Code:
/ Net / Net / 3.5.50727.3053 / DEVDIV / depot / DevDiv / releases / Orcas / SP / wpf / src / Framework / MS / Internal / Controls / WebBrowserEvent.cs / 5 / WebBrowserEvent.cs
//------------------------------------------------------------------------------
//
// Copyright (c) Microsoft Corporation. All rights reserved.
//
//
//
// Description:
// WebBrowserEvent is used to listen to the DWebBrowserEvent2
// of the webbrowser control
//
// Copied from WebBrowse.cs in winforms
//
// History
// 04/17/05 KusumaV Created
// 02/22/08 huwang Expose the WebBrowser control's navigation events
// 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode
//
//-----------------------------------------------------------------------------
using System;
using System.ComponentModel;
using System.Diagnostics;
using System.Runtime.InteropServices;
using System.Security;
using System.Windows;
using System.Text;
using System.Windows.Navigation;
using MS.Internal.PresentationFramework;
using System.Windows.Controls;
using MS.Win32;
using MS.Internal.AppModel;
using MS.Internal.Interop;
//In order to avoid generating warnings about unknown message numbers and
//unknown pragmas when compiling your C# source code with the actual C# compiler,
//you need to disable warnings 1634 and 1691. (Presharp Documentation)
#pragma warning disable 1634, 1691
namespace MS.Internal.Controls
{
///
/// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose
/// in partial trust--in principle. Having an object reference, partial-trust code would be able to
/// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods
/// are SecurityTreatAsSafe, this exposure concern is insignificant.
/// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed
/// across a security boundary. We must not allow a compromised low-integrity-level browser process to
/// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this
/// interface is not interesting, because the WebOC is directly accessible in the browser process.)
///
[ClassInterface(ClassInterfaceType.None)]
internal class WebBrowserEvent :
InternalDispatchObject,
UnsafeNativeMethods.DWebBrowserEvents2
{
private WebBrowser _parent;
///
/// Critical because the base class ctor is critical.
/// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2
/// are safe to call.
///
[SecurityCritical]
public WebBrowserEvent(WebBrowser parent) {
_parent = parent;
Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events");
}
///
/// Critical: This code extracts the IWebBrowser2 interface
/// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation
/// It simply enforces a few checks.
/// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the
/// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation
/// to false. This is currently safe. (But setting it to true is not!)
///
[SecurityCritical,SecurityTreatAsSafe]
public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel)
{
try
{
Debug.Assert(url == null || url is string, "invalid url type");
Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type");
Debug.Assert(headers == null || headers is string, "invalid headers type");
//
// Due to a bug in the interop code where the variant.bstr value gets set
// to -1 on return back to native code, if the original value was null, we
// have to set targetFrameName and headers to "".
if (targetFrameName == null)
{
targetFrameName = "";
}
if (headers == null)
{
headers = "";
}
string urlString = (string)url;
Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString);
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
// This is the condition where we are in a sub window like a frame or iframe or embedded webOC
// in that case we do not want to enforce site locking as we want the default IE behavior to take
// over.
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
// The InternalBlankNavigation property indicates whether we are navigating to "about:blank"
// as a result of navigating to null or stream/string navigation.
// We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above
// conditions occur, the InternalBlankNavigation is true and the source must be "about:blank".
//
// But when end user navigates away from the current about:blank page (by clicking
// on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward,
// When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank".
// Clear the InternalBlankNavigation bit in that case.
if ((_parent.InternalBlankNavigation) &&
String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0)
{
_parent.InternalBlankNavigation = false;
}
// Site locking for top level WebOC navigation
// "about:blank is not enabled in partial trust publicly.
// We enable it internally to navigate to null.
if ((! _parent.InternalBlankNavigation) &&
! SecurityHelper.CallerHasWebPermission(source))
{
cancel = true;
}
else
{
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
source = null;
}
NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source,
null, null, null, NavigationMode.New, null, null, true);
// Fire navigating event. Events are only fired for top level navigation.
