Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/mono/mono.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlexander Köplinger <alex.koeplinger@outlook.com>2017-01-20 18:00:56 +0300
committerAlexander Köplinger <alex.koeplinger@outlook.com>2017-01-20 18:00:56 +0300
commit6f2ce1ddf9661675e4922b31d26989f5d5685151 (patch)
tree2c755dd0cf5cee53f13b76649428ccc073bd8c88 /mcs/class/referencesource
parent441f21bf48fa06ff6ac125afde080e7daa7d228d (diff)
[bcl] Rename FEATURE_MONO_CAS to MONO_FEATURE_CAS
To be consistent with the other MONO_FEATURE_* defines.
Diffstat (limited to 'mcs/class/referencesource')
-rw-r--r--mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs8
-rw-r--r--mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs2
-rw-r--r--mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs4
-rw-r--r--mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs4
-rw-r--r--mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs2
-rw-r--r--mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs2
-rw-r--r--mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs4
-rw-r--r--mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs2
-rw-r--r--mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs8
-rw-r--r--mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs12
-rw-r--r--mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs2
-rw-r--r--mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs2
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs4
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs2
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs4
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs8
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs8
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs12
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs2
-rw-r--r--mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs12
-rw-r--r--mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs4
-rw-r--r--mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs4
-rw-r--r--mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs2
-rw-r--r--mcs/class/referencesource/System/misc/SecurityUtils.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs8
-rw-r--r--mcs/class/referencesource/System/net/System/Net/CredentialCache.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/Net/Internal.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs12
-rw-r--r--mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs2
-rw-r--r--mcs/class/referencesource/System/net/System/Net/ServicePoint.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/Net/WebRequest.cs10
-rw-r--r--mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs12
-rw-r--r--mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs18
-rw-r--r--mcs/class/referencesource/System/net/System/Net/webclient.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/Net/webproxy.cs4
-rw-r--r--mcs/class/referencesource/System/net/System/UriScheme.cs2
-rw-r--r--mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs8
-rw-r--r--mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs18
-rw-r--r--mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs2
-rw-r--r--mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs2
-rw-r--r--mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs2
-rw-r--r--mcs/class/referencesource/mscorlib/system/exception.cs2
-rw-r--r--mcs/class/referencesource/mscorlib/system/io/__error.cs2
-rw-r--r--mcs/class/referencesource/mscorlib/system/io/fileinfo.cs6
-rw-r--r--mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs14
-rw-r--r--mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs12
-rw-r--r--mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs4
-rw-r--r--mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs4
-rw-r--r--mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs6
-rw-r--r--mcs/class/referencesource/mscorlib/system/rttype.cs4
-rw-r--r--mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs4
-rw-r--r--mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs16
52 files changed, 154 insertions, 154 deletions
diff --git a/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs b/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs
index 9da4616a8d8..e4a511ff143 100644
--- a/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs
+++ b/mcs/class/referencesource/System.Data.Linq/misc/SecurityUtils.cs
@@ -37,7 +37,7 @@ namespace System.Windows.Forms
/// </devdoc>
internal static class SecurityUtils {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
private static volatile ReflectionPermission memberAccessPermission = null;
private static volatile ReflectionPermission restrictedMemberAccessPermission = null;
@@ -62,7 +62,7 @@ namespace System.Windows.Forms
#endif
private static void DemandReflectionAccess(Type type) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try {
MemberAccessPermission.Demand();
}
@@ -74,7 +74,7 @@ namespace System.Windows.Forms
[SecuritySafeCritical]
private static void DemandGrantSet(Assembly assembly) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet targetGrantSet = assembly.PermissionSet;
targetGrantSet.AddPermission(RestrictedMemberAccessPermission);
targetGrantSet.Demand();
@@ -82,7 +82,7 @@ namespace System.Windows.Forms
}
private static bool HasReflectionPermission(Type type) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try {
DemandReflectionAccess(type);
return true;
diff --git a/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs b/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs
index 5ce6ea5efec..a7b486debff 100644
--- a/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs
+++ b/mcs/class/referencesource/System.Data.SqlXml/System/Xml/Xsl/XsltOld/Compiler.cs
@@ -164,7 +164,7 @@ namespace System.Xml.Xsl.XsltOld {
// The World of Compile
//
internal void Compile(NavigatorInput input, XmlResolver xmlResolver, Evidence evidence) {
-#if !FEATURE_MONO_CAS
+#if !MONO_FEATURE_CAS
evidence = null;
#endif
Debug.Assert(input != null);
diff --git a/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs b/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs
index 662c1c9130d..1e5ea43e271 100644
--- a/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs
+++ b/mcs/class/referencesource/System.Data/System/Data/Common/AdapterUtil.cs
@@ -2125,7 +2125,7 @@ namespace System.Data.Common {
[ResourceExposure(ResourceScope.Machine)]
[ResourceConsumption(ResourceScope.Machine)]
static internal Stream GetFileStream(string filename) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
(new FileIOPermission(FileIOPermissionAccess.Read, filename)).Assert();
try {
return new FileStream(filename,FileMode.Open,FileAccess.Read,FileShare.Read);
@@ -2141,7 +2141,7 @@ namespace System.Data.Common {
[ResourceExposure(ResourceScope.Machine)]
[ResourceConsumption(ResourceScope.Machine)]
static internal FileVersionInfo GetVersionInfo(string filename) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
(new FileIOPermission(FileIOPermissionAccess.Read, filename)).Assert(); // MDAC 62038
try {
return FileVersionInfo.GetVersionInfo(filename); // MDAC 60411
diff --git a/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs b/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs
index 6020f65eabe..ae76cafbcec 100644
--- a/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs
+++ b/mcs/class/referencesource/System.Data/System/Data/XMLSchema.cs
@@ -22,7 +22,7 @@ namespace System.Data {
internal class XMLSchema {
internal static TypeConverter GetConverter(Type type) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
HostProtectionAttribute protAttrib = new HostProtectionAttribute();
protAttrib.SharedState = true;
CodeAccessPermission permission = (CodeAccessPermission)protAttrib.CreatePermission();
@@ -32,7 +32,7 @@ namespace System.Data {
return TypeDescriptor.GetConverter(type);
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs
index b2448b52d74..05b1eb4ad88 100644
--- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs
+++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/ClassDataContract.cs
@@ -580,7 +580,7 @@ namespace System.Runtime.Serialization
internal bool RequiresMemberAccessForWrite(SecurityException securityException)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
EnsureMethodsImported();
if (!IsTypeVisible(UnderlyingType))
diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs
index b32d295f45b..5f5d04b54e8 100644
--- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs
+++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/Globals.cs
@@ -1105,7 +1105,7 @@ namespace System.Runtime.Serialization
}
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[Fx.Tag.SecurityNote(Critical = "Holds instance of SecurityPermission that we will Demand for SerializationFormatter."
