diff options
author | Alexander Köplinger <alex.koeplinger@outlook.com> | 2017-01-20 18:00:56 +0300 |
---|---|---|
committer | Alexander Köplinger <alex.koeplinger@outlook.com> | 2017-01-20 18:00:56 +0300 |
commit | 6f2ce1ddf9661675e4922b31d26989f5d5685151 (patch) | |
tree | 2c755dd0cf5cee53f13b76649428ccc073bd8c88 /mcs/class/referencesource | |
parent | 441f21bf48fa06ff6ac125afde080e7daa7d228d (diff) |
[bcl] Rename FEATURE_MONO_CAS to MONO_FEATURE_CAS
To be consistent with the other MONO_FEATURE_* defines.
Diffstat (limited to 'mcs/class/referencesource')
52 files changed, 154 insertions, 154 deletions
diff --git a/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs b/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs index 9da4616a8d8..e4a511ff143 100644 --- a/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs +++ b/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs @@ -37,7 +37,7 @@ namespace System.Windows.Forms /// </devdoc> internal static class SecurityUtils { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS private static volatile ReflectionPermission memberAccessPermission = null; private static volatile ReflectionPermission restrictedMemberAccessPermission = null; @@ -62,7 +62,7 @@ namespace System.Windows.Forms #endif private static void DemandReflectionAccess(Type type) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { MemberAccessPermission.Demand(); } @@ -74,7 +74,7 @@ namespace System.Windows.Forms [SecuritySafeCritical] private static void DemandGrantSet(Assembly assembly) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet targetGrantSet = assembly.PermissionSet; targetGrantSet.AddPermission(RestrictedMemberAccessPermission); targetGrantSet.Demand(); @@ -82,7 +82,7 @@ namespace System.Windows.Forms } private static bool HasReflectionPermission(Type type) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { DemandReflectionAccess(type); return true; diff --git a/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs b/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs index 5ce6ea5efec..a7b486debff 100644 --- a/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs +++ b/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs @@ -164,7 +164,7 @@ namespace System.Xml.Xsl.XsltOld { // The World of Compile // internal void Compile(NavigatorInput input, XmlResolver xmlResolver, Evidence evidence) { -#if !FEATURE_MONO_CAS +#if !MONO_FEATURE_CAS evidence = null; #endif Debug.Assert(input != null); diff --git a/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs b/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs index 662c1c9130d..1e5ea43e271 100644 --- a/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs +++ b/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs @@ -2125,7 +2125,7 @@ namespace System.Data.Common { [ResourceExposure(ResourceScope.Machine)] [ResourceConsumption(ResourceScope.Machine)] static internal Stream GetFileStream(string filename) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS (new FileIOPermission(FileIOPermissionAccess.Read, filename)).Assert(); try { return new FileStream(filename,FileMode.Open,FileAccess.Read,FileShare.Read); @@ -2141,7 +2141,7 @@ namespace System.Data.Common { [ResourceExposure(ResourceScope.Machine)] [ResourceConsumption(ResourceScope.Machine)] static internal FileVersionInfo GetVersionInfo(string filename) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS (new FileIOPermission(FileIOPermissionAccess.Read, filename)).Assert(); // MDAC 62038 try { return FileVersionInfo.GetVersionInfo(filename); // MDAC 60411 diff --git a/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs b/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs index 6020f65eabe..ae76cafbcec 100644 --- a/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs +++ b/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs @@ -22,7 +22,7 @@ namespace System.Data { internal class XMLSchema { internal static TypeConverter GetConverter(Type type) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS HostProtectionAttribute protAttrib = new HostProtectionAttribute(); protAttrib.SharedState = true; CodeAccessPermission permission = (CodeAccessPermission)protAttrib.CreatePermission(); @@ -32,7 +32,7 @@ namespace System.Data { return TypeDescriptor.GetConverter(type); } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs index b2448b52d74..05b1eb4ad88 100644 --- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs +++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs @@ -580,7 +580,7 @@ namespace System.Runtime.Serialization internal bool RequiresMemberAccessForWrite(SecurityException securityException) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS EnsureMethodsImported(); if (!IsTypeVisible(UnderlyingType)) diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs index b32d295f45b..5f5d04b54e8 100644 --- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs +++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs @@ -1105,7 +1105,7 @@ namespace System.Runtime.Serialization } } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [Fx.Tag.SecurityNote(Critical = "Holds instance of SecurityPermission that we will Demand for SerializationFormatter." + " Should not be modified to something else.")] [SecurityCritical] diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs index b30c82bf34e..fa261fb6f43 100644 --- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs +++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs @@ -89,7 +89,7 @@ namespace System.Runtime.Serialization [SecuritySafeCritical] public void DemandSerializationFormatterPermission() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!demandedSerializationFormatterPermission) { Globals.SerializationFormatterPermission.Demand(); @@ -103,7 +103,7 @@ namespace System.Runtime.Serialization [SecuritySafeCritical] public void DemandMemberAccessPermission() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!demandedMemberAccessPermission) { Globals.MemberAccessPermission.Demand(); diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs index acd6282a73d..7457167122f 100644 --- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs +++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs @@ -496,7 +496,7 @@ namespace System.Runtime.Serialization [MethodImpl(MethodImplOptions.NoInlining)] internal void GetObjectData(ISerializable obj, SerializationInfo serInfo, StreamingContext context) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Demand the serialization formatter permission every time Globals.SerializationFormatterPermission.Demand(); #endif diff --git a/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs b/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs index 260c7c4265c..0d0247fb5e7 100644 --- a/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs +++ b/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs @@ -36,7 +36,7 @@ namespace System.Runtime [SecurityCritical] internal static bool IsInFullTrust() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!SecurityManager.CurrentThreadRequiresSecurityContextCapture()) { return true; @@ -114,7 +114,7 @@ namespace System.Runtime [SecurityCritical] internal static bool CheckAppDomainPermissions(PermissionSet permissions) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS return AppDomain.CurrentDomain.IsHomogenous && permissions.IsSubsetOf(AppDomain.CurrentDomain.PermissionSet); #else @@ -126,7 +126,7 @@ namespace System.Runtime [SecurityCritical] internal static bool HasEtwPermissions() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS //Currently unrestricted permissions are required to create Etw provider. PermissionSet permissions = new PermissionSet(PermissionState.Unrestricted); return CheckAppDomainPermissions(permissions); @@ -142,7 +142,7 @@ namespace System.Runtime [SecuritySafeCritical] get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!checkedForFullTrust) { inFullTrust = AppDomain.CurrentDomain.IsFullyTrusted; diff --git a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs index 21727844bd5..65d601c360f 100644 --- a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs +++ b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs @@ -15,11 +15,11 @@ namespace System.Xml { [PermissionSetAttribute(SecurityAction.InheritanceDemand, Name = "FullTrust")] public partial class XmlSecureResolver : XmlResolver { XmlResolver resolver; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet permissionSet; #endif -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS public XmlSecureResolver(XmlResolver resolver, string securityUrl) : this(resolver, CreateEvidenceForUrl(securityUrl)) {} public XmlSecureResolver(XmlResolver resolver, Evidence evidence) : this(resolver, SecurityManager.GetStandardSandbox(evidence)) {} @@ -31,7 +31,7 @@ namespace System.Xml { public XmlSecureResolver(XmlResolver resolver, PermissionSet permissionSet) { this.resolver = resolver; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS this.permissionSet = permissionSet; #endif } @@ -41,7 +41,7 @@ namespace System.Xml { } public override object GetEntity(Uri absoluteUri, string role, Type ofObjectToReturn) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS permissionSet.PermitOnly(); #endif return resolver.GetEntity(absoluteUri, role, ofObjectToReturn); @@ -54,7 +54,7 @@ namespace System.Xml { } public static Evidence CreateEvidenceForUrl(string securityUrl) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS Evidence evidence = new Evidence(); if (securityUrl != null && securityUrl.Length > 0) { evidence.AddHostEvidence(new Url(securityUrl)); @@ -79,7 +79,7 @@ namespace System.Xml { #endif } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [Serializable] private class UncDirectory : EvidenceBase, IIdentityPermissionFactory { private string uncDir; diff --git a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs index 17b3a199ca5..ebcb399930f 100644 --- a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs +++ b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs @@ -7,7 +7,7 @@ namespace System.Xml { [PermissionSetAttribute(SecurityAction.InheritanceDemand, Name = "FullTrust")] public partial class XmlSecureResolver : XmlResolver { public override Task<object> GetEntityAsync(Uri absoluteUri, string role, Type ofObjectToReturn) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS permissionSet.PermitOnly(); #endif return resolver.GetEntityAsync(absoluteUri, role, ofObjectToReturn); diff --git a/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs b/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs index d81a2745e94..0faa1d89b6a 100644 --- a/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs +++ b/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs @@ -116,7 +116,7 @@ namespace System.Xml.Xsl { if (stylesheet == null) { throw new ArgumentNullException("stylesheet"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (evidence == null) { evidence = new Evidence(); } diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs index e1e0420b28c..ff916de0f43 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs @@ -380,7 +380,7 @@ namespace System.ComponentModel { else { args = new Type[] {receiverType}; } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.FullReflection.Assert(); #endif try { @@ -456,7 +456,7 @@ namespace System.ComponentModel { else { args = new Type[] {receiverType}; } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.FullReflection.Assert(); #endif try { diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs index ad04d77a513..a795ad2d8fa 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs @@ -1163,7 +1163,7 @@ namespace System.ComponentModel { /// a single object to be re-used for more than one type. /// </devdoc> private object CreateInstance(Type type) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if ((!(type.IsPublic || type.IsNestedPublic)) && (type.Assembly == typeof(DebugTypeDescriptor).Assembly)) { IntSecurity.FullReflection.Demand(); } diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs index ac39527d8eb..5125adf9ed1 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs @@ -11,13 +11,13 @@ namespace System.ComponentModel { [HostProtection(SharedState = true)] internal static class IntSecurity { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS public static readonly CodeAccessPermission UnmanagedCode = new SecurityPermission(SecurityPermissionFlag.UnmanagedCode); public static readonly CodeAccessPermission FullReflection = new ReflectionPermission(PermissionState.Unrestricted); #endif public static string UnsafeGetFullPath(string fileName) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS string full = fileName; FileIOPermission fiop = new FileIOPermission(PermissionState.None); diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs index 94424b88b02..005746783a7 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs @@ -419,12 +419,12 @@ namespace System.ComponentModel { else { args = new Type[] {receiverType}; } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.FullReflection.Assert(); try { #endif resetMethod = FindMethod(componentClass, "Reset" + Name, args, typeof(void), /* publicOnly= */ false); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS } finally { CodeAccessPermission.RevertAssert(); @@ -526,13 +526,13 @@ namespace System.ComponentModel { args = new