_parent.OnNavigating(e);
cancel = e.Cancel;
}
}
}
// We disable this to suppress FXCop warning since in this case we really want to catch all exceptions
// please refer to comment below
#pragma warning disable 6502
catch
{
// This is an interesting pattern of putting a try catch block around this that catches everything,
// The reason I do this is based on a conversation with Changov. What happens here is if there is
// an exception in any of the code above then navigation still continues since COM interop eats up
// the exception. But what we want is for this navigation to fail.
// There fore I catch all exceptions and cancel navigation
cancel = true;
}
#pragma warning restore 6502
finally
{
// Clean the WebBrowser control state if navigation cancelled.
if (cancel)
{
_parent.InternalBlankNavigation = false;
_parent.DocumentStream = null;
}
}
}
///
/// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface.
/// TreatAsSafe: This does not expose the interface.
///
[SecurityCritical, SecurityTreatAsSafe]
public void NavigateComplete2(object pDisp, ref object url)
{
Debug.Assert(url == null || url is string, "invalid url type");
// Events only fired for top level navigation.
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
// If we are loading from stream.
if (_parent.DocumentStream != null)
{
Invariant.Assert(_parent.InternalBlankNavigation &&
(String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0));
try
{
UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument;
if (nativeHTMLDocument != null)
{
UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit;
Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit");
System.Runtime.InteropServices.ComTypes.IStream iStream =
new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream);
psi.Load(iStream);
}
}
finally
{
_parent.DocumentStream = null;
}
}
else
{
string urlString = (string)url;
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0);
urlString = null;
}
Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString));
NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true);
_parent.OnNavigated(e);
}
}
}
///
/// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface.
/// TreatAsSafe: This does not expose the interface.
///
[SecurityCritical, SecurityTreatAsSafe]
public void DocumentComplete(object pDisp, ref object url)
{
Debug.Assert(url == null || url is string, "invalid url type");
// Events only fired for top level navigation.
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
string urlString = (string)url;
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0);
urlString = null;
}
Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString));
NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true);
_parent.OnLoadCompleted(e);
}
}
public void CommandStateChange(long command, bool enable)
{
if (command == NativeMethods.CSC_NAVIGATEBACK) {
_parent._canGoBack = enable;
}
else if (command == NativeMethods.CSC_NAVIGATEFORWARD) {
_parent._canGoForward = enable;
}
}
public void TitleChange(string text) {
//this.parent.OnDocumentTitleChanged(EventArgs.Empty);
}
public void SetSecureLockIcon(int secureLockIcon)
{
//this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon;
//this.parent.OnEncryptionLevelChanged(EventArgs.Empty);
}
public void NewWindow2(ref object ppDisp, ref bool cancel) {
//CancelEventArgs e = new CancelEventArgs();
//this.parent.OnNewWindow(e);
//cancel = e.Cancel;
}
public void ProgressChange(int progress, int progressMax) {
//WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax);
//this.parent.OnProgressChanged(e);
}
///
/// Critical: Setting the browser's status bar allows hyperlink URL spoofing.
/// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code.
/// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because
/// malicious code in the browser process could do this directly.
