Welcome to mirror list, hosted at ThFree Co, Russian Federation.

StaticFileHandler.cs « System.Web « referencesource « class « mcs - github.com/mono/mono.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 679709b439b0b0ecad2ef56a15c1850b61fdf32a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
//------------------------------------------------------------------------------
// <copyright file="StaticFileHandler.cs" company="Microsoft">
//     Copyright (c) Microsoft Corporation.  All rights reserved.
// </copyright>                                                                
//------------------------------------------------------------------------------

/*
 * Static File Handler
 * 
 * Copyright (c) 1999 Microsoft Corporation
 */

namespace System.Web {
    using System;
    using System.Text;
    using System.Threading;
    using System.Runtime.InteropServices;
    using System.Security;
    using System.IO;
    using System.Collections;
    using System.Web.Hosting;
    using System.Web.Util;
    using System.Globalization;
    
    internal struct ByteRange {
        internal long Offset;
        internal long Length;
    }

    internal static class HttpStatus {
        internal const int Unauthorized            =   401;
        internal const int Forbidden               =   403;
        internal const int NotFound                =   404;
    }

    /////////////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////////////

    internal class StaticFileHandler : IHttpHandler {
        
        private const string RANGE_BOUNDARY = "<q1w2e3r4t5y6u7i8o9p0zaxscdvfbgnhmjklkl>";
        private const string MULTIPART_CONTENT_TYPE = "multipart/byteranges; boundary=<q1w2e3r4t5y6u7i8o9p0zaxscdvfbgnhmjklkl>";
        private const string MULTIPART_RANGE_DELIMITER = "--<q1w2e3r4t5y6u7i8o9p0zaxscdvfbgnhmjklkl>\r\n";
        private const string MULTIPART_RANGE_END = "--<q1w2e3r4t5y6u7i8o9p0zaxscdvfbgnhmjklkl>--\r\n\r\n";
        private const string CONTENT_RANGE_FORMAT = "bytes {0}-{1}/{2}";
        private const int MAX_RANGE_ALLOWED = 5;

        private const int ERROR_ACCESS_DENIED     = 5;

        internal StaticFileHandler() {
        }
        
        private static bool IsOutDated(string ifRangeHeader, DateTime lastModified) {
            try {
                DateTime utcLastModified = lastModified.ToUniversalTime();
                DateTime utc = HttpDate.UtcParse(ifRangeHeader);
                return (utc < utcLastModified);
            } 
            catch { 
                return true;
            }
        }

        private static string GenerateETag(HttpContext context, DateTime lastModified, DateTime now) {
            // Get 64-bit FILETIME stamp
            long lastModFileTime = lastModified.ToFileTime();
            long nowFileTime = now.ToFileTime();
            string hexFileTime = lastModFileTime.ToString("X8", CultureInfo.InvariantCulture);

            // Do what IIS does to determine if this is a weak ETag.
            // Compare the last modified time to now and if the difference is
            // less than or equal to 3 seconds, then it is weak
            if ((nowFileTime - lastModFileTime) <= 30000000) {
                return "W/\"" + hexFileTime + "\"";
            }
            return  "\"" + hexFileTime + "\"";
        }

        private static FileInfo GetFileInfo(string virtualPathWithPathInfo, string physicalPath, HttpResponse response) {
            // Check whether the file exists
            if (!FileUtil.FileExists(physicalPath)) {
                throw new HttpException(HttpStatus.NotFound, 
                                        SR.GetString(SR.File_does_not_exist));
            }
            // To prevent the trailing dot problem, error out all file names with trailing dot.
            if (physicalPath[physicalPath.Length-1] == '.') {
                throw new HttpException(HttpStatus.NotFound,
                                        SR.GetString(SR.File_does_not_exist));
            }

            FileInfo fileInfo;
            try {
                fileInfo  = new FileInfo( physicalPath );
            }
            catch (IOException ioEx) {
                if (!HttpRuntime.HasFilePermission(physicalPath))
                    throw new HttpException(HttpStatus.NotFound, 
                                            SR.GetString(SR.Error_trying_to_enumerate_files));
                else
                    throw new HttpException(HttpStatus.NotFound, 
                                            SR.GetString(SR.Error_trying_to_enumerate_files), 
                                            ioEx);
            }
            catch (SecurityException  secEx) {
                if (!HttpRuntime.HasFilePermission(physicalPath))
                    throw new HttpException(HttpStatus.Unauthorized,
                                            SR.GetString(SR.File_enumerator_access_denied));
                else
                    throw new HttpException(HttpStatus.Unauthorized,
                                            SR.GetString(SR.File_enumerator_access_denied),
                                            secEx);
            }

