Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / Orcas / QFE / wpf / src / Framework / MS / Internal / Controls / WebBrowserEvent.cs / 1 / WebBrowserEvent.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // // // // Description: // WebBrowserEvent is used to listen to the DWebBrowserEvent2 // of the webbrowser control // // Copied from WebBrowse.cs in winforms // // History // 04/17/05 KusumaV Created // 02/22/08 huwang Expose the WebBrowser control's navigation events // 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode // //----------------------------------------------------------------------------- using System; using System.ComponentModel; using System.Diagnostics; using System.Runtime.InteropServices; using System.Security; using System.Windows; using System.Text; using System.Windows.Navigation; using MS.Internal.PresentationFramework; using System.Windows.Controls; using MS.Win32; using MS.Internal.AppModel; using MS.Internal.Interop; //In order to avoid generating warnings about unknown message numbers and //unknown pragmas when compiling your C# source code with the actual C# compiler, //you need to disable warnings 1634 and 1691. (Presharp Documentation) #pragma warning disable 1634, 1691 namespace MS.Internal.Controls { ////// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose /// in partial trust--in principle. Having an object reference, partial-trust code would be able to /// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods /// are SecurityTreatAsSafe, this exposure concern is insignificant. /// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed /// across a security boundary. We must not allow a compromised low-integrity-level browser process to /// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this /// interface is not interesting, because the WebOC is directly accessible in the browser process.) /// [ClassInterface(ClassInterfaceType.None)] internal class WebBrowserEvent : InternalDispatchObject, UnsafeNativeMethods.DWebBrowserEvents2 { private WebBrowser _parent; /// /// Critical because the base class ctor is critical. /// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2 /// are safe to call. /// [SecurityCritical] public WebBrowserEvent(WebBrowser parent) { _parent = parent; Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events"); } ////// Critical: This code extracts the IWebBrowser2 interface /// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation /// It simply enforces a few checks. /// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the /// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation /// to false. This is currently safe. (But setting it to true is not!) /// [SecurityCritical,SecurityTreatAsSafe] public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel) { try { Debug.Assert(url == null || url is string, "invalid url type"); Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type"); Debug.Assert(headers == null || headers is string, "invalid headers type"); // // Due to a bug in the interop code where the variant.bstr value gets set // to -1 on return back to native code, if the original value was null, we // have to set targetFrameName and headers to "". if (targetFrameName == null) { targetFrameName = ""; } if (headers == null) { headers = ""; } string urlString = (string)url; Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString); UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; // This is the condition where we are in a sub window like a frame or iframe or embedded webOC // in that case we do not want to enforce site locking as we want the default IE behavior to take // over. if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // The InternalBlankNavigation property indicates whether we are navigating to "about:blank" // as a result of navigating to null or stream/string navigation. // We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above // conditions occur, the InternalBlankNavigation is true and the source must be "about:blank". // // But when end user navigates away from the current about:blank page (by clicking // on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward, // When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank". // Clear the InternalBlankNavigation bit in that case. if ((_parent.InternalBlankNavigation) && String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0) { _parent.InternalBlankNavigation = false; } // Site locking for top level WebOC navigation // "about:blank is not enabled in partial trust publicly. // We enable it internally to navigate to null. if ((! _parent.InternalBlankNavigation) && ! SecurityHelper.CallerHasWebPermission(source)) { cancel = true; } else { // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { source = null; } NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source, null, null, null, NavigationMode.New, null, null, true); // Fire navigating event. Events are only fired for top level navigation. _parent.OnNavigating(e); cancel = e.Cancel; } } } // We disable this to suppress FXCop warning since in this case we really want to catch all exceptions // please refer to comment below #pragma warning disable 6502 