Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / Orcas / QFE / wpf / src / Framework / MS / Internal / Controls / WebBrowserEvent.cs / 1 / WebBrowserEvent.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // // // // Description: // WebBrowserEvent is used to listen to the DWebBrowserEvent2 // of the webbrowser control // // Copied from WebBrowse.cs in winforms // // History // 04/17/05 KusumaV Created // 02/22/08 huwang Expose the WebBrowser control's navigation events // 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode // //----------------------------------------------------------------------------- using System; using System.ComponentModel; using System.Diagnostics; using System.Runtime.InteropServices; using System.Security; using System.Windows; using System.Text; using System.Windows.Navigation; using MS.Internal.PresentationFramework; using System.Windows.Controls; using MS.Win32; using MS.Internal.AppModel; using MS.Internal.Interop; //In order to avoid generating warnings about unknown message numbers and //unknown pragmas when compiling your C# source code with the actual C# compiler, //you need to disable warnings 1634 and 1691. (Presharp Documentation) #pragma warning disable 1634, 1691 namespace MS.Internal.Controls { ////// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose /// in partial trust--in principle. Having an object reference, partial-trust code would be able to /// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods /// are SecurityTreatAsSafe, this exposure concern is insignificant. /// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed /// across a security boundary. We must not allow a compromised low-integrity-level browser process to /// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this /// interface is not interesting, because the WebOC is directly accessible in the browser process.) /// [ClassInterface(ClassInterfaceType.None)] internal class WebBrowserEvent : InternalDispatchObject, UnsafeNativeMethods.DWebBrowserEvents2 { private WebBrowser _parent; /// /// Critical because the base class ctor is critical. /// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2 /// are safe to call. /// [SecurityCritical] public WebBrowserEvent(WebBrowser parent) { _parent = parent; Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events"); } ////// Critical: This code extracts the IWebBrowser2 interface /// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation /// It simply enforces a few checks. /// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the /// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation /// to false. This is currently safe. (But setting it to true is not!) /// [SecurityCritical,SecurityTreatAsSafe] public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel) { try { Debug.Assert(url == null || url is string, "invalid url type"); Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type"); Debug.Assert(headers == null || headers is string, "invalid headers type"); // // Due to a bug in the interop code where the variant.bstr value gets set // to -1 on return back to native code, if the original value was null, we // have to set targetFrameName and headers to "". if (targetFrameName == null) { targetFrameName = ""; } if (headers == null) { headers = ""; } string urlString = (string)url; Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString); UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; // This is the condition where we are in a sub window like a frame or iframe or embedded webOC // in that case we do not want to enforce site locking as we want the default IE behavior to take // over. if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // The InternalBlankNavigation property indicates whether we are navigating to "about:blank" // as a result of navigating to null or stream/string navigation. // We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above // conditions occur, the InternalBlankNavigation is true and the source must be "about:blank". // // But when end user navigates away from the current about:blank page (by clicking // on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward, // When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank". // Clear the InternalBlankNavigation bit in that case. if ((_parent.InternalBlankNavigation) && String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0) { _parent.InternalBlankNavigation = false; } // Site locking for top level WebOC navigation // "about:blank is not enabled in partial trust publicly. // We enable it internally to navigate to null. if ((! _parent.InternalBlankNavigation) && ! SecurityHelper.CallerHasWebPermission(source)) { cancel = true; } else { // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { source = null; } NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source, null, null, null, NavigationMode.New, null, null, true); // Fire navigating event. Events are only fired for top level navigation. _parent.OnNavigating(e); cancel = e.Cancel; } } } // We disable this to suppress FXCop warning since in this case we really want to catch all exceptions // please refer to comment below #pragma warning disable 6502 catch { // This is an interesting pattern of putting a try catch block around this that catches everything, // The reason I do this is based on a conversation with Changov. What happens here is if there is // an exception in any of the code above then navigation still continues since COM interop eats up // the exception. But what we want is for this navigation to fail. // There fore I catch all exceptions and cancel navigation cancel = true; } #pragma warning restore 6502 finally { // Clean the WebBrowser control state if navigation cancelled. if (cancel) { _parent.InternalBlankNavigation = false; _parent.DocumentStream = null; } } } ////// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void NavigateComplete2(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // If we are loading from stream. if (_parent.DocumentStream != null) { Invariant.Assert(_parent.InternalBlankNavigation && (String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0)); try { UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument; if (nativeHTMLDocument != null) { UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit; Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit"); System.Runtime.InteropServices.ComTypes.IStream iStream = new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream); psi.Load(iStream); } } finally { _parent.DocumentStream = null; } } else { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnNavigated(e); } } } ////// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void DocumentComplete(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnLoadCompleted(e); } } public void CommandStateChange(long command, bool enable) { if (command == NativeMethods.CSC_NAVIGATEBACK) { _parent._canGoBack = enable; } else if (command == NativeMethods.CSC_NAVIGATEFORWARD) { _parent._canGoForward = enable; } } public void TitleChange(string text) { //this.parent.OnDocumentTitleChanged(EventArgs.Empty); } public void SetSecureLockIcon(int secureLockIcon) { //this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon; //this.parent.OnEncryptionLevelChanged(EventArgs.Empty); } public void NewWindow2(ref object ppDisp, ref bool cancel) { //CancelEventArgs e = new CancelEventArgs(); //this.parent.OnNewWindow(e); //cancel = e.Cancel; } public void ProgressChange(int progress, int progressMax) { //WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax); //this.parent.OnProgressChanged(e); } ////// Critical: Setting the browser's status bar allows hyperlink URL spoofing. /// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code. /// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because /// malicious code in the browser process could do this directly. /// [SecurityCritical] public void StatusTextChange(string text) { _parent.RaiseEvent(new RequestSetStatusBarEventArgs(text)); } public void DownloadBegin() { //this.parent.OnFileDownload(EventArgs.Empty); } public void FileDownload(ref bool activeDocument, ref bool cancel) { } public void PrivacyImpactedStateChange(bool bImpacted) { } public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { } public void PrintTemplateTeardown(object pDisp) { } public void PrintTemplateInstantiation(object pDisp) { } public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { } public void ClientToHostWindow(ref long cX, ref long cY) { } public void WindowClosing(bool isChildWindow, ref bool cancel) { } public void WindowSetHeight(int height) { } public void WindowSetWidth(int width) { } public void WindowSetTop(int top) { } public void WindowSetLeft(int left) { } public void WindowSetResizable(bool resizable) { } public void OnTheaterMode(bool theaterMode) { } public void OnFullScreen(bool fullScreen) { } public void OnStatusBar(bool statusBar) { } public void OnMenuBar(bool menuBar) { } public void OnToolBar(bool toolBar) { } public void OnVisible(bool visible) { } public void OnQuit() { } public void PropertyChange(string szProperty) { } public void DownloadComplete() { } public void SetPhishingFilterStatus(uint phishingFilterStatus) { } public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // // // // Description: // WebBrowserEvent is used to listen to the DWebBrowserEvent2 // of the webbrowser control // // Copied from WebBrowse.cs in winforms // // History // 04/17/05 KusumaV Created // 02/22/08 huwang Expose the WebBrowser control's navigation events // 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode // //----------------------------------------------------------------------------- using System; using System.ComponentModel; using System.Diagnostics; using System.Runtime.InteropServices; using System.Security; using System.Windows; using System.Text; using System.Windows.Navigation; using MS.Internal.PresentationFramework; using System.Windows.Controls; using MS.Win32; using MS.Internal.AppModel; using MS.Internal.Interop; //In order to avoid generating warnings about unknown message numbers and //unknown pragmas when compiling your C# source code with the actual C# compiler, //you need to disable warnings 1634 and 1691. (Presharp Documentation) #pragma warning disable 1634, 1691 namespace MS.Internal.Controls { ////// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose /// in partial trust--in principle. Having an object reference, partial-trust code would be able to /// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods /// are SecurityTreatAsSafe, this exposure concern is insignificant. /// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed /// across a security boundary. We must not allow a compromised low-integrity-level browser process