Type[] {receiverType}; } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.FullReflection.Assert(); try { #endif shouldSerializeMethod = FindMethod(componentClass, "ShouldSerialize" + Name, args, typeof(Boolean), /* publicOnly= */ false); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS } finally { CodeAccessPermission.RevertAssert(); diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs index 4061a644a7b..0aa50d23fb2 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs @@ -1635,12 +1635,12 @@ namespace System.ComponentModel { Type converterType = GetTypeFromName(instanceAttr.ConverterTypeName); if (converterType != null && typeof(TypeConverter).IsAssignableFrom(converterType)) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { IntSecurity.FullReflection.Assert(); #endif return (TypeConverter)ReflectTypeDescriptionProvider.CreateInstance(converterType, _type); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS } finally { CodeAccessPermission.RevertAssert(); } @@ -1665,12 +1665,12 @@ namespace System.ComponentModel { Type converterType = GetTypeFromName(typeAttr.ConverterTypeName); if (converterType != null && typeof(TypeConverter).IsAssignableFrom(converterType)) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { IntSecurity.FullReflection.Assert(); #endif _converter = (TypeConverter)ReflectTypeDescriptionProvider.CreateInstance(converterType, _type); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS } finally { CodeAccessPermission.RevertAssert(); } diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs index 17c7e0f4077..0783e121a8b 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs @@ -365,7 +365,7 @@ namespace System.ComponentModel { throw new ArgumentNullException("type"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None); typeDescriptorPermission.AddPermission(new TypeDescriptorPermission(TypeDescriptorPermissionFlags.RestrictedRegistrationAccess)); @@ -401,7 +401,7 @@ namespace System.ComponentModel { throw new ArgumentNullException("instance"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS Type type = instance.GetType(); PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None); @@ -475,12 +475,12 @@ namespace System.ComponentModel // sense that they provide a public API while not necessarily being public themselves. As such, // we need to allow instantiation of internal TypeDescriptionProviders. See the thread attached // to VSWhidbey #500522 for a more detailed discussion. -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.FullReflection.Assert(); try { #endif prov = (TypeDescriptionProvider)Activator.CreateInstance(providerType); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS } finally { CodeAccessPermission.RevertAssert(); @@ -3244,7 +3244,7 @@ namespace System.ComponentModel { throw new ArgumentNullException("type"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None); typeDescriptorPermission.AddPermission(new TypeDescriptorPermission(TypeDescriptorPermissionFlags.RestrictedRegistrationAccess)); @@ -3279,7 +3279,7 @@ namespace System.ComponentModel { throw new ArgumentNullException("instance"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS Type type = instance.GetType(); PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None); diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs index aa7a3d002a7..1563ec3f39f 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs @@ -75,7 +75,7 @@ namespace System.ComponentModel { } protected Win32Exception(SerializationInfo info, StreamingContext context) : base (info, context) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS IntSecurity.UnmanagedCode.Demand(); #endif nativeErrorCode = info.GetInt32("NativeErrorCode"); diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs index aff4d8f9fd1..385c7e96aef 100644 --- a/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs +++ b/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs @@ -93,7 +93,7 @@ namespace System.ComponentModel.Design { Debug.WriteLineIf(RuntimeLicenseContextSwitch.TraceVerbose,"rawfile: " + rawFile); string codeBase; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // FileIOPermission is required for ApplicationBase in URL-hosted domains FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted); perm.Assert(); @@ -133,7 +133,7 @@ namespace System.ComponentModel.Design { // file://fullpath/foo.exe // string fileName; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted); perm.Assert(); try @@ -166,7 +166,7 @@ namespace System.ComponentModel.Design { else if(!resourceAssembly.IsDynamic) { // EscapedCodeBase won't be supported by emitted assemblies anyway Debug.WriteLineIf(RuntimeLicenseContextSwitch.TraceVerbose,"resourceAssembly is not null"); string fileName; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted); perm.Assert(); #endif @@ -176,7 +176,7 @@ namespace System.ComponentModel.Design { } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -258,7 +258,7 @@ namespace System.ComponentModel.Design { static Stream OpenRead(Uri resourceUri) { Stream result = null; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet perms = new PermissionSet(PermissionState.Unrestricted); perms.Assert(); @@ -271,7 +271,7 @@ namespace System.ComponentModel.Design { catch (Exception e) { Debug.Fail(e.ToString()); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS finally { CodeAccessPermission.RevertAssert(); } diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs index 879c5040a6e..61b0f305587 100644 --- a/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs +++ b/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs @@ -30,7 +30,7 @@ namespace System.Diagnostics { public static TraceListenerCollection Listeners { [HostProtection(SharedState=true)] get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Do a full damand new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); #endif @@ -113,7 +113,7 @@ namespace System.Diagnostics { /// </devdoc> [System.Diagnostics.Conditional("TRACE")] public static void Close() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Do a full damand new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); #endif diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs index dfa24dcd135..6d2d6adac96 100644 --- a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs +++ b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs @@ -30,7 +30,7 @@ namespace System.Diagnostics { get { if (stackTrace == null) stackTrace = Environment.StackTrace; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS else new EnvironmentPermission(PermissionState.Unrestricted).Demand(); #endif @@ -77,7 +77,7 @@ namespace System.Diagnostics { [ResourceExposure(ResourceScope.None)] [ResourceConsumption(ResourceScope.Machine, ResourceScope.Machine)] private