            // To be consistent with IIS, we won't serve out hidden files
            if ((((int)fileInfo.Attributes) & ((int)FileAttributes.Hidden)) != 0) {
                throw new HttpException(HttpStatus.NotFound,
                                        SR.GetString(SR.File_is_hidden));
            }

            // If the file is a directory, then it must not have a slash in
            // end of it (if it does have a slash suffix, then the config file
            // mappings are missing and we will just return 403.  Otherwise, 
            // we will redirect the client to the URL with this slash.
            if ((((int)fileInfo.Attributes) & ((int)FileAttributes.Directory)) != 0) {
                if (StringUtil.StringEndsWith(virtualPathWithPathInfo, '/')) {
                    // Just return 403
                    throw new HttpException(HttpStatus.Forbidden,
                                            SR.GetString(SR.Missing_star_mapping));
                }
                else {
                    // Redirect to a slash suffixed URL which will be 
                    // handled by the */ handler mapper
                    response.Redirect(virtualPathWithPathInfo + "/");
                }
            }

            return fileInfo;
        }

        // initial space characters are skipped, and the string of digits up until the first non-digit
        // are converted to a long.  If digits are found the method returns true; otherwise false.
        private static bool GetLongFromSubstring(string s, ref int startIndex, out long result) {
            result = 0;

            // get index of first digit
            MovePastSpaceCharacters(s, ref startIndex);
            int beginIndex = startIndex;

            // get index of last digit
            MovePastDigits(s, ref startIndex);
            int endIndex = startIndex - 1;

            // are there any digits?
            if (endIndex < beginIndex) {
                return false;
            }

            long multipleOfTen = 1;
            for(int i = endIndex; i >= beginIndex; i--) {
                int digit = s[i] - '0';
                result += digit * multipleOfTen;
                multipleOfTen *= 10;
                // check for overflow
                if (result < 0) {
                    return false;
                }
            }
            return true;
        }

        // The Range header consists of one or more byte range specifiers.  E.g, "Range: bytes=0-1024,-1024" is a request
        // for the first and last 1024 bytes of a file. Before this method is called, startIndex points to the beginning
        // of a byte range specifier; and afterwards it points to the beginning of the next byte range specifier.  
        // If the current byte range specifier is syntactially inavlid, this function will return false indicating that the 
        // Range header must be ignored.  If the function returns true, then the byte range specifier will be converted to 
        // an offset and length, and the startIndex will be incremented to the next byte range specifier.  The byte range 
        // specifier (offset and length) returned by this function is satisfiable if and only if isSatisfiable is true.
        private static bool GetNextRange(string rangeHeader, ref int startIndex, long fileLength, out long offset, out long length, out bool isSatisfiable) {
            // startIndex is first char after '=', or first char after ','
            Debug.Assert(startIndex < rangeHeader.Length, "startIndex < rangeHeader.Length");

            offset = 0;
            length = 0;
            isSatisfiable = false;

            // A Range request to an empty file is never satisfiable, and will always receive a 416 status.
            if (fileLength <= 0) {
                // put startIndex at end of string so we don't try to call GetNextRange again
                startIndex = rangeHeader.Length;
                return true;
            }

            MovePastSpaceCharacters(rangeHeader, ref startIndex);

            if (startIndex < rangeHeader.Length && rangeHeader[startIndex] == '-') {
                // this range is of the form "-mmm"
                startIndex++;
                if (!GetLongFromSubstring(rangeHeader, ref startIndex, out length)) {
                    return false;
                }
                if (length > fileLength) {
                    // send entire file
                    offset = 0;
                    length = fileLength;                    
                }
                else {
                    // send last N bytes
                    offset = fileLength - length;
                }
                isSatisfiable = IsRangeSatisfiable(offset, length, fileLength);
                // we parsed the current range, but need to successfully move the startIndex to the next range
                return IncrementToNextRange(rangeHeader, ref startIndex);
            }
            else {
                // this range is of the form "nnn-[mmm]"
                if (!GetLongFromSubstring(rangeHeader, ref startIndex, out offset)) {
                    return false;
                }
                // increment startIndex past '-'
                if (startIndex < rangeHeader.Length && rangeHeader[startIndex] == '-') {
                    startIndex++;                    
                }
                else {
                    return false;
                }
                long endPos;
                if (!GetLongFromSubstring(rangeHeader, ref startIndex, out endPos)) {
                    // assume range is of form "nnn-".  If it isn't,
                    // the call to IncrementToNextRange will return false
                    length = fileLength - offset;
                }
                else {
                    // if...greater than or equal to the current length of the entity-body, last-byte-pos 
                    // is taken to be equal to one less than the current length of the entity- body in bytes.
                    if (endPos > fileLength - 1) {
                        endPos = fileLength - 1;
                    }

