;
//
// other threads free to access this PROXY_INFO again
//
Unlock();
}
DWORD
PROXY_INFO_GLOBAL::QueryProxySettings(
IN AUTO_PROXY_ASYNC_MSG **ppQueryForProxyInfo
)
/*++
Routine Description:
Aquries Proxy Information.
Note: if ppProxyState returns a non-NULL pointer than the Proxy
strings can be assumed to be allocated pointers to strings. Freeing
the ppProxyState object will result in the pointers being freed as well.
Otherwise the pointers will be to global string data that will not be
freed unexpectedly.
Arguments:
tUrlProtocol - Scheme type, protocol that is being used.
lpszUrl - Url being accessed.
dwUrlLength - size of Url.
lpszUrlHostName - Host name of site to connect to.
dwUrlHostNameLength - Host name length.
nUrlPort - Port of server to connect to.
lptProxyScheme - On output contains the correct proxy server type to use.
ex: if a SOCKS proxy is to be used to handle the FTP protocol,
this will be a INTERNET_SCHEME_SOCKS.
lplpszProxyHostName - Pointer to allocated memory containing the address of
the proxy host name.
Return Value:
LPSTR
Success - pointer to allocated buffer
Failure - NULL
--*/
{
DEBUG_ENTER((DBG_PROXY,
Dword,
"PROXY_INFO_GLOBAL::QueryProxySettings",
"%#x",
ppQueryForProxyInfo
));
INET_ASSERT(ppQueryForProxyInfo);
BOOL fReturn = FALSE;
DWORD error = ERROR_SUCCESS;
BOOL fNeedsGetNextProxy = FALSE;
BOOL fLocked = FALSE;
AUTO_PROXY_ASYNC_MSG *pQueryForProxyInfo = *ppQueryForProxyInfo;
//
// If we're dealing with a list of Proxies, we may have already tried one
// proxy and failed. So go to the next proxy in the list
// and see if another one is availble to try.
//
if ( pQueryForProxyInfo->IsProxyEnumeration() )
{
fNeedsGetNextProxy = TRUE;
goto quit;
}
if ( pQueryForProxyInfo->IsQueryOnCallback() &&
! pQueryForProxyInfo->IsAvoidAsyncCall())
{
goto quit;
}
Lock(FALSE);
fLocked = TRUE;
//
// Use normal Proxy infomation stored in the registry
//
error = PROXY_INFO::QueryProxySettings(&pQueryForProxyInfo);
if ( error != ERROR_SUCCESS)
{
goto quit;
}
quit:
if ( error == ERROR_SUCCESS &&
( fNeedsGetNextProxy ||
pQueryForProxyInfo->IsProxyEnumeration()) )
{
error = pQueryForProxyInfo->GetNextProxy(_BadProxyList);
}
if ( fLocked )
{
Unlock();
}
//fastquit:
DEBUG_LEAVE(error);
return error;
}
BOOL
PROXY_INFO_GLOBAL::HostBypassesProxy(
IN INTERNET_SCHEME tScheme,
IN LPSTR lpszHostName,
IN DWORD cchHostName
)
/*++
Routine Description:
Determine if request should bypass proxy for host
Arguments:
tScheme -
lpszHostName -
cchHostName -
Return Value:
BOOL
--*/
{
BOOL bReturn = FALSE;
DWORD dwServiceType;
BOOL bTryByPassList = TRUE;
// Only do this if it is for a scheme wininet supports.
if (tScheme == INTERNET_SCHEME_HTTP ||
tScheme == INTERNET_SCHEME_HTTPS ||
tScheme == INTERNET_SCHEME_DEFAULT)
{
dwServiceType = INTERNET_SERVICE_HTTP;
}
else
{
return bReturn;
}
// LOCK
Lock(FALSE);
if (bTryByPassList) {
bReturn = IsHostInBypassList(lpszHostName, cchHostName);
}
Unlock();
return bReturn;
}
//
// PROXY_STATE - an abstraction object used to provice simple string enumeration
// given a list of proxies that need to be tested
//
BOOL
PROXY_STATE::GetNextProxy(
IN INTERNET_SCHEME tUrlScheme,
IN BAD_PROXY_LIST & BadProxyList,
OUT LPINTERNET_SCHEME lptProxyScheme,
OUT LPSTR * lplpszProxyHostName,
OUT LPBOOL lpbFreeProxyHostName,
OUT LPDWORD lpdwProxyHostNameLength,
OUT LPINTERNET_PORT lpProxyHostPort
)
/*++
Routine Description:
Parses the current Proxy State information to acquire the
proxy name, port, type to use.
Arguments:
tUrlScheme - Scheme type, protocol that is being used.
BadProxyList - Reference to array of bad proxies that we can add/remove/check
from.
lptProxyScheme - On output contains the correct proxy server type to use.
ex: if a SOCKS proxy is to be used to handle the FTP protocol,
this will be a INTERNET_SCHEME_SOCKS.
lplpszProxyHostName - Pointer to allocated memory containing the address of
the proxy host name.
lpbFreeProxyHostName - TRUE if *lplpszProxyHostName was allocated
lpdwProxyHostNameLength - length of lplpszProxyHostName.
lpProxyHostPort - Host Port of Proxy.