static void InitProcessInfo() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Demand unmanaged code permission new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); #endif diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs index 1a4cd98d961..1ff316c4c44 100644 --- a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs +++ b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs @@ -64,7 +64,7 @@ namespace System.Diagnostics { internal static string AppName { get { if (appName == null) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new EnvironmentPermission(EnvironmentPermissionAccess.Read, "Path").Assert(); #endif appName = Path.GetFileName(Environment.GetCommandLineArgs()[0]); diff --git a/mcs/class/referencesource/System/misc/SecurityUtils.cs b/mcs/class/referencesource/System/misc/SecurityUtils.cs index 5b622d1768e..f4349335eec 100644 --- a/mcs/class/referencesource/System/misc/SecurityUtils.cs +++ b/mcs/class/referencesource/System/misc/SecurityUtils.cs @@ -60,7 +60,7 @@ namespace System.Windows.Forms } private static void DemandReflectionAccess(Type type) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { MemberAccessPermission.Demand(); } @@ -72,7 +72,7 @@ namespace System.Windows.Forms [SecuritySafeCritical] private static void DemandGrantSet(Assembly assembly) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet targetGrantSet = assembly.PermissionSet; targetGrantSet.AddPermission(RestrictedMemberAccessPermission); targetGrantSet.Demand(); diff --git a/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs b/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs index 4413414603e..18b5ecda538 100644 --- a/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs +++ b/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs @@ -139,7 +139,7 @@ namespace System.Net { set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.ControlPolicyPermission.Demand(); #endif Instance.CredentialPolicy = value; @@ -205,7 +205,7 @@ namespace System.Net { /// </devdoc> public static void Register(IAuthenticationModule authenticationModule) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.UnmanagedPermission.Demand(); #endif Instance.Register(authenticationModule); @@ -216,7 +216,7 @@ namespace System.Net { /// </devdoc> public static void Unregister(IAuthenticationModule authenticationModule) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.UnmanagedPermission.Demand(); #endif Instance.Unregister(authenticationModule); @@ -227,7 +227,7 @@ namespace System.Net { /// </devdoc> public static void Unregister(string authenticationScheme) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.UnmanagedPermission.Demand(); #endif Instance.Unregister(authenticationScheme); diff --git a/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs b/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs index 9f8eda80a01..9983998c82e 100644 --- a/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs +++ b/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs @@ -302,7 +302,7 @@ namespace System.Net { get { //This check will not allow to use local user credentials at will. //Hence the username will not be exposed to the network -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new EnvironmentPermission(EnvironmentPermissionAccess.Read, "USERNAME").Demand(); #endif return SystemNetworkCredential.defaultCredential; @@ -313,7 +313,7 @@ namespace System.Net { get { //This check will not allow to use local user credentials at will. //Hence the username will not be exposed to the network -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new EnvironmentPermission(EnvironmentPermissionAccess.Read, "USERNAME").Demand(); #endif return SystemNetworkCredential.defaultCredential; diff --git a/mcs/class/referencesource/System/net/System/Net/Internal.cs b/mcs/class/referencesource/System/net/System/Net/Internal.cs index 3a966ba76ce..16018faf77c 100644 --- a/mcs/class/referencesource/System/net/System/Net/Internal.cs +++ b/mcs/class/referencesource/System/net/System/Net/Internal.cs @@ -143,7 +143,7 @@ namespace System.Net { private static void DemandCallback(object state) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ((CodeAccessPermission) state).Demand(); #endif } @@ -968,7 +968,7 @@ namespace System.Net { internal static class ExceptionHelper { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS internal static readonly KeyContainerPermission KeyContainerPermissionOpen = new KeyContainerPermission(KeyContainerPermissionFlags.Open); internal static readonly WebPermission WebPermissionUnrestricted = new WebPermission(NetworkAccess.Connect); internal static readonly SecurityPermission UnmanagedPermission = new SecurityPermission(SecurityPermissionFlag.UnmanagedCode); diff --git a/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs b/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs index 3f9b4d7c8c8..7326fc95b5e 100644 --- a/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs +++ b/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs @@ -26,7 +26,7 @@ namespace System.Net { /// </devdoc> public class NetworkCredential : ICredentials,ICredentialsByHost { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS private static volatile EnvironmentPermission m_environmentUserNamePermission; private static volatile EnvironmentPermission m_environmentDomainNamePermission; private static readonly object lockingObject = new object(); @@ -91,7 +91,7 @@ namespace System.Net { } #endif //!FEATURE_PAL -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS void InitializePart1() { if (m_environmentUserNamePermission == null) { lock(lockingObject) { @@ -111,7 +111,7 @@ namespace System.Net { /// </devdoc> public string UserName { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS InitializePart1(); m_environmentUserNamePermission.Demand(); #endif @@ -133,7 +133,7 @@ namespace System.Net { /// </devdoc> public string Password { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.UnmanagedPermission.Demand(); #endif return InternalGetPassword(); @@ -162,7 +162,7 @@ namespace System.Net { /// </devdoc> public SecureString SecurePassword { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.UnmanagedPermission.Demand(); #endif return InternalGetSecurePassword().Copy(); @@ -184,7 +184,7 @@ namespace System.Net { /// </devdoc> public string Domain { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS InitializePart1(); m_environmentDomainNamePermission.Demand(); #endif diff --git a/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs b/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs index 828f60745a6..c6dd34f86d7 100644 --- a/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs +++ b/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs @@ -8,7 +8,7 @@ namespace System.Net.NetworkInformation { /// Returns objects that describe the network interfaces on the local computer. public static NetworkInterface[] GetAllNetworkInterfaces(){ -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS (new NetworkInformationPermission(NetworkInformationAccess.Read)).Demand(); #endif return SystemNetworkInterface.GetNetworkInterfaces(); diff --git a/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs b/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs index 2995de9113d..fda7b1632e8 100644 --- a/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs +++ b/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs @@ -93,7 +93,7 @@ namespace System.Net { return m_BindIPEndPointDelegate; } set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.InfrastructurePermission.Demand(); #endif m_BindIPEndPointDelegate = value; @@ -460,7 +460,7 @@ namespace System.Net { throw new NotSupportedException(SR.GetString(SR.net_servicePointAddressNotSupportedInHostMode)); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Don't let low-trust apps discover the proxy information. if (m_ProxyServicePoint) { diff --git a/mcs/class/referencesource/System/net/System/Net/WebRequest.cs b/mcs/class/referencesource/System/net/System/Net/WebRequest.cs index 9f1444146c1..40f5fa6ba95 100644 --- a/mcs/class/referencesource/System/net/System/Net/WebRequest.cs +++ b/mcs/class/referencesource/System/net/System/Net/WebRequest.cs @@ -365,7 +365,7 @@ namespace System.Net { throw new ArgumentNullException("creator"); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif @@ -622,7 +622,7 @@ namespace System.Net { return RequestCacheManager.GetBinding(string.Empty).Policy; } set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // This is a replacement of RequestCachePermission demand since we are not including the latest in the product. ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif @@ -1108,7 +1108,7 @@ namespace System.Net { { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return InternalDefaultWebProxy; @@ -1116,7 +1116,7 @@ namespace System.Net { set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif InternalDefaultWebProxy = value; @@ -1128,7 +1128,7 @@ namespace System.Net { // public static IWebProxy GetSystemWebProxy() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return InternalGetSystemWebProxy(); diff --git a/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs b/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs index 58400b2b26f..d89639b3457 100644 --- a/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs +++ b/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs @@ -381,7 +381,7 @@ namespace System.Net.Security { // demand the same permissions, then we should remove our // demand here. // - #if FEATURE_MONO_CAS + #if MONO_FEATURE_CAS ExceptionHelper.KeyContainerPermissionOpen.Demand(); #endif @@ -437,7 +437,7 @@ namespace System.Net.Security { // For v 1.1 compat We want to ensure the store is opened under the **process** acount. // try { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS using (WindowsIdentity.Impersonate(IntPtr.Zero)) #endif { @@ -583,7 +583,7 @@ namespace System.Net.Security { // Note: We call a user certificate selection delegate under permission // assert but the signature of the delegate is unique so it's safe // - #if FEATURE_MONO_CAS + #if MONO_FEATURE_CAS [StorePermission(SecurityAction.Assert, Unrestricted=true)] #endif private bool AcquireClientCredentials(ref byte[] thumbPrint) @@ -832,7 +832,7 @@ namespace System.Net.Security { // Note: We call a user certificate selection delegate under permission // assert but the signature of the delegate is unique so it's safe // - #if FEATURE_MONO_CAS + #if MONO_FEATURE_CAS [StorePermission(SecurityAction.Assert, Unrestricted=true)] #endif private bool AcquireServerCredentials(ref byte[] thumbPrint) @@ -919,7 +919,7 @@ namespace System.Net.Security { // // For v 1.1 compat We want to ensure the credential are accessed under >>process<< acount. // -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS using (WindowsIdentity.Impersonate(IntPtr.Zero)) #endif { @@ -1298,7 +1298,7 @@ namespace System.Net.Security { //SECURITY: The scenario is allowed in semitrust StorePermission is asserted for Chain.Build // A user callback has unique signature so it is safe to call it under permisison assert. // - #if FEATURE_MONO_CAS + #if MONO_FEATURE_CAS [StorePermission(SecurityAction.Assert, Unrestricted=true)] #endif internal bool VerifyRemoteCertificate(RemoteCertValidationCallback remoteCertValidationCallback) diff --git a/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs b/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs index e9410023641..246c28afb5c 100644 --- a/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs +++ b/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs @@ -43,7 +43,7 @@ namespace System.Net { // public override int Count { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return m_SyncTable.Count; @@ -108,7 +108,7 @@ namespace System.Net { // public override ICollection Keys { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return m_SyncTable.Keys; @@ -118,7 +118,7 @@ namespace System.Net { public override object SyncRoot { [HostProtection(Synchronization=true)] get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return m_SyncTable; @@ -127,7 +127,7 @@ namespace System.Net { // public override ICollection Values { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif if (m_ValuesWrapper == null) @@ -144,7 +144,7 @@ namespace System.Net { } // public override void Clear() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif m_SyncTable.Clear(); @@ -156,7 +156,7 @@ namespace System.Net { } // public override bool ContainsValue(string value) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif foreach (SpnToken spnToken in m_SyncTable.Values) @@ -169,7 +169,7 @@ namespace System.Net { // We have to unwrap the SpnKey and just expose the Spn public override void CopyTo(Array array, int index) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif CheckCopyToArguments(array, index, Count); @@ -183,7 +183,7 @@ namespace System.Net { } // public override IEnumerator GetEnumerator() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif @@ -211,7 +211,7 @@ namespace System.Net { try { Uri uri = new Uri(key); key = uri.GetParts(UriComponents.Scheme | UriComponents.Host | UriComponents.Port | UriComponents.Path, UriFormat.SafeUnescaped); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new