to /// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this /// interface is not interesting, because the WebOC is directly accessible in the browser process.) /// [ClassInterface(ClassInterfaceType.None)] internal class WebBrowserEvent : InternalDispatchObject, UnsafeNativeMethods.DWebBrowserEvents2 { private WebBrowser _parent; /// /// Critical because the base class ctor is critical. /// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2 /// are safe to call. /// [SecurityCritical] public WebBrowserEvent(WebBrowser parent) { _parent = parent; Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events"); } ////// Critical: This code extracts the IWebBrowser2 interface /// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation /// It simply enforces a few checks. /// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the /// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation /// to false. This is currently safe. (But setting it to true is not!) /// [SecurityCritical,SecurityTreatAsSafe] public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel) { try { Debug.Assert(url == null || url is string, "invalid url type"); Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type"); Debug.Assert(headers == null || headers is string, "invalid headers type"); // // Due to a bug in the interop code where the variant.bstr value gets set // to -1 on return back to native code, if the original value was null, we // have to set targetFrameName and headers to "". if (targetFrameName == null) { targetFrameName = ""; } if (headers == null) { headers = ""; } string urlString = (string)url; Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString); UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; // This is the condition where we are in a sub window like a frame or iframe or embedded webOC // in that case we do not want to enforce site locking as we want the default IE behavior to take // over. if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // The InternalBlankNavigation property indicates whether we are navigating to "about:blank" // as a result of navigating to null or stream/string navigation. // We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above // conditions occur, the InternalBlankNavigation is true and the source must be "about:blank". // // But when end user navigates away from the current about:blank page (by clicking // on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward, // When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank". // Clear the InternalBlankNavigation bit in that case. if ((_parent.InternalBlankNavigation) && String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0) { _parent.InternalBlankNavigation = false; } // Site locking for top level WebOC navigation // "about:blank is not enabled in partial trust publicly. // We enable it internally to navigate to null. if ((! _parent.InternalBlankNavigation) && ! SecurityHelper.CallerHasWebPermission(source)) { cancel = true; } else { // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { source = null; } NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source, null, null, null, NavigationMode.New, null, null, true); // Fire navigating event. Events are only fired for top level navigation. _parent.OnNavigating(e); cancel = e.Cancel; } } } // We disable this to suppress FXCop warning since in this case we really want to catch all exceptions // please refer to comment below #pragma warning disable 6502 catch { // This is an interesting pattern of putting a try catch block around this that catches everything, // The reason I do this is based on a conversation with Changov. What happens here is if there is // an exception in any of the code above then navigation still continues since COM interop eats up // the exception. But what we want is for this navigation to fail. // There fore I catch all exceptions and cancel navigation cancel = true; } #pragma warning restore 6502 finally { // Clean the WebBrowser control state if navigation cancelled. if (cancel) { _parent.InternalBlankNavigation = false; _parent.DocumentStream = null; } } } ////// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void NavigateComplete2(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { // If we are loading from stream. if (_parent.DocumentStream != null) { Invariant.Assert(_parent.InternalBlankNavigation && (String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0)); try { UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument; if (nativeHTMLDocument != null) { UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit; Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit"); System.Runtime.InteropServices.ComTypes.IStream iStream = new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream); psi.Load(iStream); } } finally { _parent.DocumentStream = null; } } else { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnNavigated(e); } } } ////// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface. /// TreatAsSafe: This does not expose the interface. /// [SecurityCritical, SecurityTreatAsSafe] public void DocumentComplete(object pDisp, ref object url) { Debug.Assert(url == null || url is string, "invalid url type"); // Events only fired for top level navigation. UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp; if (_parent.AxIWebBrowser2 == axIWebBrowser2) { string urlString = (string)url; // When