+ " Should not be modified to something else.")]
[SecurityCritical]
diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs
index b30c82bf34e..fa261fb6f43 100644
--- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs
+++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerContext.cs
@@ -89,7 +89,7 @@ namespace System.Runtime.Serialization
[SecuritySafeCritical]
public void DemandSerializationFormatterPermission()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!demandedSerializationFormatterPermission)
{
Globals.SerializationFormatterPermission.Demand();
@@ -103,7 +103,7 @@ namespace System.Runtime.Serialization
[SecuritySafeCritical]
public void DemandMemberAccessPermission()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!demandedMemberAccessPermission)
{
Globals.MemberAccessPermission.Demand();
diff --git a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs
index acd6282a73d..7457167122f 100644
--- a/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs
+++ b/mcs/class/referencesource/System.Runtime.Serialization/System/Runtime/Serialization/XmlObjectSerializerWriteContext.cs
@@ -496,7 +496,7 @@ namespace System.Runtime.Serialization
[MethodImpl(MethodImplOptions.NoInlining)]
internal void GetObjectData(ISerializable obj, SerializationInfo serInfo, StreamingContext context)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Demand the serialization formatter permission every time
Globals.SerializationFormatterPermission.Demand();
#endif
diff --git a/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs b/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs
index 260c7c4265c..0d0247fb5e7 100644
--- a/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs
+++ b/mcs/class/referencesource/System.ServiceModel.Internals/System/Runtime/PartialTrustHelpers.cs
@@ -36,7 +36,7 @@ namespace System.Runtime
[SecurityCritical]
internal static bool IsInFullTrust()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!SecurityManager.CurrentThreadRequiresSecurityContextCapture())
{
return true;
@@ -114,7 +114,7 @@ namespace System.Runtime
[SecurityCritical]
internal static bool CheckAppDomainPermissions(PermissionSet permissions)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
return AppDomain.CurrentDomain.IsHomogenous &&
permissions.IsSubsetOf(AppDomain.CurrentDomain.PermissionSet);
#else
@@ -126,7 +126,7 @@ namespace System.Runtime
[SecurityCritical]
internal static bool HasEtwPermissions()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
//Currently unrestricted permissions are required to create Etw provider.
PermissionSet permissions = new PermissionSet(PermissionState.Unrestricted);
return CheckAppDomainPermissions(permissions);
@@ -142,7 +142,7 @@ namespace System.Runtime
[SecuritySafeCritical]
get
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!checkedForFullTrust)
{
inFullTrust = AppDomain.CurrentDomain.IsFullyTrusted;
diff --git a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs
index 21727844bd5..65d601c360f 100644
--- a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs
+++ b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolver.cs
@@ -15,11 +15,11 @@ namespace System.Xml {
[PermissionSetAttribute(SecurityAction.InheritanceDemand, Name = "FullTrust")]
public partial class XmlSecureResolver : XmlResolver {
XmlResolver resolver;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet permissionSet;
#endif
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
public XmlSecureResolver(XmlResolver resolver, string securityUrl) : this(resolver, CreateEvidenceForUrl(securityUrl)) {}
public XmlSecureResolver(XmlResolver resolver, Evidence evidence) : this(resolver, SecurityManager.GetStandardSandbox(evidence)) {}
@@ -31,7 +31,7 @@ namespace System.Xml {
public XmlSecureResolver(XmlResolver resolver, PermissionSet permissionSet) {
this.resolver = resolver;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
this.permissionSet = permissionSet;
#endif
}
@@ -41,7 +41,7 @@ namespace System.Xml {
}
public override object GetEntity(Uri absoluteUri, string role, Type ofObjectToReturn) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
permissionSet.PermitOnly();
#endif
return resolver.GetEntity(absoluteUri, role, ofObjectToReturn);
@@ -54,7 +54,7 @@ namespace System.Xml {
}
public static Evidence CreateEvidenceForUrl(string securityUrl) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
Evidence evidence = new Evidence();
if (securityUrl != null && securityUrl.Length > 0) {
evidence.AddHostEvidence(new Url(securityUrl));
@@ -79,7 +79,7 @@ namespace System.Xml {
#endif
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[Serializable]
private class UncDirectory : EvidenceBase, IIdentityPermissionFactory {
private string uncDir;
diff --git a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs
index 17b3a199ca5..ebcb399930f 100644
--- a/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs
+++ b/mcs/class/referencesource/System.Xml/System/Xml/XmlSecureResolverAsync.cs
@@ -7,7 +7,7 @@ namespace System.Xml {
[PermissionSetAttribute(SecurityAction.InheritanceDemand, Name = "FullTrust")]
public partial class XmlSecureResolver : XmlResolver {
public override Task<object> GetEntityAsync(Uri absoluteUri, string role, Type ofObjectToReturn) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
permissionSet.PermitOnly();
#endif
return resolver.GetEntityAsync(absoluteUri, role, ofObjectToReturn);
diff --git a/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs b/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs
index d81a2745e94..0faa1d89b6a 100644
--- a/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs
+++ b/mcs/class/referencesource/System.Xml/System/Xml/Xslt/XslTransform.cs
@@ -116,7 +116,7 @@ namespace System.Xml.Xsl {
if (stylesheet == null) {
throw new ArgumentNullException("stylesheet");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (evidence == null) {
evidence = new Evidence();
}
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs
index e1e0420b28c..ff916de0f43 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugReflectPropertyDescriptor.cs
@@ -380,7 +380,7 @@ namespace System.ComponentModel {
else {
args = new Type[] {receiverType};
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.FullReflection.Assert();
#endif
try {
@@ -456,7 +456,7 @@ namespace System.ComponentModel {
else {
args = new Type[] {receiverType};
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.FullReflection.Assert();
#endif
try {
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs
index ad04d77a513..a795ad2d8fa 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/DebugTypeDescriptor.cs
@@ -1163,7 +1163,7 @@ namespace System.ComponentModel {
/// a single object to be re-used for more than one type.