WebPermission(NetworkAccess.Connect, new Uri(key)).Demand(); #endif } diff --git a/mcs/class/referencesource/System/net/System/Net/webclient.cs b/mcs/class/referencesource/System/net/System/Net/webclient.cs index 9b21455fab7..96cf1c91007 100644 --- a/mcs/class/referencesource/System/net/System/Net/webclient.cs +++ b/mcs/class/referencesource/System/net/System/Net/webclient.cs @@ -238,7 +238,7 @@ namespace System.Net { /// </devdoc> public IWebProxy Proxy { get { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif if (!m_ProxySet) { @@ -248,7 +248,7 @@ namespace System.Net { } } set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif m_Proxy = value; diff --git a/mcs/class/referencesource/System/net/System/Net/webproxy.cs b/mcs/class/referencesource/System/net/System/Net/webproxy.cs index e433783951c..b4ec154380d 100644 --- a/mcs/class/referencesource/System/net/System/Net/webproxy.cs +++ b/mcs/class/referencesource/System/net/System/Net/webproxy.cs @@ -414,7 +414,7 @@ namespace System.Net { /// </devdoc> [Obsolete("This method has been deprecated. Please use the proxy selected for you by default. http://go.microsoft.com/fwlink/?linkid=14202")] public static WebProxy GetDefaultProxy() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif return new WebProxy(true); @@ -437,7 +437,7 @@ namespace System.Net { if (useRegistry) { // just make the proxy advanced, don't populate with any settings // note - this will happen in the context of the user performing the deserialization (their proxy settings get read) -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.WebPermissionUnrestricted.Demand(); #endif UnsafeUpdateFromRegistry(); diff --git a/mcs/class/referencesource/System/net/System/UriScheme.cs b/mcs/class/referencesource/System/net/System/UriScheme.cs index 009eef57702..b2d459a9283 100644 --- a/mcs/class/referencesource/System/net/System/UriScheme.cs +++ b/mcs/class/referencesource/System/net/System/UriScheme.cs @@ -166,7 +166,7 @@ namespace System { // public static void Register(UriParser uriParser, string schemeName, int defaultPort) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ExceptionHelper.InfrastructurePermission.Demand(); #endif if (uriParser == null) diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs index 8d93ee8c2d0..7ee9e535544 100644 --- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs +++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs @@ -405,7 +405,7 @@ namespace System.Text.RegularExpressions { * This method is internal virtual so the jit does not inline it. */ [ -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS HostProtection(MayLeakOnAbort=true), #endif MethodImplAttribute(MethodImplOptions.NoInlining) @@ -1252,7 +1252,7 @@ namespace System.Text.RegularExpressions { #if !(SILVERLIGHT || FULL_AOT_RUNTIME) /// <devdoc> /// </devdoc> -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [HostProtection(MayLeakOnAbort=true)] #endif [ResourceExposure(ResourceScope.Machine)] // The AssemblyName is interesting. @@ -1265,7 +1265,7 @@ namespace System.Text.RegularExpressions { /// <devdoc> /// </devdoc> -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [HostProtection(MayLeakOnAbort=true)] #endif [ResourceExposure(ResourceScope.Machine)] // The AssemblyName is interesting. @@ -1275,7 +1275,7 @@ namespace System.Text.RegularExpressions { CompileToAssemblyInternal(regexinfos, assemblyname, attributes, null); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [HostProtection(MayLeakOnAbort=true)] #endif [ResourceExposure(ResourceScope.Machine)] diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs index 6d603688023..5a60311ee31 100644 --- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs +++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs @@ -131,7 +131,7 @@ namespace System.Text.RegularExpressions { // <SECREVIEW> Regex only generates string manipulation, so this is ok. // </SECREVIEW> -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new ReflectionPermission(PermissionState.Unrestricted).Assert(); #endif try { @@ -172,7 +172,7 @@ namespace System.Text.RegularExpressions { #endif } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -197,14 +197,14 @@ namespace System.Text.RegularExpressions { // <SECREVIEW> Regex only generates string manipulation, so this is ok. // </SECREVIEW> -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new ReflectionPermission(PermissionState.Unrestricted).Assert(); #endif try { factory = c.FactoryInstanceFromCode(code, options); } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -239,7 +239,7 @@ namespace System.Text.RegularExpressions { Type factory; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new ReflectionPermission(PermissionState.Unrestricted).Assert(); #endif try { @@ -247,7 +247,7 @@ namespace System.Text.RegularExpressions { c.GenerateRegexType(pattern, options, fullname, regexes[i].IsPublic, code, tree, factory, mTimeout); } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -3051,7 +3051,7 @@ namespace System.Text.RegularExpressions { // SECREVIEW : Regex only generates string manipulation, so this is // : ok. // -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new ReflectionPermission(PermissionState.Unrestricted).Assert(); #endif try { @@ -3063,7 +3063,7 @@ namespace System.Text.RegularExpressions { CustomAttributeBuilder transparencyAttribute = new CustomAttributeBuilder(transparencyCtor, new object[0]); assemblyAttributes.Add(transparencyAttribute); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS ConstructorInfo securityRulesCtor = typeof(SecurityRulesAttribute).GetConstructor(new Type[] { typeof(SecurityRuleSet) }); CustomAttributeBuilder securityRulesAttribute = new CustomAttributeBuilder(securityRulesCtor, new object[] { SecurityRuleSet.Level2 }); @@ -3089,7 +3089,7 @@ namespace System.Text.RegularExpressions { } } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs index 037486b36d8..a20e05cfd1f 100644 --- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs +++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs @@ -77,7 +77,7 @@ namespace System.Text.RegularExpressions { /// multiple threads.