///
[SecurityCritical]
public void StatusTextChange(string text)
{
_parent.RaiseEvent(new RequestSetStatusBarEventArgs(text));
}
public void DownloadBegin() {
//this.parent.OnFileDownload(EventArgs.Empty);
}
public void FileDownload(ref bool activeDocument, ref bool cancel) { }
public void PrivacyImpactedStateChange(bool bImpacted) { }
public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { }
public void PrintTemplateTeardown(object pDisp) { }
public void PrintTemplateInstantiation(object pDisp) { }
public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { }
public void ClientToHostWindow(ref long cX, ref long cY) { }
public void WindowClosing(bool isChildWindow, ref bool cancel) { }
public void WindowSetHeight(int height) { }
public void WindowSetWidth(int width) { }
public void WindowSetTop(int top) { }
public void WindowSetLeft(int left) { }
public void WindowSetResizable(bool resizable) { }
public void OnTheaterMode(bool theaterMode) { }
public void OnFullScreen(bool fullScreen) { }
public void OnStatusBar(bool statusBar) { }
public void OnMenuBar(bool menuBar) { }
public void OnToolBar(bool toolBar) { }
public void OnVisible(bool visible) { }
public void OnQuit() { }
public void PropertyChange(string szProperty) { }
public void DownloadComplete() { }
public void SetPhishingFilterStatus(uint phishingFilterStatus) { }
public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { }
}
}
// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
//------------------------------------------------------------------------------
//
// Copyright (c) Microsoft Corporation. All rights reserved.
//
//
//
// Description:
// WebBrowserEvent is used to listen to the DWebBrowserEvent2
// of the webbrowser control
//
// Copied from WebBrowse.cs in winforms
//
// History
// 04/17/05 KusumaV Created
// 02/22/08 huwang Expose the WebBrowser control's navigation events
// 04/24/08 ChangoV Implemented hosting the WebOC in the browser process for IE 7+ Protected Mode
//
//-----------------------------------------------------------------------------
using System;
using System.ComponentModel;
using System.Diagnostics;
using System.Runtime.InteropServices;
using System.Security;
using System.Windows;
using System.Text;
using System.Windows.Navigation;
using MS.Internal.PresentationFramework;
using System.Windows.Controls;
using MS.Win32;
using MS.Internal.AppModel;
using MS.Internal.Interop;
//In order to avoid generating warnings about unknown message numbers and
//unknown pragmas when compiling your C# source code with the actual C# compiler,
//you need to disable warnings 1634 and 1691. (Presharp Documentation)
#pragma warning disable 1634, 1691
namespace MS.Internal.Controls
{
///
/// 1) By virtue of being derived from InternalDispatchObject, WebBrowserEvent objects are unsafe to expose
/// in partial trust--in principle. Having an object reference, partial-trust code would be able to
/// call the methods implementing DWebBrowserEvents2. Since most of our current implementation methods
/// are SecurityTreatAsSafe, this exposure concern is insignificant.
/// 2) WebOCHostedInBrowserProcess - defense in depth: The DWebBrowserEvents2 implementation is exposed
/// across a security boundary. We must not allow a compromised low-integrity-level browser process to
/// gain elevation of privilege via our process or tamper with its state. (Attacking the WebOC via this
/// interface is not interesting, because the WebOC is directly accessible in the browser process.)
///
[ClassInterface(ClassInterfaceType.None)]
internal class WebBrowserEvent :
InternalDispatchObject,
UnsafeNativeMethods.DWebBrowserEvents2
{
private WebBrowser _parent;
///
/// Critical because the base class ctor is critical.
/// Instances should not be exposed in partial trust, unless all methods implementing DWebBrowserEvents2
/// are safe to call.
///
[SecurityCritical]
public WebBrowserEvent(WebBrowser parent) {
_parent = parent;
Debug.Assert(parent != null, "WebBrowser control required for hooking webbrowser events");
}
///
/// Critical: This code extracts the IWebBrowser2 interface
/// TreatAsSafe: This does not expose the interface, also calling this will not cause a navigation
/// It simply enforces a few checks.
/// WebOCHostedInBrowserProcess: By passing appropriately crafted parameters, malicious code in the
/// low-integrity browser process could get us to set the SecurityCritical _parent.InternalBlankNavigation
/// to false. This is currently safe. (But setting it to true is not!)