/// </devdoc>
private object CreateInstance(Type type) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if ((!(type.IsPublic || type.IsNestedPublic)) && (type.Assembly == typeof(DebugTypeDescriptor).Assembly)) {
IntSecurity.FullReflection.Demand();
}
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs
index ac39527d8eb..5125adf9ed1 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/IntSecurity.cs
@@ -11,13 +11,13 @@ namespace System.ComponentModel {
[HostProtection(SharedState = true)]
internal static class IntSecurity {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
public static readonly CodeAccessPermission UnmanagedCode = new SecurityPermission(SecurityPermissionFlag.UnmanagedCode);
public static readonly CodeAccessPermission FullReflection = new ReflectionPermission(PermissionState.Unrestricted);
#endif
public static string UnsafeGetFullPath(string fileName) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
string full = fileName;
FileIOPermission fiop = new FileIOPermission(PermissionState.None);
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs
index 94424b88b02..005746783a7 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectPropertyDescriptor.cs
@@ -419,12 +419,12 @@ namespace System.ComponentModel {
else {
args = new Type[] {receiverType};
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.FullReflection.Assert();
try {
#endif
resetMethod = FindMethod(componentClass, "Reset" + Name, args, typeof(void), /* publicOnly= */ false);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
}
finally {
CodeAccessPermission.RevertAssert();
@@ -526,13 +526,13 @@ namespace System.ComponentModel {
args = new Type[] {receiverType};
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.FullReflection.Assert();
try {
#endif
shouldSerializeMethod = FindMethod(componentClass, "ShouldSerialize" + Name,
args, typeof(Boolean), /* publicOnly= */ false);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
}
finally {
CodeAccessPermission.RevertAssert();
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs
index 4061a644a7b..0aa50d23fb2 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/ReflectTypeDescriptionProvider.cs
@@ -1635,12 +1635,12 @@ namespace System.ComponentModel {
Type converterType = GetTypeFromName(instanceAttr.ConverterTypeName);
if (converterType != null && typeof(TypeConverter).IsAssignableFrom(converterType))
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try {
IntSecurity.FullReflection.Assert();
#endif
return (TypeConverter)ReflectTypeDescriptionProvider.CreateInstance(converterType, _type);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
} finally {
CodeAccessPermission.RevertAssert();
}
@@ -1665,12 +1665,12 @@ namespace System.ComponentModel {
Type converterType = GetTypeFromName(typeAttr.ConverterTypeName);
if (converterType != null && typeof(TypeConverter).IsAssignableFrom(converterType))
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try {
IntSecurity.FullReflection.Assert();
#endif
_converter = (TypeConverter)ReflectTypeDescriptionProvider.CreateInstance(converterType, _type);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
} finally {
CodeAccessPermission.RevertAssert();
}
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs
index 17c7e0f4077..0783e121a8b 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/TypeDescriptor.cs
@@ -365,7 +365,7 @@ namespace System.ComponentModel
{
throw new ArgumentNullException("type");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None);
typeDescriptorPermission.AddPermission(new TypeDescriptorPermission(TypeDescriptorPermissionFlags.RestrictedRegistrationAccess));
@@ -401,7 +401,7 @@ namespace System.ComponentModel
{
throw new ArgumentNullException("instance");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
Type type = instance.GetType();
PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None);
@@ -475,12 +475,12 @@ namespace System.ComponentModel
// sense that they provide a public API while not necessarily being public themselves. As such,
// we need to allow instantiation of internal TypeDescriptionProviders. See the thread attached
// to VSWhidbey #500522 for a more detailed discussion.