                    length = endPos - offset + 1;

                    if (length < 1) {
                        // the byte range specifier is syntactially invalid 
                        // because the last-byte-pos < first-byte-pos
                        return false;
                    }
                }
                isSatisfiable = IsRangeSatisfiable(offset, length, fileLength);
                // we parsed the current range, but need to successfully move the startIndex to the next range      
                return IncrementToNextRange(rangeHeader, ref startIndex);
            }
        }

        private static bool IncrementToNextRange(string s, ref int startIndex) {
            // increment startIndex until next token and return true, unless the syntax is invalid
            MovePastSpaceCharacters(s, ref startIndex);
            if (startIndex < s.Length) {
                if (s[startIndex] != ',') {
                    return false;
                }
                // move to first char after ','
                startIndex++;
            }
            return true;
        }

        private static bool IsRangeSatisfiable(long offset, long length, long fileLength) {
            return (offset < fileLength && length > 0);
        }

        public bool IsReusable {
            get { return true; }
        }

        private static bool IsSecurityError(int ErrorCode) {
            return(ErrorCode == ERROR_ACCESS_DENIED);
        }

        private static void MovePastSpaceCharacters(string s, ref int startIndex) {
            while (startIndex < s.Length && s[startIndex] == ' ') {
                startIndex++;
            }
        }

        private static void MovePastDigits(string s, ref int startIndex) {
            while (startIndex < s.Length && s[startIndex] <= '9' && s[startIndex] >= '0') {
                startIndex++;
            }
        }

        public void ProcessRequest(HttpContext context) {
            ProcessRequestInternal(context, overrideVirtualPath: null);
        }

        private static bool ProcessRequestForNonMapPathBasedVirtualFile(HttpRequest request, HttpResponse response, string overrideVirtualPath) {
            bool handled = false;

            // only process custom virtual path providers here
            if (HostingEnvironment.UsingMapPathBasedVirtualPathProvider) {
                return handled;
            }

            VirtualFile virtualFile = null;
            String virtualPath = (overrideVirtualPath == null) ? request.FilePath : overrideVirtualPath;

            if (HostingEnvironment.VirtualPathProvider.FileExists(virtualPath)) {
                virtualFile = HostingEnvironment.VirtualPathProvider.GetFile(virtualPath);
            }
            
            if (virtualFile == null) {
                Debug.Trace("StaticFileHandler", "Virtual file " + virtualPath + " not found");
                throw new HttpException( HttpStatus.NotFound, 
                                         SR.GetString(SR.File_does_not_exist) );
            }

            // if we have a MapPathBasedVirtualFile, we can handle it the normal way
            if (virtualFile is MapPathBasedVirtualFile) {
                return handled;
            }

            Debug.Trace("StaticFileHandler", "Using VirtualPathProvider for " + virtualPath);

            response.WriteVirtualFile(virtualFile);
            response.ContentType = MimeMapping.GetMimeMapping(virtualPath);
            handled = true;
            return handled;
        }

        internal static bool ProcessRangeRequest(HttpContext context,
                                                 string physicalPath,
                                                 long fileLength,
                                                 string rangeHeader,
                                                 string etag,
                                                 DateTime lastModified) {
            HttpRequest request = context.Request;
            HttpResponse response = context.Response;
            bool handled = false;

            // return "416 Requested range not satisfiable" if the file length is zero.
            if (fileLength <= 0) {
                SendRangeNotSatisfiable(response, fileLength);
                handled = true;
                return handled;
            }

            string ifRangeHeader = request.Headers["If-Range"];
            if (ifRangeHeader != null && ifRangeHeader.Length > 1) {
                // Is this an ETag or a Date? We only need to check two 
                // characters; an ETag either begins with W/ or it is quoted.
                if (ifRangeHeader[0] == '"') {
                    // it's a strong ETag
                    if (ifRangeHeader != etag) {
                        // the etags do not match, and we will therefore return the entire response
                        return handled;
                    }
                }
                else if (ifRangeHeader[0] == 'W' && ifRangeHeader[1] == '/') {
                    // it's a weak ETag, and is therefore not usable for sub-range retrieval and
                    // we will return the entire response
                    return handled;
                }
                else {
                    // It's a date. If it is greater than or equal to the last-write time of the file, we can send the range.
                    if (IsOutDated(ifRangeHeader, lastModified)) {
                        return handled;
                    }
                }
            }