///
[SecurityCritical,SecurityTreatAsSafe]
public void BeforeNavigate2(object pDisp, ref object url, ref object flags, ref object targetFrameName, ref object postData, ref object headers, ref bool cancel)
{
try
{
Debug.Assert(url == null || url is string, "invalid url type");
Debug.Assert(targetFrameName == null || targetFrameName is string, "invalid targetFrameName type");
Debug.Assert(headers == null || headers is string, "invalid headers type");
//
// Due to a bug in the interop code where the variant.bstr value gets set
// to -1 on return back to native code, if the original value was null, we
// have to set targetFrameName and headers to "".
if (targetFrameName == null)
{
targetFrameName = "";
}
if (headers == null)
{
headers = "";
}
string urlString = (string)url;
Uri source = String.IsNullOrEmpty(urlString) ? null : new Uri(urlString);
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
// This is the condition where we are in a sub window like a frame or iframe or embedded webOC
// in that case we do not want to enforce site locking as we want the default IE behavior to take
// over.
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
// The InternalBlankNavigation property indicates whether we are navigating to "about:blank"
// as a result of navigating to null or stream/string navigation.
// We set the InternalBlankNavigation bit to true in the WebBrowser DoNavigate method. When the above
// conditions occur, the InternalBlankNavigation is true and the source must be "about:blank".
//
// But when end user navigates away from the current about:blank page (by clicking
// on a hyperlink, Goback/Forward), or programmatically call GoBack and Forward,
// When we get the navigating event, InternalBlankNavigation is true, but the source is not "about:blank".
// Clear the InternalBlankNavigation bit in that case.
if ((_parent.InternalBlankNavigation) &&
String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) != 0)
{
_parent.InternalBlankNavigation = false;
}
// Site locking for top level WebOC navigation
// "about:blank is not enabled in partial trust publicly.
// We enable it internally to navigate to null.
if ((! _parent.InternalBlankNavigation) &&
! SecurityHelper.CallerHasWebPermission(source))
{
cancel = true;
}
else
{
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
source = null;
}
NavigatingCancelEventArgs e = new NavigatingCancelEventArgs(source,
null, null, null, NavigationMode.New, null, null, true);
// Fire navigating event. Events are only fired for top level navigation.
_parent.OnNavigating(e);
cancel = e.Cancel;
}
}
}
// We disable this to suppress FXCop warning since in this case we really want to catch all exceptions
// please refer to comment below
#pragma warning disable 6502
catch
{
// This is an interesting pattern of putting a try catch block around this that catches everything,
// The reason I do this is based on a conversation with Changov. What happens here is if there is
// an exception in any of the code above then navigation still continues since COM interop eats up
// the exception. But what we want is for this navigation to fail.
// There fore I catch all exceptions and cancel navigation
cancel = true;
}
#pragma warning restore 6502
finally
{
// Clean the WebBrowser control state if navigation cancelled.
if (cancel)
{
_parent.InternalBlankNavigation = false;
_parent.DocumentStream = null;
}
}
}
///
/// Critical: This code extracts the IWebBrowser2, IHTMLDocument interface.
/// TreatAsSafe: This does not expose the interface.
///
[SecurityCritical, SecurityTreatAsSafe]
public void NavigateComplete2(object pDisp, ref object url)
{
Debug.Assert(url == null || url is string, "invalid url type");
// Events only fired for top level navigation.
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
// If we are loading from stream.
if (_parent.DocumentStream != null)
{
Invariant.Assert(_parent.InternalBlankNavigation &&
(String.Compare((string)url, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0));
try
{
UnsafeNativeMethods.IHTMLDocument nativeHTMLDocument = _parent.NativeHTMLDocument;
if (nativeHTMLDocument != null)
{
UnsafeNativeMethods.IPersistStreamInit psi = nativeHTMLDocument as UnsafeNativeMethods.IPersistStreamInit;
Debug.Assert(psi != null, "The Document does not implement IPersistStreamInit");
System.Runtime.InteropServices.ComTypes.IStream iStream =
new MS.Internal.IO.Packaging.ManagedIStream(_parent.DocumentStream);
psi.Load(iStream);
}
}
finally
{
_parent.DocumentStream = null;
}
}
else
{
string urlString = (string)url;
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0);
urlString = null;
}
Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString));
NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true);
_parent.OnNavigated(e);
}
}
}
///
/// Critical: This code accesses the IWebBrowser2, IHTMLDocument interface.