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.FullReflection.Assert();
try {
#endif
prov = (TypeDescriptionProvider)Activator.CreateInstance(providerType);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
}
finally {
CodeAccessPermission.RevertAssert();
@@ -3244,7 +3244,7 @@ namespace System.ComponentModel
{
throw new ArgumentNullException("type");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None);
typeDescriptorPermission.AddPermission(new TypeDescriptorPermission(TypeDescriptorPermissionFlags.RestrictedRegistrationAccess));
@@ -3279,7 +3279,7 @@ namespace System.ComponentModel
{
throw new ArgumentNullException("instance");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
Type type = instance.GetType();
PermissionSet typeDescriptorPermission = new PermissionSet(PermissionState.None);
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs
index aa7a3d002a7..1563ec3f39f 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/Win32Exception.cs
@@ -75,7 +75,7 @@ namespace System.ComponentModel {
}
protected Win32Exception(SerializationInfo info, StreamingContext context) : base (info, context) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
IntSecurity.UnmanagedCode.Demand();
#endif
nativeErrorCode = info.GetInt32("NativeErrorCode");
diff --git a/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs b/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs
index aff4d8f9fd1..385c7e96aef 100644
--- a/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs
+++ b/mcs/class/referencesource/System/compmod/system/componentmodel/design/DesigntimeLicenseContext.cs
@@ -93,7 +93,7 @@ namespace System.ComponentModel.Design {
Debug.WriteLineIf(RuntimeLicenseContextSwitch.TraceVerbose,"rawfile: " + rawFile);
string codeBase;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// FileIOPermission is required for ApplicationBase in URL-hosted domains
FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted);
perm.Assert();
@@ -133,7 +133,7 @@ namespace System.ComponentModel.Design {
// file://fullpath/foo.exe
//
string fileName;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted);
perm.Assert();
try
@@ -166,7 +166,7 @@ namespace System.ComponentModel.Design {
else if(!resourceAssembly.IsDynamic) { // EscapedCodeBase won't be supported by emitted assemblies anyway
Debug.WriteLineIf(RuntimeLicenseContextSwitch.TraceVerbose,"resourceAssembly is not null");
string fileName;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
FileIOPermission perm = new FileIOPermission(PermissionState.Unrestricted);
perm.Assert();
#endif
@@ -176,7 +176,7 @@ namespace System.ComponentModel.Design {
}
finally
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -258,7 +258,7 @@ namespace System.ComponentModel.Design {
static Stream OpenRead(Uri resourceUri) {
Stream result = null;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet perms = new PermissionSet(PermissionState.Unrestricted);
perms.Assert();
@@ -271,7 +271,7 @@ namespace System.ComponentModel.Design {
catch (Exception e) {
Debug.Fail(e.ToString());
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
finally {
CodeAccessPermission.RevertAssert();
}
diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs
index 879c5040a6e..61b0f305587 100644
--- a/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs
+++ b/mcs/class/referencesource/System/compmod/system/diagnostics/Trace.cs
@@ -30,7 +30,7 @@ namespace System.Diagnostics {
public static TraceListenerCollection Listeners {
[HostProtection(SharedState=true)]
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Do a full damand
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
#endif
@@ -113,7 +113,7 @@ namespace System.Diagnostics {
/// </devdoc>
[System.Diagnostics.Conditional("TRACE")]
public static void Close() {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Do a full damand
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
#endif
diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs
index dfa24dcd135..6d2d6adac96 100644
--- a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs
+++ b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceEventCache.cs
@@ -30,7 +30,7 @@ namespace System.Diagnostics {
get {
if (stackTrace == null)
stackTrace = Environment.StackTrace;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
else
new EnvironmentPermission(PermissionState.Unrestricted).Demand();
#endif
@@ -77,7 +77,7 @@ namespace System.Diagnostics {
[ResourceExposure(ResourceScope.None)]
[ResourceConsumption(ResourceScope.Machine, ResourceScope.Machine)]
private static void InitProcessInfo() {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Demand unmanaged code permission
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
#endif
diff --git a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs
index 1a4cd98d961..1ff316c4c44 100644
--- a/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs
+++ b/mcs/class/referencesource/System/compmod/system/diagnostics/TraceInternal.cs
@@ -64,7 +64,7 @@ namespace System.Diagnostics {
internal static string AppName {
get {
if (appName == null) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new EnvironmentPermission(EnvironmentPermissionAccess.Read, "Path").Assert();
#endif
appName = Path.GetFileName(Environment.GetCommandLineArgs()[0]);
diff --git a/mcs/class/referencesource/System/misc/SecurityUtils.cs b/mcs/class/referencesource/System/misc/SecurityUtils.cs
index 5b622d1768e..f4349335eec 100644
--- a/mcs/class/referencesource/System/misc/SecurityUtils.cs
+++ b/mcs/class/referencesource/System/misc/SecurityUtils.cs
@@ -60,7 +60,7 @@ namespace System.Windows.Forms
}
private static void DemandReflectionAccess(Type type) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try {
MemberAccessPermission.Demand();
}
@@ -72,7 +72,7 @@ namespace System.Windows.Forms
[SecuritySafeCritical]
private static void DemandGrantSet(Assembly assembly) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet targetGrantSet = assembly.PermissionSet;
targetGrantSet.AddPermission(RestrictedMemberAccessPermission);
targetGrantSet.Demand();
diff --git a/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs b/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs
index 4413414603e..18b5ecda538 100644
--- a/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs
+++ b/mcs/class/referencesource/System/net/System/Net/AuthenticationManager.cs
@@ -139,7 +139,7 @@ namespace System.Net {
set
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.ControlPolicyPermission.Demand();
#endif
Instance.CredentialPolicy = value;
@@ -205,7 +205,7 @@ namespace System.Net {
/// </devdoc>
public static void Register(IAuthenticationModule authenticationModule)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.UnmanagedPermission.Demand();
#endif
Instance.Register(authenticationModule);
@@ -216,7 +216,7 @@ namespace System.Net {
/// </devdoc>
public static void Unregister(IAuthenticationModule authenticationModule)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.UnmanagedPermission.Demand();
#endif
Instance.Unregister(authenticationModule);
@@ -227,7 +227,7 @@ namespace System.Net {
/// </devdoc>
public static void Unregister(string authenticationScheme)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.UnmanagedPermission.Demand();
#endif
Instance.Unregister(authenticationScheme);
diff --git a/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs b/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs
index 9f8eda80a01..9983998c82e 100644
--- a/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs
+++ b/mcs/class/referencesource/System/net/System/Net/CredentialCache.cs
@@ -302,7 +302,7 @@ namespace System.Net {
get {
//This check will not allow to use local user credentials at will.