Return Value:
LPSTR
Success - pointer to allocated buffer
Failure - NULL
--*/
{
LPSTR lpszDelimiter = NULL;
BOOL fReturn = FALSE;
LPSTR lpszPortDelim = NULL;
LPSTR lpszPort = NULL;
if ( !_fIsMultiProxyList )
{
*lptProxyScheme = _tProxyScheme;
*lplpszProxyHostName = _lpszAutoProxyList;
*lpbFreeProxyHostName = FALSE;
*lpdwProxyHostNameLength = _dwcbAutoProxyList;
*lpProxyHostPort = _proxyHostPort;
}
_fIsAnotherProxyAvail = FALSE;
while ( *_lpszOffset != '\0' )
{
LPSTR lpszNewOffset ;
//
// Remove the delimiter so we can see the next token.
// ex: PROXY foo:80; DIRECT
// we would find DIRECT first with strstr, if we didn't
// delimit first.
//
lpszDelimiter = strchr(_lpszOffset, ';' );
if ( lpszDelimiter == NULL )
{
lpszDelimiter = strchr(_lpszOffset, ',' );
}
if ( lpszDelimiter )
{
*lpszDelimiter = '\0';
}
lpszNewOffset=
strstr(_lpszOffset, "DIRECT");
if ( lpszNewOffset )
{
lpszNewOffset += sizeof("DIRECT");
_lpszOffset = lpszNewOffset;
//
// FALSE means direct.
//
fReturn = FALSE;
goto quit;
}
//
// Its not direct, try PROXY or SOCKS.
//
lpszNewOffset =
strstr(_lpszOffset, "PROXY");
if ( lpszNewOffset)
{
lpszNewOffset += sizeof("PROXY");
*lpProxyHostPort = INTERNET_DEFAULT_HTTP_PORT;
if ( tUrlScheme == INTERNET_SCHEME_HTTPS )
{
*lptProxyScheme = INTERNET_SCHEME_HTTPS;
}
else
{
*lptProxyScheme = INTERNET_SCHEME_HTTP;
}
}
else
{
lpszNewOffset =
strstr(_lpszOffset, "SOCKS");
if ( lpszNewOffset )
{
lpszNewOffset += sizeof("SOCKS");
*lptProxyScheme = INTERNET_SCHEME_SOCKS;
*lpProxyHostPort = INTERNET_DEFAULT_SOCKS_PORT;
}
}
//
// Now do the generic common things for SOCKS, or PROXY
// entries, ie: get port, hostname, and hostname size.
//
if ( lpszNewOffset )
{
_lpszOffset = lpszNewOffset;
SKIPWS(_lpszOffset);
*lplpszProxyHostName = _lpszOffset;
*lpbFreeProxyHostName = FALSE;
lpszPortDelim = strchr(_lpszOffset, ':');
if ( lpszPortDelim )
{
*lpszPortDelim = '\0';
lpszPort = lpszPortDelim+1;
*lpProxyHostPort = (INTERNET_PORT)
atoi(lpszPort);
}
*lpdwProxyHostNameLength = lstrlen(_lpszOffset);
if (BadProxyList.IsBadProxyName(*lplpszProxyHostName, *lpProxyHostPort))
{
if ( lpszDelimiter )
{
_lpszOffset = (lpszDelimiter+1);
}
else
{
_lpszOffset = _lpszAutoProxyList + _dwcbAutoProxyList;
}
continue;
}
fReturn = TRUE;
}
break;
}
quit:
//if ( lpszPortDelim )
//{
// *lpszPortDelim = ':';
//}
if ( lpszDelimiter )
{
*lpszDelimiter = ';';
_lpszOffset = (lpszDelimiter+1);
}
else
{
_lpszOffset = _lpszAutoProxyList + _dwcbAutoProxyList;
}
if ( fReturn )
{
_lpszLastProxyUsed = *lplpszProxyHostName;
_LastProxyUsedPort = *lpProxyHostPort;
//
// If theres another possible proxy in this list,
// then we'll need to remember that
//
if ( _lpszOffset &&
*_lpszOffset &&
(strstr(_lpszOffset, "PROXY") ||
strstr(_lpszOffset, "DIRECT") ||
strstr(_lpszOffset, "SOCKS"))
)
{
_fIsAnotherProxyAvail = TRUE;
}
}
return fReturn;
}
#ifndef WININET_SERVER_CORE
PRIVATE
LPSTR
GetRegistryProxyParameter(
IN LPSTR lpszParameterName
)
/*++
Routine Description:
Reads a string from the registry into a buffer, then shrinks the buffer
Arguments:
lpszParameterName - name of string to retrieve
Return Value:
LPSTR
Success - pointer to allocated buffer
Failure - NULL
--*/
{
LPSTR buffer = NULL;
DWORD length = PROXY_REGISTRY_STRING_LENGTH;
BOOL done = FALSE;
do {
buffer = (LPSTR)ResizeBuffer(buffer, length, FALSE);
if (done || (buffer == NULL)) {
break;
}
DWORD error;
error = InternetReadRegistryString(lpszParameterName, buffer, &length);
length = (error == ERROR_SUCCESS) ? ((length == 0) ? 0 : (length + 1)) : 0;
done = TRUE;
} while (TRUE);
return buffer;
}
#endif //!WININET_SERVER_CORE
//
// wrapper function for urlzones.
//
BOOLAPI IsHostInProxyBypassList (INTERNET_SCHEME tScheme, LPCSTR pszHost, DWORD cchHost)
{
BOOL fRet = FALSE;
if (!GlobalDataInitialized) {
GlobalDataInitialize();
}
if(ERROR_SUCCESS == LoadWinsock())
{
fRet = g_pGlobalProxyInfo->HostBypassesProxy(tScheme, (LPSTR)pszHost, cchHost);
}
return fRet;
}