source set to null or navigating to stream/string, we navigate to "about:blank" // internally. Make sure we pass null in the event args. if (_parent.InternalBlankNavigation) { Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0); urlString = null; } Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString)); NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true); _parent.OnLoadCompleted(e); } } public void CommandStateChange(long command, bool enable) { if (command == NativeMethods.CSC_NAVIGATEBACK) { _parent._canGoBack = enable; } else if (command == NativeMethods.CSC_NAVIGATEFORWARD) { _parent._canGoForward = enable; } } public void TitleChange(string text) { //this.parent.OnDocumentTitleChanged(EventArgs.Empty); } public void SetSecureLockIcon(int secureLockIcon) { //this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon; //this.parent.OnEncryptionLevelChanged(EventArgs.Empty); } public void NewWindow2(ref object ppDisp, ref bool cancel) { //CancelEventArgs e = new CancelEventArgs(); //this.parent.OnNewWindow(e); //cancel = e.Cancel; } public void ProgressChange(int progress, int progressMax) { //WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax); //this.parent.OnProgressChanged(e); } ////// Critical: Setting the browser's status bar allows hyperlink URL spoofing. /// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code. /// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because /// malicious code in the browser process could do this directly. /// [SecurityCritical] public void StatusTextChange(string text) { _parent.RaiseEvent(new RequestSetStatusBarEventArgs(text)); } public void DownloadBegin() { //this.parent.OnFileDownload(EventArgs.Empty); } public void FileDownload(ref bool activeDocument, ref bool cancel) { } public void PrivacyImpactedStateChange(bool bImpacted) { } public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { } public void PrintTemplateTeardown(object pDisp) { } public void PrintTemplateInstantiation(object pDisp) { } public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { } public void ClientToHostWindow(ref long cX, ref long cY) { } public void WindowClosing(bool isChildWindow, ref bool cancel) { } public void WindowSetHeight(int height) { } public void WindowSetWidth(int width) { } public void WindowSetTop(int top) { } public void WindowSetLeft(int left) { } public void WindowSetResizable(bool resizable) { } public void OnTheaterMode(bool theaterMode) { } public void OnFullScreen(bool fullScreen) { } public void OnStatusBar(bool statusBar) { } public void OnMenuBar(bool menuBar) { } public void OnToolBar(bool toolBar) { } public void OnVisible(bool visible) { } public void OnQuit() { } public void PropertyChange(string szProperty) { } public void DownloadComplete() { } public void SetPhishingFilterStatus(uint phishingFilterStatus) { } public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- Vertex.cs
- Parser.cs
- DeferredSelectedIndexReference.cs
- FormsAuthenticationEventArgs.cs
- DispatcherObject.cs
- safemediahandle.cs
- ResourceWriter.cs
- HashAlgorithm.cs
- RawStylusActions.cs
- ServiceModelConfigurationSectionCollection.cs
- StylusPointDescription.cs
- ImageMap.cs
- ToolstripProfessionalRenderer.cs
- Int32AnimationBase.cs
- _HeaderInfo.cs
- RequestTimeoutManager.cs
- VisualBasicSettingsHandler.cs
- XPathAxisIterator.cs
- FontFamilyValueSerializer.cs
- ClaimTypeElement.cs
- DrawingImage.cs
- UserPersonalizationStateInfo.cs
- StringAnimationBase.cs
- SourceSwitch.cs
- ExceptionUtil.cs
- InkCanvasInnerCanvas.cs
- GlyphRunDrawing.cs
- CustomTypeDescriptor.cs
- PolicyLevel.cs
- ColumnResizeAdorner.cs
- SplineKeyFrames.cs
- ClientSettingsProvider.cs
- SplayTreeNode.cs
- PropertyDescriptorCollection.cs
- TransformerConfigurationWizardBase.cs
- CodeGroup.cs
- Int32Converter.cs
- HttpRuntimeSection.cs
- WindowCollection.cs
- MarkupProperty.cs
- WsatServiceAddress.cs
- UnhandledExceptionEventArgs.cs
- OrderedDictionaryStateHelper.cs
- Unit.cs
- UnsafeNativeMethods.cs
- ServiceDebugElement.cs
- SafeFindHandle.cs
- TransformGroup.cs
- ExtensionWindowHeader.cs
- GridViewSelectEventArgs.cs
- XmlQueryRuntime.cs
- ControlBuilder.cs
- PagePropertiesChangingEventArgs.cs
- AssociatedControlConverter.cs
- sqlpipe.cs
- GeneratedView.cs
- TextServicesDisplayAttributePropertyRanges.cs
- ApplicationId.cs
- IisTraceListener.cs
- KnownColorTable.cs
- TextTreeInsertUndoUnit.cs
- ISAPIApplicationHost.cs
- WebPartConnectVerb.cs
- CommonDialog.cs
- TextEditorThreadLocalStore.cs
- HttpCachePolicyWrapper.cs
- PaintEvent.cs
- ResourceReferenceExpression.cs
- MachineSettingsSection.cs
- ConcurrencyBehavior.cs
- FixedDocumentPaginator.cs
- IgnoreDataMemberAttribute.cs
- TextFormatterContext.cs
- ContentFileHelper.cs
- BypassElementCollection.cs
- WorkflowInspectionServices.cs
- EventBuilder.cs
- EmbeddedMailObject.cs
- TypedLocationWrapper.cs
- CaseInsensitiveComparer.cs
- XPathDocument.cs
- GifBitmapDecoder.cs
- RayMeshGeometry3DHitTestResult.cs
- CodeNamespaceCollection.cs
- DtdParser.cs
- SolidColorBrush.cs
- HtmlTernaryTree.cs
- ExpressionBuilder.cs
- WebPartEditVerb.cs
- MarshalDirectiveException.cs
- FileVersion.cs
- ZoomingMessageFilter.cs
- HelpKeywordAttribute.cs
- DataGridViewButtonColumn.cs
- InternalMappingException.cs
- InternalCache.cs
- RegionData.cs
- DataGridViewUtilities.cs
- AssemblyAssociatedContentFileAttribute.cs
- HttpListenerTimeoutManager.cs