//Hence the username will not be exposed to the network
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new EnvironmentPermission(EnvironmentPermissionAccess.Read, "USERNAME").Demand();
#endif
return SystemNetworkCredential.defaultCredential;
@@ -313,7 +313,7 @@ namespace System.Net {
get {
//This check will not allow to use local user credentials at will.
//Hence the username will not be exposed to the network
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new EnvironmentPermission(EnvironmentPermissionAccess.Read, "USERNAME").Demand();
#endif
return SystemNetworkCredential.defaultCredential;
diff --git a/mcs/class/referencesource/System/net/System/Net/Internal.cs b/mcs/class/referencesource/System/net/System/Net/Internal.cs
index 3a966ba76ce..16018faf77c 100644
--- a/mcs/class/referencesource/System/net/System/Net/Internal.cs
+++ b/mcs/class/referencesource/System/net/System/Net/Internal.cs
@@ -143,7 +143,7 @@ namespace System.Net {
private static void DemandCallback(object state)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
((CodeAccessPermission) state).Demand();
#endif
}
@@ -968,7 +968,7 @@ namespace System.Net {
internal static class ExceptionHelper
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
internal static readonly KeyContainerPermission KeyContainerPermissionOpen = new KeyContainerPermission(KeyContainerPermissionFlags.Open);
internal static readonly WebPermission WebPermissionUnrestricted = new WebPermission(NetworkAccess.Connect);
internal static readonly SecurityPermission UnmanagedPermission = new SecurityPermission(SecurityPermissionFlag.UnmanagedCode);
diff --git a/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs b/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs
index 3f9b4d7c8c8..7326fc95b5e 100644
--- a/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs
+++ b/mcs/class/referencesource/System/net/System/Net/NetworkCredential.cs
@@ -26,7 +26,7 @@ namespace System.Net {
/// </devdoc>
public class NetworkCredential : ICredentials,ICredentialsByHost {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
private static volatile EnvironmentPermission m_environmentUserNamePermission;
private static volatile EnvironmentPermission m_environmentDomainNamePermission;
private static readonly object lockingObject = new object();
@@ -91,7 +91,7 @@ namespace System.Net {
}
#endif //!FEATURE_PAL
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
void InitializePart1() {
if (m_environmentUserNamePermission == null) {
lock(lockingObject) {
@@ -111,7 +111,7 @@ namespace System.Net {
/// </devdoc>
public string UserName {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
InitializePart1();
m_environmentUserNamePermission.Demand();
#endif
@@ -133,7 +133,7 @@ namespace System.Net {
/// </devdoc>
public string Password {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.UnmanagedPermission.Demand();
#endif
return InternalGetPassword();
@@ -162,7 +162,7 @@ namespace System.Net {
/// </devdoc>
public SecureString SecurePassword {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.UnmanagedPermission.Demand();
#endif
return InternalGetSecurePassword().Copy();
@@ -184,7 +184,7 @@ namespace System.Net {
/// </devdoc>
public string Domain {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
InitializePart1();
m_environmentDomainNamePermission.Demand();
#endif
diff --git a/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs b/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs
index 828f60745a6..c6dd34f86d7 100644
--- a/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs
+++ b/mcs/class/referencesource/System/net/System/Net/NetworkInformation/NetworkInterface.cs
@@ -8,7 +8,7 @@ namespace System.Net.NetworkInformation
{
/// Returns objects that describe the network interfaces on the local computer.
public static NetworkInterface[] GetAllNetworkInterfaces(){
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
(new NetworkInformationPermission(NetworkInformationAccess.Read)).Demand();
#endif
return SystemNetworkInterface.GetNetworkInterfaces();
diff --git a/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs b/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs
index 2995de9113d..fda7b1632e8 100644
--- a/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs
+++ b/mcs/class/referencesource/System/net/System/Net/ServicePoint.cs
@@ -93,7 +93,7 @@ namespace System.Net {
return m_BindIPEndPointDelegate;
}
set {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.InfrastructurePermission.Demand();
#endif
m_BindIPEndPointDelegate = value;
@@ -460,7 +460,7 @@ namespace System.Net {
throw new NotSupportedException(SR.GetString(SR.net_servicePointAddressNotSupportedInHostMode));
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Don't let low-trust apps discover the proxy information.
if (m_ProxyServicePoint)
{
diff --git a/mcs/class/referencesource/System/net/System/Net/WebRequest.cs b/mcs/class/referencesource/System/net/System/Net/WebRequest.cs
index 9f1444146c1..40f5fa6ba95 100644
--- a/mcs/class/referencesource/System/net/System/Net/WebRequest.cs
+++ b/mcs/class/referencesource/System/net/System/Net/WebRequest.cs
@@ -365,7 +365,7 @@ namespace System.Net {
throw new ArgumentNullException("creator");
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
@@ -622,7 +622,7 @@ namespace System.Net {
return RequestCacheManager.GetBinding(string.Empty).Policy;
}
set {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// This is a replacement of RequestCachePermission demand since we are not including the latest in the product.
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
@@ -1108,7 +1108,7 @@ namespace System.Net {
{
get
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return InternalDefaultWebProxy;
@@ -1116,7 +1116,7 @@ namespace System.Net {
set
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
InternalDefaultWebProxy = value;
@@ -1128,7 +1128,7 @@ namespace System.Net {
//
public static IWebProxy GetSystemWebProxy()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return InternalGetSystemWebProxy();
diff --git a/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs b/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs
index 58400b2b26f..d89639b3457 100644
--- a/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs
+++ b/mcs/class/referencesource/System/net/System/Net/_SecureChannel.cs
@@ -381,7 +381,7 @@ namespace System.Net.Security {
// demand the same permissions, then we should remove our
// demand here.