catch { // This is an interesting pattern of putting a try catch block around this that catches everything, // The reason I do this is based on a conversation with Changov. What happens here is if there is // an exception in any of the code above then navigation still continues since COM interop eats up // the exception. But what we want is for this navigation to fail. // There fore I catch all exceptions and cancel navigation cancel = true; } #pragma warning restore 6502 finally { // Clean the WebBrowser control state if navigation cancelled. if (cancel) { _parent.InternalBlankNavigation = false; _parent.DocumentStream = null; } } } ////// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void NavigateComplete2(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // If we are loading from stream. if (_parent.DocumentStream != null) { Invariant.Assert(_parent.InternalBlankNavigation && (String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0)); try { UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument; if (nativeHTMLDocument != null) { UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit; Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit"); System.Runtime.InteropServices.ComTypes.IStream iStream = new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream); psi.Load(iStream); } } finally { _parent.DocumentStream = null; } } else { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnNavigated(e); } } } ////// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void DocumentComplete(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnLoadCompleted(e); } } public void CommandStateChange(long command, bool enable) { if (command == NativeMethods.CSC_NAVIGATEBACK) { _parent._canGoBack = enable; } else if (command == NativeMethods.CSC_NAVIGATEFORWARD) { _parent._canGoForward = enable; } } public void TitleChange(string text) { //this.parent.OnDocumentTitleChanged(EventArgs.Empty); } public void SetSecureLockIcon(int secureLockIcon) { //this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon; //this.parent.OnEncryptionLevelChanged(EventArgs.Empty); } public void NewWindow2(ref object ppDisp, ref bool cancel) { //CancelEventArgs e = new CancelEventArgs(); //this.parent.OnNewWindow(e); //cancel = e.Cancel; } public void ProgressChange(int progress, int progressMax) { //WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax); //this.parent.OnProgressChanged(e); } ////// Critical: Setting the browser's status bar allows hyperlink URL spoofing. /// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code. /// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because /// malicious code in the browser process could do this directly. /// [SecurityCritical] public void StatusTextChange(string text) { _parent.RaiseEvent(new RequestSetStatusBarEventArgs(text)); } public void DownloadBegin() { //this.parent.OnFileDownload(EventArgs.Empty); } public void FileDownload(ref bool activeDocument, ref bool cancel) { } public void PrivacyImpactedStateChange(bool bImpacted) { } public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { } public void PrintTemplateTeardown(object pDisp) { } public void PrintTemplateInstantiation(object pDisp) { } public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { } public void ClientToHostWindow(ref long cX, ref long cY) { } public void WindowClosing(bool isChildWindow, ref bool cancel) { } public void WindowSetHeight(int height) { } public void WindowSetWidth(int width) { } public void WindowSetTop(int top) { } public void WindowSetLeft(int left) { } public void WindowSetResizable(bool resizable) { } public void OnTheaterMode(bool theaterMode) { } public void OnFullScreen(bool fullScreen) { } public void OnStatusBar(bool statusBar) { } public void OnMenuBar(bool menuBar) { } public void OnToolBar(bool toolBar) { } public void OnVisible(bool visible) { } public void OnQuit() { } public void PropertyChange(string szProperty) { } public void DownloadComplete() { } public void SetPhishingFilterStatus(uint phishingFilterStatus) { } public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // // // // Description: // WebBrowserEvent is used to listen to the DWebBrowserEvent2 // of the webbrowser control // // Copied from WebBrowse.cs in winforms // // History // 04/17/05 KusumaV Created // 02/22/08 huwang Expose the WebBrowser control's navigation events // 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode // //----------------------------------------------------------------------------- using System; using System.ComponentModel; using System.Diagnostics; using System.Runtime.InteropServices; using System.Security; using System.Windows; using System.Text; using System.Windows.Navigation; using MS.Internal.PresentationFramework; using System.Windows.Controls; using MS.Win32; using MS.Internal.AppModel; using MS.Internal.Interop; //In order to avoid generating warnings about unknown message numbers and //unknown pragmas when compiling your C# source code with the actual C# compiler, //you need to disable warnings 1634 and 1691. (Presharp Documentation) #pragma warning disable 1634, 1691 namespace MS.Internal.Controls { ////// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose /// in partial trust--in principle. Having an object reference, partial-trust code would be able to /// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods /// are SecurityTreatAsSafe, this exposure concern is insignificant. /// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed /// across a security boundary. We must not allow a compromised low-integrity-level browser process to /// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this /// interface is not interesting, because the WebOC is directly accessible in the browser process.) /// [ClassInterface(ClassInterfaceType.None)] internal class WebBrowserEvent : InternalDispatchObject, UnsafeNativeMethods.DWebBrowserEvents2 { private WebBrowser _parent; /// /// Critical because the base class ctor is critical. /// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2 /// are safe to call. /// [SecurityCritical] public WebBrowserEvent(WebBrowser parent) { _parent = parent; Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events"); } ////// Critical: This code extracts the IWebBrowser2 interface /// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation /// It simply enforces a few checks. /// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the /// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation /// to false. This is currently safe. (But setting it to true is not!) /// [SecurityCritical,SecurityTreatAsSafe] public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel) { try { Debug.Assert(url == null || url is string, "invalid url type"); Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type"); Debug.Assert(headers == null || headers is string, "invalid headers type"); // // Due to a bug in the interop code where the variant.bstr value gets set // to -1 on return back to native code, if the original value was null, we // have to set targetFrameName and headers to "". if (targetFrameName == null) { targetFrameName = ""; } if (headers == null) { headers = ""; } string urlString = (string)url; Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString); UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; // This is the condition where we are in a sub window like a frame or iframe or embedded webOC // in that case we do not want to enforce site locking as we want the default IE behavior to take // over. if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // The InternalBlankNavigation property indicates whether we are navigating to "about:blank" // as a result of navigating to null or stream/string navigation. // We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above // conditions occur, the InternalBlankNavigation is true and the source must be "about:blank". // // But when end user navigates away from the current about:blank page (by clicking // on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward, // When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank". // Clear the InternalBlankNavigation bit in that case. if ((_parent.InternalBlankNavigation) && String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0) { _parent.InternalBlankNavigation = false; } // Site locking for top level WebOC navigation // "about:blank is not enabled in partial trust publicly. // We enable it internally to navigate to null. if ((! _parent.InternalBlankNavigation) && ! SecurityHelper.CallerHasWebPermission(source)) { cancel = true; } else { // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { source = null; } NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source, null, null, null, NavigationMode.New, null, null, true); // Fire navigating event. Events are only fired for top level navigation. _parent.OnNavigating(e); cancel = e.Cancel; } } } // We disable this to suppress FXCop warning since in this case we really want to catch all exceptions // please refer to comment below #pragma warning disable 6502 catch { // This is an interesting pattern of putting a try catch block around this that catches everything, // The reason I do this is based on a conversation with Changov. What happens here is if there is // an exception in any of the code above then navigation still continues since COM interop eats up // the exception. But what we want is for this navigation to fail. // There fore I catch all exceptions and cancel navigation cancel = true; } #pragma warning restore 6502 finally { // Clean the WebBrowser control state if navigation cancelled. if (cancel) { _parent.InternalBlankNavigation = false; _parent.DocumentStream = null; } } } ////// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void NavigateComplete2(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // If we are loading from stream. if (_parent.DocumentStream != null) { Invariant.Assert(_parent.InternalBlankNavigation && (String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0)); try { UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument; if (nativeHTMLDocument != null) { UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit; Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit"); System.Runtime.InteropServices.ComTypes.IStream iStream = new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream); psi.Load(iStream); } } finally { _parent.DocumentStream = null; } } else { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnNavigated(e); } } } ////// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void DocumentComplete(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnLoadCompleted(e); } } public void CommandStateChange(long command, bool enable) { if (command == NativeMethods.CSC_NAVIGATEBACK) { _parent._canGoBack = enable; } else if (command == NativeMethods.CSC_NAVIGATEFORWARD) { _parent._canGoForward = enable; } } public void TitleChange(string text) { //this.parent.OnDocumentTitleChanged(EventArgs.Empty); } public void SetSecureLockIcon(int secureLockIcon) { //this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon; //this.parent.OnEncryptionLevelChanged(EventArgs.Empty); } public void NewWindow2(ref object ppDisp, ref bool cancel) { //CancelEventArgs e = new CancelEventArgs(); //this.parent.OnNewWindow(e); //cancel = e.Cancel; } public void ProgressChange(int progress, int progressMax) { //WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax); //this.parent.OnProgressChanged(e); } ////// Critical: Setting the browser's status bar allows hyperlink URL spoofing. /// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code. /// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because /// malicious code in the browser process could do this directly. /// [SecurityCritical] public void StatusTextChange(string text) { _parent.RaiseEvent(new RequestSetStatusBarEventArgs(text)); } public void DownloadBegin() { //this.parent.OnFileDownload(EventArgs.Empty); } public void FileDownload(ref bool activeDocument, ref bool cancel) { } public void PrivacyImpactedStateChange(bool bImpacted) { } public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { } public void PrintTemplateTeardown(object pDisp) { } public void PrintTemplateInstantiation(object pDisp) { } public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { } public void ClientToHostWindow(ref long cX, ref long cY) { } public void WindowClosing(bool isChildWindow, ref bool cancel) { } public void WindowSetHeight(int height) { } public void WindowSetWidth(int width) { } public void WindowSetTop(int top) { } public void WindowSetLeft(int left) { } public void WindowSetResizable(bool resizable) { } public void OnTheaterMode(bool theaterMode) { } public void OnFullScreen(bool fullScreen) { } public void OnStatusBar(bool statusBar) { } public void OnMenuBar(bool menuBar) { } public void OnToolBar(bool toolBar) { } public void OnVisible(bool visible) { } public void OnQuit() { } public void PropertyChange(string szProperty) { } public void DownloadComplete() { } public void SetPhishingFilterStatus(uint phishingFilterStatus) { } public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- ReliableOutputSessionChannel.cs
- TrackingParameters.cs
- Vector3DCollectionValueSerializer.cs
- GridViewAutoFormat.cs
- userdatakeys.cs
- ValidateNames.cs
- DataGridViewRowsRemovedEventArgs.cs
- InteropAutomationProvider.cs
- FormViewDeleteEventArgs.cs
- DataBindingExpressionBuilder.cs
- OleDbDataReader.cs
- TypeUsageBuilder.cs
- ZoneLinkButton.cs
- CharConverter.cs
- MyContact.cs
- HtmlLink.cs
- DesignerSerializationManager.cs
- Hyperlink.cs
- List.cs
- ProfileBuildProvider.cs
- Int32Collection.cs
- PageStatePersister.cs
- EventBuilder.cs
- StackBuilderSink.cs
- ImageListImageEditor.cs
- CollectionDataContractAttribute.cs
- SelectionListDesigner.cs
- SplayTreeNode.cs
- GlobalDataBindingHandler.cs
- ServiceContractViewControl.cs
- SmtpAuthenticationManager.cs
- TextRange.cs
- DefaultAsyncDataDispatcher.cs
- SafeArrayTypeMismatchException.cs
- IPipelineRuntime.cs
- connectionpool.cs
- Socket.cs
- HotSpot.cs
- DataContractSerializerOperationGenerator.cs
- CodeNamespace.cs
- Encoder.cs
- TypeUtil.cs
- _NestedSingleAsyncResult.cs
- XmlDataProvider.cs
- DelegateTypeInfo.cs
- NameValueCollection.cs
- TimeoutException.cs
- ObjectConverter.cs
- IDQuery.cs
- ReferenceEqualityComparer.cs
- TypeToTreeConverter.cs
- EncryptedKeyIdentifierClause.cs
- RegularExpressionValidator.cs
- DictionaryBase.cs
- DataControlFieldCell.cs
- XamlReader.cs
- LocatorGroup.cs
- IHttpResponseInternal.cs
- DocumentGridContextMenu.cs
- SamlSubjectStatement.cs
- WebBrowsableAttribute.cs
- SecurityTokenValidationException.cs
- WebPartActionVerb.cs
- SchemaContext.cs
- WebPartManager.cs
- ExecutionContext.cs
- NameSpaceEvent.cs
- LockRecursionException.cs
- DataObjectAttribute.cs
- StringAnimationUsingKeyFrames.cs
- DescendantOverDescendantQuery.cs
- Matrix3D.cs
- MouseEventArgs.cs
- ConfigUtil.cs
- VisualStyleTypesAndProperties.cs
- EdmMember.cs
- CommentEmitter.cs
- ListBoxChrome.cs
- SymbolEqualComparer.cs
- ShapeTypeface.cs
- ListView.cs
- DataViewSetting.cs
- AsymmetricSignatureFormatter.cs
- WebBrowserPermission.cs
- HttpDictionary.cs
- WebServiceEnumData.cs
- OleDbCommandBuilder.cs
- SerialReceived.cs
- _AutoWebProxyScriptHelper.cs
- XsdDuration.cs
- XmlBaseWriter.cs
- OleDbPropertySetGuid.cs
- ReturnValue.cs
- AuthorizationPolicyTypeElementCollection.cs
- MemberDescriptor.cs
- TransformCollection.cs
- BookmarkUndoUnit.cs
- OdbcCommand.cs
- AttributeCollection.cs
- Registry.cs