            // the expected format is "bytes = <range1>[, <range2>, ...]"
            // where <range> is "<first_byte_pos>-[<last_byte_pos>]" or "-<last_n_bytes>".
            int indexOfEquals = rangeHeader.IndexOf('=');
            if (indexOfEquals == -1 || indexOfEquals == rangeHeader.Length - 1) {
                //invalid syntax
                return handled;
            }
            
            // iterate through the byte ranges and write each satisfiable range to the response
            int startIndex = indexOfEquals + 1;
            bool isRangeHeaderSyntacticallyValid = true;
            long offset;
            long length;
            bool isSatisfiable;
            bool exceededMax = false;
            ByteRange[] byteRanges = null;
            int byteRangesCount = 0;
            long totalBytes = 0;
            while (startIndex < rangeHeader.Length && isRangeHeaderSyntacticallyValid) {
                isRangeHeaderSyntacticallyValid = GetNextRange(rangeHeader, ref startIndex, fileLength, out offset, out length, out isSatisfiable);
                if (!isRangeHeaderSyntacticallyValid) {
                    break;
                }
                if (!isSatisfiable) {
                    continue;
                }
                if (byteRanges == null) {
                    byteRanges = new ByteRange[16];
                }
                if (byteRangesCount >= byteRanges.Length) {
                    // grow byteRanges array
                    ByteRange[] buffer = new ByteRange[byteRanges.Length * 2];
                    int byteCount = byteRanges.Length * Marshal.SizeOf(byteRanges[0]);
                    unsafe {
                        fixed (ByteRange * src = byteRanges, dst = buffer) {
                            StringUtil.memcpyimpl((byte*)src, (byte*)dst, byteCount);
                        }
                    }
                    byteRanges = buffer;
                }
                byteRanges[byteRangesCount].Offset = offset;
                byteRanges[byteRangesCount].Length = length;
                byteRangesCount++;
                // IIS imposes this limitation too, and sends "400 Bad Request" if exceeded
                totalBytes += length;
                if (totalBytes > fileLength * MAX_RANGE_ALLOWED) {
                    exceededMax = true;
                    break;
                }
            }
            
            if (!isRangeHeaderSyntacticallyValid) {
                return handled;
            }

            if (exceededMax) {
                SendBadRequest(response);
                handled = true;
                return handled;
            }

            if (byteRangesCount == 0) {
                // we parsed the Range header and found no satisfiable byte ranges, so return "416 Requested Range Not Satisfiable"
                SendRangeNotSatisfiable(response, fileLength);
                handled = true;
                return handled;
            }

            string contentType = MimeMapping.GetMimeMapping(physicalPath);
            if (byteRangesCount == 1) {
                offset = byteRanges[0].Offset;
                length = byteRanges[0].Length;
                response.ContentType = contentType;
                string contentRange = String.Format(CultureInfo.InvariantCulture, CONTENT_RANGE_FORMAT, offset, offset + length - 1, fileLength);
                response.AppendHeader("Content-Range", contentRange);

                SendFile(physicalPath, offset, length, fileLength, context);
            }
            else {
                response.ContentType = MULTIPART_CONTENT_TYPE;
                string contentRange;
                string partialContentType = "Content-Type: " + contentType + "\r\n";
                for(int i = 0; i < byteRangesCount; i++) {
                    offset = byteRanges[i].Offset;
                    length = byteRanges[i].Length;
                    response.Write(MULTIPART_RANGE_DELIMITER);
                    response.Write(partialContentType);
                    response.Write("Content-Range: ");
                    contentRange = String.Format(CultureInfo.InvariantCulture, CONTENT_RANGE_FORMAT, offset, offset + length - 1, fileLength);
                    response.Write(contentRange);
                    response.Write("\r\n\r\n");
                    SendFile(physicalPath, offset, length, fileLength, context);
                    response.Write("\r\n");
                }
                response.Write(MULTIPART_RANGE_END);
            }

            // if we make it here, we're sending a "206 Partial Content" status
            response.StatusCode = 206;
            response.AppendHeader("Last-Modified", HttpUtility.FormatHttpDateTime(lastModified));
            response.AppendHeader("Accept-Ranges", "bytes");
            response.AppendHeader("ETag", etag);
            response.AppendHeader("Cache-Control", "public");

            handled = true;
            return handled;
        }

        internal static void ProcessRequestInternal(HttpContext context, string overrideVirtualPath) {
            HttpRequest request = context.Request;
            HttpResponse response = context.Response;
            string virtualPathWithPathInfo;
            string physicalPath;
            FileInfo fileInfo;
            long fileLength;
            DateTime lastModifiedInUtc;
            string etag;
            string rangeHeader;