//
- #if FEATURE_MONO_CAS
+ #if MONO_FEATURE_CAS
ExceptionHelper.KeyContainerPermissionOpen.Demand();
#endif
@@ -437,7 +437,7 @@ namespace System.Net.Security {
// For v 1.1 compat We want to ensure the store is opened under the **process** acount.
//
try {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
using (WindowsIdentity.Impersonate(IntPtr.Zero))
#endif
{
@@ -583,7 +583,7 @@ namespace System.Net.Security {
// Note: We call a user certificate selection delegate under permission
// assert but the signature of the delegate is unique so it's safe
//
- #if FEATURE_MONO_CAS
+ #if MONO_FEATURE_CAS
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
#endif
private bool AcquireClientCredentials(ref byte[] thumbPrint)
@@ -832,7 +832,7 @@ namespace System.Net.Security {
// Note: We call a user certificate selection delegate under permission
// assert but the signature of the delegate is unique so it's safe
//
- #if FEATURE_MONO_CAS
+ #if MONO_FEATURE_CAS
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
#endif
private bool AcquireServerCredentials(ref byte[] thumbPrint)
@@ -919,7 +919,7 @@ namespace System.Net.Security {
//
// For v 1.1 compat We want to ensure the credential are accessed under >>process<< acount.
//
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
using (WindowsIdentity.Impersonate(IntPtr.Zero))
#endif
{
@@ -1298,7 +1298,7 @@ namespace System.Net.Security {
//SECURITY: The scenario is allowed in semitrust StorePermission is asserted for Chain.Build
// A user callback has unique signature so it is safe to call it under permisison assert.
//
- #if FEATURE_MONO_CAS
+ #if MONO_FEATURE_CAS
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
#endif
internal bool VerifyRemoteCertificate(RemoteCertValidationCallback remoteCertValidationCallback)
diff --git a/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs b/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs
index e9410023641..246c28afb5c 100644
--- a/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs
+++ b/mcs/class/referencesource/System/net/System/Net/_SpnDictionary.cs
@@ -43,7 +43,7 @@ namespace System.Net {
//
public override int Count {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return m_SyncTable.Count;
@@ -108,7 +108,7 @@ namespace System.Net {
//
public override ICollection Keys {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return m_SyncTable.Keys;
@@ -118,7 +118,7 @@ namespace System.Net {
public override object SyncRoot {
[HostProtection(Synchronization=true)]
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return m_SyncTable;
@@ -127,7 +127,7 @@ namespace System.Net {
//
public override ICollection Values {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
if (m_ValuesWrapper == null)
@@ -144,7 +144,7 @@ namespace System.Net {
}
//
public override void Clear() {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
m_SyncTable.Clear();
@@ -156,7 +156,7 @@ namespace System.Net {
}
//
public override bool ContainsValue(string value) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
foreach (SpnToken spnToken in m_SyncTable.Values)
@@ -169,7 +169,7 @@ namespace System.Net {
// We have to unwrap the SpnKey and just expose the Spn
public override void CopyTo(Array array, int index) {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
CheckCopyToArguments(array, index, Count);
@@ -183,7 +183,7 @@ namespace System.Net {
}
//
public override IEnumerator GetEnumerator() {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
@@ -211,7 +211,7 @@ namespace System.Net {
try {
Uri uri = new Uri(key);
key = uri.GetParts(UriComponents.Scheme | UriComponents.Host | UriComponents.Port | UriComponents.Path, UriFormat.SafeUnescaped);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new WebPermission(NetworkAccess.Connect, new Uri(key)).Demand();
#endif
}
diff --git a/mcs/class/referencesource/System/net/System/Net/webclient.cs b/mcs/class/referencesource/System/net/System/Net/webclient.cs
index 9b21455fab7..96cf1c91007 100644
--- a/mcs/class/referencesource/System/net/System/Net/webclient.cs
+++ b/mcs/class/referencesource/System/net/System/Net/webclient.cs
@@ -238,7 +238,7 @@ namespace System.Net {
/// </devdoc>
public IWebProxy Proxy {
get {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
if (!m_ProxySet) {
@@ -248,7 +248,7 @@ namespace System.Net {
}
}
set {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
m_Proxy = value;
diff --git a/mcs/class/referencesource/System/net/System/Net/webproxy.cs b/mcs/class/referencesource/System/net/System/Net/webproxy.cs
index e433783951c..b4ec154380d 100644
--- a/mcs/class/referencesource/System/net/System/Net/webproxy.cs
+++ b/mcs/class/referencesource/System/net/System/Net/webproxy.cs
@@ -414,7 +414,7 @@ namespace System.Net {
/// </devdoc>
[Obsolete("This method has been deprecated. Please use the proxy selected for you by default. http://go.microsoft.com/fwlink/?linkid=14202")]
public static WebProxy GetDefaultProxy() {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
return new WebProxy(true);
@@ -437,7 +437,7 @@ namespace System.Net {
if (useRegistry) {
// just make the proxy advanced, don't populate with any settings
// note - this will happen in the context of the user performing the deserialization (their proxy settings get read)
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.WebPermissionUnrestricted.Demand();
#endif
UnsafeUpdateFromRegistry();
diff --git a/mcs/class/referencesource/System/net/System/UriScheme.cs b/mcs/class/referencesource/System/net/System/UriScheme.cs
index 009eef57702..b2d459a9283 100644
--- a/mcs/class/referencesource/System/net/System/UriScheme.cs
+++ b/mcs/class/referencesource/System/net/System/UriScheme.cs
@@ -166,7 +166,7 @@ namespace System {
//
public static void Register(UriParser uriParser, string schemeName, int defaultPort)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ExceptionHelper.InfrastructurePermission.Demand();
#endif
if (uriParser == null)
diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs
index 8d93ee8c2d0..7ee9e535544 100644
--- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs
+++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/Regex.cs
@@ -405,7 +405,7 @@ namespace System.Text.RegularExpressions {
* This method is internal virtual so the jit does not inline it.