</para> /// </devdoc> #if !SILVERLIGHT -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [HostProtection(Synchronization=true)] #endif static public Group Synchronized(Group inner) { diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs index f6c8d5cce12..eedca2de00a 100644 --- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs +++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs @@ -201,7 +201,7 @@ namespace System.Text.RegularExpressions { /// </devdoc> #if !SILVERLIGHT -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS [HostProtection(Synchronization=true)] #endif static public Match Synchronized(Match inner) { diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs index 46131cf7ab9..1e1490d23de 100644 --- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs +++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs @@ -28,7 +28,7 @@ namespace System.Text.RegularExpressions { protected internal override RegexRunner CreateInstance() { CompiledRegexRunner runner = new CompiledRegexRunner(); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new ReflectionPermission(PermissionState.Unrestricted).Assert(); #endif runner.SetDelegates((NoParamDelegate) goMethod.CreateDelegate(typeof(NoParamDelegate)), diff --git a/mcs/class/referencesource/mscorlib/system/exception.cs b/mcs/class/referencesource/mscorlib/system/exception.cs index 8bab3650892..c23bc452847 100644 --- a/mcs/class/referencesource/mscorlib/system/exception.cs +++ b/mcs/class/referencesource/mscorlib/system/exception.cs @@ -989,7 +989,7 @@ namespace System { [System.Security.SecurityCritical] // auto-generated internal virtual String InternalToString() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS try { #pragma warning disable 618 diff --git a/mcs/class/referencesource/mscorlib/system/io/__error.cs b/mcs/class/referencesource/mscorlib/system/io/__error.cs index a7a35c642dd..253ab9e4dab 100644 --- a/mcs/class/referencesource/mscorlib/system/io/__error.cs +++ b/mcs/class/referencesource/mscorlib/system/io/__error.cs @@ -92,7 +92,7 @@ namespace System.IO { bool safeToReturn = false; try { if (!isInvalidPath) { -#if !FEATURE_CORECLR && FEATURE_MONO_CAS +#if !FEATURE_CORECLR && MONO_FEATURE_CAS FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, path, false, false); #endif safeToReturn = true; diff --git a/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs b/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs index cb2f144af24..fa273972ca2 100644 --- a/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs +++ b/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs @@ -130,7 +130,7 @@ namespace System.IO { [System.Security.SecurityCritical] // auto-generated private FileInfo(SerializationInfo info, StreamingContext context) : base(info, context) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if !FEATURE_CORECLR FileIOPermission.QuickDemand(FileIOPermissionAccess.Read, FullPath, false, false); #endif @@ -187,7 +187,7 @@ namespace System.IO { String directoryName = Path.GetDirectoryName(FullPath); if (directoryName != null) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, DisplayPath, FullPath); state.EnsureState(); @@ -338,7 +338,7 @@ namespace System.IO { [ResourceConsumption(ResourceScope.Machine, ResourceScope.Machine)] public override void Delete() { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Write, DisplayPath, FullPath); state.EnsureState(); diff --git a/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs b/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs index 4889350563b..4fb11990051 100644 --- a/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs +++ b/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs @@ -233,7 +233,7 @@ namespace System.IO // Do a demand on the combined path so that we can fail early in case of deny demandPaths[1] = Directory.GetDemandDir(normalizedSearchPath, true); _checkHost = checkHost; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR if (checkHost) { @@ -350,7 +350,7 @@ namespace System.IO // For filters like foo\*.cs we need to verify if the directory foo is not denied access. // Do a demand on the combined path so that we can fail early in case of deny demandPaths[1] = Directory.GetDemandDir(normalizedSearchPath, true); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR if (checkHost) { @@ -637,7 +637,7 @@ namespace System.IO [System.Security.SecurityCritical] internal void DoDemand(String fullPathToDemand) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR if(_checkHost) { String demandDir = Directory.GetDemandDir(fullPathToDemand, true); @@ -757,7 +757,7 @@ namespace System.IO internal override FileInfo CreateObject(SearchResult result) { String name = result.FullPath; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, name); state.EnsureState(); @@ -785,7 +785,7 @@ namespace System.IO String name = result.FullPath; String permissionName = name + "\\."; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, permissionName); state.EnsureState(); @@ -823,7 +823,7 @@ namespace System.IO String name = result.FullPath; String permissionName = name + "\\."; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, permissionName); state.EnsureState(); @@ -840,7 +840,7 @@ namespace System.IO Contract.Assert(isFile); String name = result.FullPath; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, name); state.EnsureState(); diff --git a/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs b/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs index 6dd5ab02b85..946f26a82a6 100644 --- a/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs +++ b/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs @@ -18,7 +18,7 @@ using System; using System.Collections; using System.Security; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS using System.Security.Permissions; #endif using Microsoft.Win32; @@ -30,7 +30,7 @@ using System.Diagnostics.Contracts; namespace System.IO { [Serializable] -#if !FEATURE_CORECLR && FEATURE_MONO_CAS +#if !FEATURE_CORECLR && MONO_FEATURE_CAS [FileIOPermissionAttribute(SecurityAction.InheritanceDemand,Unrestricted=true)] #endif [ComVisible(true)] @@ -108,7 +108,7 @@ namespace System.IO { demandDir = Directory.GetDemandDir(FullPath, true); else demandDir = FullPath; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if FEATURE_CORECLR FileSecurityState sourceState = new FileSecurityState(FileSecurityStateAccess.PathDiscovery, String.Empty, demandDir); sourceState.EnsureState(); @@ -132,7 +132,7 @@ namespace System.IO { demandDir = Directory.GetDemandDir(FullPath, true); else demandDir = FullPath; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if !FEATURE_CORECLR FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, demandDir); #endif @@ -359,7 +359,7 @@ namespace System.IO { [System.Security.SecuritySafeCritical] #endif set { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if !FEATURE_CORECLR FileIOPermission.QuickDemand(FileIOPermissionAccess.Write, FullPath); #endif @@ -392,7 +392,7 @@ namespace System.IO { [ComVisible(false)] public virtual void GetObjectData(SerializationInfo info, StreamingContext context) { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS #if !FEATURE_CORECLR FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, FullPath); #endif