/// TreatAsSafe: This does not expose the interface.
///
[SecurityCritical, SecurityTreatAsSafe]
public void DocumentComplete(object pDisp, ref object url)
{
Debug.Assert(url == null || url is string, "invalid url type");
// Events only fired for top level navigation.
UnsafeNativeMethods.IWebBrowser2 axIWebBrowser2 = (UnsafeNativeMethods.IWebBrowser2)pDisp;
if (_parent.AxIWebBrowser2 == axIWebBrowser2)
{
string urlString = (string)url;
// When source set to null or navigating to stream/string, we navigate to "about:blank"
// internally. Make sure we pass null in the event args.
if (_parent.InternalBlankNavigation)
{
Invariant.Assert(String.Compare(urlString, WebBrowser.AboutBlankUriString, StringComparison.OrdinalIgnoreCase) == 0);
urlString = null;
}
Uri source = (String.IsNullOrEmpty(urlString) ? null : new Uri(urlString));
NavigationEventArgs e = new NavigationEventArgs(source, null, null, null, null, true);
_parent.OnLoadCompleted(e);
}
}
public void CommandStateChange(long command, bool enable)
{
if (command == NativeMethods.CSC_NAVIGATEBACK) {
_parent._canGoBack = enable;
}
else if (command == NativeMethods.CSC_NAVIGATEFORWARD) {
_parent._canGoForward = enable;
}
}
public void TitleChange(string text) {
//this.parent.OnDocumentTitleChanged(EventArgs.Empty);
}
public void SetSecureLockIcon(int secureLockIcon)
{
//this.parent.encryptionLevel = (WebBrowserEncryptionLevel)secureLockIcon;
//this.parent.OnEncryptionLevelChanged(EventArgs.Empty);
}
public void NewWindow2(ref object ppDisp, ref bool cancel) {
//CancelEventArgs e = new CancelEventArgs();
//this.parent.OnNewWindow(e);
//cancel = e.Cancel;
}
public void ProgressChange(int progress, int progressMax) {
//WebBrowserProgressChangedEventArgs e = new WebBrowserProgressChangedEventArgs(progress, progressMax);
//this.parent.OnProgressChanged(e);
}
///
/// Critical: Setting the browser's status bar allows hyperlink URL spoofing.
/// NOT PublicOK! The WebBrowserEvent object should not be exposed to partial-trust code.
/// WebOCHostedInBrowserProcess: Setting the status bar through this method is not interesting, because
/// malicious code in the browser process could do this directly.