*/
[
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
HostProtection(MayLeakOnAbort=true),
#endif
MethodImplAttribute(MethodImplOptions.NoInlining)
@@ -1252,7 +1252,7 @@ namespace System.Text.RegularExpressions {
#if !(SILVERLIGHT || FULL_AOT_RUNTIME)
/// <devdoc>
/// </devdoc>
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[HostProtection(MayLeakOnAbort=true)]
#endif
[ResourceExposure(ResourceScope.Machine)] // The AssemblyName is interesting.
@@ -1265,7 +1265,7 @@ namespace System.Text.RegularExpressions {
/// <devdoc>
/// </devdoc>
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[HostProtection(MayLeakOnAbort=true)]
#endif
[ResourceExposure(ResourceScope.Machine)] // The AssemblyName is interesting.
@@ -1275,7 +1275,7 @@ namespace System.Text.RegularExpressions {
CompileToAssemblyInternal(regexinfos, assemblyname, attributes, null);
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[HostProtection(MayLeakOnAbort=true)]
#endif
[ResourceExposure(ResourceScope.Machine)]
diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs
index 6d603688023..5a60311ee31 100644
--- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs
+++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexCompiler.cs
@@ -131,7 +131,7 @@ namespace System.Text.RegularExpressions {
// <SECREVIEW> Regex only generates string manipulation, so this is ok.
// </SECREVIEW>
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new ReflectionPermission(PermissionState.Unrestricted).Assert();
#endif
try {
@@ -172,7 +172,7 @@ namespace System.Text.RegularExpressions {
#endif
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -197,14 +197,14 @@ namespace System.Text.RegularExpressions {
// <SECREVIEW> Regex only generates string manipulation, so this is ok.
// </SECREVIEW>
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new ReflectionPermission(PermissionState.Unrestricted).Assert();
#endif
try {
factory = c.FactoryInstanceFromCode(code, options);
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -239,7 +239,7 @@ namespace System.Text.RegularExpressions {
Type factory;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new ReflectionPermission(PermissionState.Unrestricted).Assert();
#endif
try {
@@ -247,7 +247,7 @@ namespace System.Text.RegularExpressions {
c.GenerateRegexType(pattern, options, fullname, regexes[i].IsPublic, code, tree, factory, mTimeout);
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -3051,7 +3051,7 @@ namespace System.Text.RegularExpressions {
// SECREVIEW : Regex only generates string manipulation, so this is
// : ok.
//
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new ReflectionPermission(PermissionState.Unrestricted).Assert();
#endif
try {
@@ -3063,7 +3063,7 @@ namespace System.Text.RegularExpressions {
CustomAttributeBuilder transparencyAttribute = new CustomAttributeBuilder(transparencyCtor, new object[0]);
assemblyAttributes.Add(transparencyAttribute);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
ConstructorInfo securityRulesCtor = typeof(SecurityRulesAttribute).GetConstructor(new Type[] { typeof(SecurityRuleSet) });
CustomAttributeBuilder securityRulesAttribute =
new CustomAttributeBuilder(securityRulesCtor, new object[] { SecurityRuleSet.Level2 });
@@ -3089,7 +3089,7 @@ namespace System.Text.RegularExpressions {
}
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs
index 037486b36d8..a20e05cfd1f 100644
--- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs
+++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexGroup.cs
@@ -77,7 +77,7 @@ namespace System.Text.RegularExpressions {
/// multiple threads.</para>
/// </devdoc>
#if !SILVERLIGHT
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[HostProtection(Synchronization=true)]
#endif
static public Group Synchronized(Group inner) {
diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs
index f6c8d5cce12..eedca2de00a 100644
--- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs
+++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/RegexMatch.cs
@@ -201,7 +201,7 @@ namespace System.Text.RegularExpressions {
/// </devdoc>
#if !SILVERLIGHT
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
[HostProtection(Synchronization=true)]
#endif
static public Match Synchronized(Match inner) {
diff --git a/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs b/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs
index 46131cf7ab9..1e1490d23de 100644
--- a/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs
+++ b/mcs/class/referencesource/System/regex/system/text/regularexpressions/compiledregexrunnerfactory.cs
@@ -28,7 +28,7 @@ namespace System.Text.RegularExpressions {
protected internal override RegexRunner CreateInstance() {
CompiledRegexRunner runner = new CompiledRegexRunner();
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new ReflectionPermission(PermissionState.Unrestricted).Assert();
#endif
runner.SetDelegates((NoParamDelegate) goMethod.CreateDelegate(typeof(NoParamDelegate)),
diff --git a/mcs/class/referencesource/mscorlib/system/exception.cs b/mcs/class/referencesource/mscorlib/system/exception.cs
index 8bab3650892..c23bc452847 100644
--- a/mcs/class/referencesource/mscorlib/system/exception.cs
+++ b/mcs/class/referencesource/mscorlib/system/exception.cs
@@ -989,7 +989,7 @@ namespace System {
[System.Security.SecurityCritical] // auto-generated
internal virtual String InternalToString()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
try
{
#pragma warning disable 618
diff --git a/mcs/class/referencesource/mscorlib/system/io/__error.cs b/mcs/class/referencesource/mscorlib/system/io/__error.cs
index a7a35c642dd..253ab9e4dab 100644
--- a/mcs/class/referencesource/mscorlib/system/io/__error.cs
+++ b/mcs/class/referencesource/mscorlib/system/io/__error.cs
@@ -92,7 +92,7 @@ namespace System.IO {
bool safeToReturn = false;
try {
if (!isInvalidPath) {
-#if !FEATURE_CORECLR && FEATURE_MONO_CAS
+#if !FEATURE_CORECLR && MONO_FEATURE_CAS
FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, path, false, false);
#endif
safeToReturn = true;