diff --git a/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs b/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs index 786e7af959a..d283428109c 100644 --- a/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs +++ b/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs @@ -163,7 +163,7 @@ namespace System.IO { if (_isOpen) { throw new InvalidOperationException(Environment.GetResourceString("InvalidOperation_CalledTwice")); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!skipSecurityCheck) { #pragma warning disable 618 new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); @@ -244,7 +244,7 @@ namespace System.IO { if (_isOpen) throw new InvalidOperationException(Environment.GetResourceString("InvalidOperation_CalledTwice")); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (!skipSecurityCheck) #pragma warning disable 618 new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); diff --git a/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs b/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs index 350cb47cb47..bf8ede79742 100644 --- a/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs +++ b/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs @@ -51,7 +51,7 @@ namespace System.Resources { // Don't use Assembly manifest, but grovel on disk for a file. try { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new System.Security.Permissions.FileIOPermission(System.Security.Permissions.PermissionState.Unrestricted).Assert(); #endif @@ -79,7 +79,7 @@ namespace System.Resources { } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS System.Security.CodeAccessPermission.RevertAssert(); #endif } diff --git a/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs b/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs index e63dd0d3c57..c80ee838d40 100644 --- a/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs +++ b/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs @@ -350,13 +350,13 @@ namespace System.Resources { // write to the temp directory (enforced via a Windows ACL). Fall back to a MemoryStream. Stream dataSection = null; // Either a FileStream or a MemoryStream String tempFile = null; -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet permSet = new PermissionSet(PermissionState.None); permSet.AddPermission(new EnvironmentPermission(PermissionState.Unrestricted)); permSet.AddPermission(new FileIOPermission(PermissionState.Unrestricted)); #endif try { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS permSet.Assert(); #endif tempFile = Path.GetTempFileName(); @@ -375,7 +375,7 @@ namespace System.Resources { dataSection = new MemoryStream(); } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS PermissionSet.RevertAssert(); #endif } diff --git a/mcs/class/referencesource/mscorlib/system/rttype.cs b/mcs/class/referencesource/mscorlib/system/rttype.cs index d5d396481fa..097e2cfe1ce 100644 --- a/mcs/class/referencesource/mscorlib/system/rttype.cs +++ b/mcs/class/referencesource/mscorlib/system/rttype.cs @@ -5329,7 +5329,7 @@ namespace System throw new MissingMethodException(Environment.GetResourceString("MissingConstructor_Name", FullName)); } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // If we're creating a delegate, we're about to call a // constructor taking an integer to represent a target // method. Since this is very difficult (and expensive) @@ -5360,7 +5360,7 @@ namespace System new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); #endif // FEATURE_CORECLR } -#endif // FEATURE_MONO_CAS +#endif // MONO_FEATURE_CAS if (invokeMethod.GetParametersNoCopy().Length == 0) { if (args.Length != 0) diff --git a/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs b/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs index dd983a383ef..1f1389a3a13 100644 --- a/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs +++ b/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs @@ -110,7 +110,7 @@ namespace System.Runtime.InteropServices { return null; #endif String dir = GetRuntimeDirectoryImpl(); -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS new FileIOPermission(FileIOPermissionAccess.PathDiscovery, dir).Demand(); #endif return dir; @@ -143,7 +143,7 @@ namespace System.Runtime.InteropServices { String path = sb.ToString(); #endif -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // Do security check new FileIOPermission(FileIOPermissionAccess.PathDiscovery, path).Demand(); #endif diff --git a/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs b/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs index 0205e307d15..b7b13667dca 100644 --- a/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs +++ b/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs @@ -73,7 +73,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { private BinaryMethodReturn binaryMethodReturn; private bool bIsCrossAppDomain; #endif -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS private static FileIOPermission sfileIOPermission = new FileIOPermission(PermissionState.Unrestricted); #endif private SerStack ValueFixupStack @@ -1368,7 +1368,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { if (bSimpleAssembly) { try { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS sfileIOPermission.Assert(); #endif try { @@ -1379,7 +1379,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { #endif // FEATURE_FUSION } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -1396,14 +1396,14 @@ namespace System.Runtime.Serialization.Formatters.Binary { else { try { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS sfileIOPermission.Assert(); #endif try { assm = Assembly.Load(assemblyName); } finally { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS CodeAccessPermission.RevertAssert(); #endif } @@ -1518,7 +1518,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { if ( !FormatterServices.UnsafeTypeForwardersIsEnabled() && sourceAssembly != destAssembly ) { // we have a type forward to attribute ! -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // we can try to see if the dest assembly has less permissionSet if (!destAssembly.PermissionSet.IsSubsetOf(sourceAssembly.PermissionSet)) #endif @@ -1538,7 +1538,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { typeFowardedFromAssembly = Assembly.Load(typeInfo.AssemblyString); } catch { } -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS if (typeFowardedFromAssembly != sourceAssembly) { // throw security exception @@ -1548,7 +1548,7 @@ namespace System.Runtime.Serialization.Formatters.Binary { } else { -#if FEATURE_MONO_CAS +#if MONO_FEATURE_CAS // throw security exception throw new SecurityException() { Demanded = sourceAssembly.PermissionSet }; #endif |