///
[SecurityCritical]
public void StatusTextChange(string text)
{
_parent.RaiseEvent(new RequestSetStatusBarEventArgs(text));
}
public void DownloadBegin() {
//this.parent.OnFileDownload(EventArgs.Empty);
}
public void FileDownload(ref bool activeDocument, ref bool cancel) { }
public void PrivacyImpactedStateChange(bool bImpacted) { }
public void UpdatePageStatus(object pDisp, ref object nPage, ref object fDone) { }
public void PrintTemplateTeardown(object pDisp) { }
public void PrintTemplateInstantiation(object pDisp) { }
public void NavigateError(object pDisp, ref object url, ref object frame, ref object statusCode, ref bool cancel) { }
public void ClientToHostWindow(ref long cX, ref long cY) { }
public void WindowClosing(bool isChildWindow, ref bool cancel) { }
public void WindowSetHeight(int height) { }
public void WindowSetWidth(int width) { }
public void WindowSetTop(int top) { }
public void WindowSetLeft(int left) { }
public void WindowSetResizable(bool resizable) { }
public void OnTheaterMode(bool theaterMode) { }
public void OnFullScreen(bool fullScreen) { }
public void OnStatusBar(bool statusBar) { }
public void OnMenuBar(bool menuBar) { }
public void OnToolBar(bool toolBar) { }
public void OnVisible(bool visible) { }
public void OnQuit() { }
public void PropertyChange(string szProperty) { }
public void DownloadComplete() { }
public void SetPhishingFilterStatus(uint phishingFilterStatus) { }
public void WindowStateChanged(uint dwFlags, uint dwValidFlagsMask) { }
}
}
// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- AsymmetricSecurityBindingElement.cs
- NavigationFailedEventArgs.cs
- FlowDecision.cs
- Path.cs
- OperationResponse.cs
- FormView.cs
- AddInProcess.cs
- UriExt.cs
- IdentitySection.cs
- AppDomainCompilerProxy.cs
- QueryOutputWriterV1.cs
- XsdBuildProvider.cs
- ValidatingPropertiesEventArgs.cs
- DescendantBaseQuery.cs
- ComboBox.cs
- InvalidFilterCriteriaException.cs
- DrawListViewColumnHeaderEventArgs.cs
- coordinator.cs
- CodeSnippetCompileUnit.cs
- EmbeddedMailObject.cs
- RNGCryptoServiceProvider.cs
- RequiredFieldValidator.cs
- xmlglyphRunInfo.cs
- RootBrowserWindowAutomationPeer.cs
- ControlFilterExpression.cs
- Accessors.cs
- SqlTransaction.cs
- ClientScriptManager.cs
- ServiceDeploymentInfo.cs
- DataExpression.cs
- Schema.cs
- EventPropertyMap.cs
- Model3D.cs
- WebConfigurationManager.cs
- CacheSection.cs
- DbParameterHelper.cs
- serverconfig.cs
- PreDigestedSignedInfo.cs
- UserUseLicenseDictionaryLoader.cs
- DeferrableContent.cs
- SerializationSectionGroup.cs
- EdmItemCollection.cs
- SafeEventLogReadHandle.cs
- EntityDesignerDataSourceView.cs
- ObjectView.cs
- __TransparentProxy.cs
- EncryptedType.cs
- CroppedBitmap.cs
- XmlNamespaceDeclarationsAttribute.cs
- ExpressionsCollectionConverter.cs
- EmptyStringExpandableObjectConverter.cs
- DeploymentSection.cs
- AppSettingsReader.cs
- ImageButton.cs
- TickBar.cs
- FileStream.cs
- MouseGesture.cs
- TextSimpleMarkerProperties.cs
- FixedSOMLineCollection.cs
- WorkingDirectoryEditor.cs
- unitconverter.cs
- KeyManager.cs
- IItemContainerGenerator.cs
- Win32.cs
- TcpChannelHelper.cs
- TextDecorationCollection.cs
- BaseDataListDesigner.cs
- PermissionSet.cs
- XmlKeywords.cs
- DoubleKeyFrameCollection.cs
- TripleDES.cs
- HierarchicalDataTemplate.cs
- XmlStringTable.cs
- Assert.cs
- QilGeneratorEnv.cs
- AnyReturnReader.cs
- WindowInteropHelper.cs
- ProtectedConfiguration.cs
- SessionStateUtil.cs
- ProgressBarHighlightConverter.cs
- XmlSchemaObject.cs
- VisualBrush.cs
- FieldAccessException.cs
- NullableFloatSumAggregationOperator.cs
- ColumnTypeConverter.cs
- Win32.cs
- PrintPageEvent.cs
- RowVisual.cs
- StrokeNodeData.cs
- DateTime.cs
- COM2PropertyDescriptor.cs
- BreakRecordTable.cs
- SeparatorAutomationPeer.cs
- SecurityHelper.cs
- Events.cs
- Activity.cs
- Int32Collection.cs
- UnsafeNativeMethods.cs
- ActivityBuilderHelper.cs
- StringResourceManager.cs