            // custom virtual path providers that don't yeild a MapPathBasedVirtualFile 
            // are a special case, and do not support TransmitFile, WriteFile, Range requests, 
            // or the cache policy that we apply below
            if (ProcessRequestForNonMapPathBasedVirtualFile(request, response, overrideVirtualPath)) {
                return;
            }
            
            if (overrideVirtualPath == null) {
                virtualPathWithPathInfo = request.Path;
                physicalPath = request.PhysicalPath;
            }
            else {
                virtualPathWithPathInfo = overrideVirtualPath;
                physicalPath = request.MapPath(overrideVirtualPath);
            }

            Debug.Trace("StaticFileHandler", "Path= " + virtualPathWithPathInfo + ", PhysicalPath= " + physicalPath);

            fileInfo = GetFileInfo(virtualPathWithPathInfo, physicalPath, response);

            // Determine Last Modified Time.  We might need it soon 
            // if we encounter a Range: and If-Range header
            // Using UTC time to avoid daylight savings time 
            lastModifiedInUtc = new DateTime(fileInfo.LastWriteTimeUtc.Year,
                                        fileInfo.LastWriteTimeUtc.Month,
                                        fileInfo.LastWriteTimeUtc.Day,
                                        fileInfo.LastWriteTimeUtc.Hour,
                                        fileInfo.LastWriteTimeUtc.Minute,
                                        fileInfo.LastWriteTimeUtc.Second,
                                        0,
                                        DateTimeKind.Utc);
            
            // Because we can't set a "Last-Modified" header to any time
            // in the future, check the last modified time and set it to
            // DateTime.Now if it's in the future. 
            // This is to fix VSWhidbey #402323
            DateTime utcNow = DateTime.UtcNow;
            if (lastModifiedInUtc > utcNow) {
                // use 1 second resolution
                lastModifiedInUtc = new DateTime(utcNow.Ticks - (utcNow.Ticks % TimeSpan.TicksPerSecond), DateTimeKind.Utc);
            }

            etag = GenerateETag(context, lastModifiedInUtc, utcNow);
            fileLength = fileInfo.Length;

            // is this a Range request?
            rangeHeader = request.Headers["Range"];
            if (StringUtil.StringStartsWithIgnoreCase(rangeHeader, "bytes")
                && ProcessRangeRequest(context,
                                       physicalPath,
                                       fileLength,
                                       rangeHeader,
                                       etag,
                                       lastModifiedInUtc)) {
                return;
            }

            // if we get this far, we're sending the entire file
            SendFile(physicalPath, 0, fileLength, fileLength, context);

            // Specify content type. Use extension to do the mapping
            response.ContentType = MimeMapping.GetMimeMapping(physicalPath);
            // Static file handler supports byte ranges
            response.AppendHeader("Accept-Ranges", "bytes");
            // We want to flush cache entry when static file has changed
            response.AddFileDependency(physicalPath);
            // Set IgnoreRangeRequests to avoid serving Range requests from the output cache.
            // Note that the kernel cache always ignores Range requests.
            response.Cache.SetIgnoreRangeRequests();
            // Set an expires in the future.
            response.Cache.SetExpires(utcNow.AddDays(1));
            // always set Last-Modified
            response.Cache.SetLastModified(lastModifiedInUtc);
            // always set ETag
            response.Cache.SetETag(etag); 
            // always set Cache-Control to public
            response.Cache.SetCacheability(HttpCacheability.Public);
        }

        private static void SendBadRequest(HttpResponse response) {
            response.StatusCode = 400;
            response.Write("<html><body>Bad Request</body></html>");
        }

        private static void SendRangeNotSatisfiable(HttpResponse response, long fileLength) {
            response.StatusCode = 416;
            response.ContentType = null;
            response.AppendHeader("Content-Range", "bytes */" + fileLength.ToString(NumberFormatInfo.InvariantInfo));
        }

        private static void SendFile(string physicalPath, long offset, long length, long fileLength, HttpContext context) {
            try {
                // When not hosted on IIS, TransmitFile sends bytes in memory similar to WriteFile
                HttpRuntime.CheckFilePermission(physicalPath);
                context.Response.TransmitFile(physicalPath, offset, length);
            }
            catch (ExternalException e) {
                // Check for ERROR_ACCESS_DENIED and set the HTTP 
                // status such that the auth modules do their thing
                if (IsSecurityError(e.ErrorCode)) {
                    throw new HttpException(HttpStatus.Unauthorized, 
                                            SR.GetString(SR.Resource_access_forbidden));
                }
                throw;
            }
        }
    }
}