diff --git a/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs b/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs
index cb2f144af24..fa273972ca2 100644
--- a/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs
+++ b/mcs/class/referencesource/mscorlib/system/io/fileinfo.cs
@@ -130,7 +130,7 @@ namespace System.IO {
[System.Security.SecurityCritical] // auto-generated
private FileInfo(SerializationInfo info, StreamingContext context) : base(info, context)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if !FEATURE_CORECLR
FileIOPermission.QuickDemand(FileIOPermissionAccess.Read, FullPath, false, false);
#endif
@@ -187,7 +187,7 @@ namespace System.IO {
String directoryName = Path.GetDirectoryName(FullPath);
if (directoryName != null)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, DisplayPath, FullPath);
state.EnsureState();
@@ -338,7 +338,7 @@ namespace System.IO {
[ResourceConsumption(ResourceScope.Machine, ResourceScope.Machine)]
public override void Delete()
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Write, DisplayPath, FullPath);
state.EnsureState();
diff --git a/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs b/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs
index 4889350563b..4fb11990051 100644
--- a/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs
+++ b/mcs/class/referencesource/mscorlib/system/io/filesystemenumerable.cs
@@ -233,7 +233,7 @@ namespace System.IO
// Do a demand on the combined path so that we can fail early in case of deny
demandPaths[1] = Directory.GetDemandDir(normalizedSearchPath, true);
_checkHost = checkHost;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
if (checkHost)
{
@@ -350,7 +350,7 @@ namespace System.IO
// For filters like foo\*.cs we need to verify if the directory foo is not denied access.
// Do a demand on the combined path so that we can fail early in case of deny
demandPaths[1] = Directory.GetDemandDir(normalizedSearchPath, true);
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
if (checkHost)
{
@@ -637,7 +637,7 @@ namespace System.IO
[System.Security.SecurityCritical]
internal void DoDemand(String fullPathToDemand)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
if(_checkHost) {
String demandDir = Directory.GetDemandDir(fullPathToDemand, true);
@@ -757,7 +757,7 @@ namespace System.IO
internal override FileInfo CreateObject(SearchResult result)
{
String name = result.FullPath;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, name);
state.EnsureState();
@@ -785,7 +785,7 @@ namespace System.IO
String name = result.FullPath;
String permissionName = name + "\\.";
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, permissionName);
state.EnsureState();
@@ -823,7 +823,7 @@ namespace System.IO
String name = result.FullPath;
String permissionName = name + "\\.";
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, permissionName);
state.EnsureState();
@@ -840,7 +840,7 @@ namespace System.IO
Contract.Assert(isFile);
String name = result.FullPath;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState state = new FileSecurityState(FileSecurityStateAccess.Read, String.Empty, name);
state.EnsureState();
diff --git a/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs b/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs
index 6dd5ab02b85..946f26a82a6 100644
--- a/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs
+++ b/mcs/class/referencesource/mscorlib/system/io/filesysteminfo.cs
@@ -18,7 +18,7 @@
using System;
using System.Collections;
using System.Security;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
using System.Security.Permissions;
#endif
using Microsoft.Win32;
@@ -30,7 +30,7 @@ using System.Diagnostics.Contracts;
namespace System.IO {
[Serializable]
-#if !FEATURE_CORECLR && FEATURE_MONO_CAS
+#if !FEATURE_CORECLR && MONO_FEATURE_CAS
[FileIOPermissionAttribute(SecurityAction.InheritanceDemand,Unrestricted=true)]
#endif
[ComVisible(true)]
@@ -108,7 +108,7 @@ namespace System.IO {
demandDir = Directory.GetDemandDir(FullPath, true);
else
demandDir = FullPath;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if FEATURE_CORECLR
FileSecurityState sourceState = new FileSecurityState(FileSecurityStateAccess.PathDiscovery, String.Empty, demandDir);
sourceState.EnsureState();
@@ -132,7 +132,7 @@ namespace System.IO {
demandDir = Directory.GetDemandDir(FullPath, true);
else
demandDir = FullPath;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if !FEATURE_CORECLR
FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, demandDir);
#endif
@@ -359,7 +359,7 @@ namespace System.IO {
[System.Security.SecuritySafeCritical]
#endif
set {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if !FEATURE_CORECLR
FileIOPermission.QuickDemand(FileIOPermissionAccess.Write, FullPath);
#endif
@@ -392,7 +392,7 @@ namespace System.IO {
[ComVisible(false)]
public virtual void GetObjectData(SerializationInfo info, StreamingContext context)
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
#if !FEATURE_CORECLR
FileIOPermission.QuickDemand(FileIOPermissionAccess.PathDiscovery, FullPath);
#endif
diff --git a/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs b/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs
index 786e7af959a..d283428109c 100644
--- a/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs
+++ b/mcs/class/referencesource/mscorlib/system/io/unmanagedmemorystream.cs
@@ -163,7 +163,7 @@ namespace System.IO {
if (_isOpen) {
throw new InvalidOperationException(Environment.GetResourceString("InvalidOperation_CalledTwice"));
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!skipSecurityCheck) {
#pragma warning disable 618
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
@@ -244,7 +244,7 @@ namespace System.IO {
if (_isOpen)
throw new InvalidOperationException(Environment.GetResourceString("InvalidOperation_CalledTwice"));
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (!skipSecurityCheck)
#pragma warning disable 618
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
diff --git a/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs b/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs
index 350cb47cb47..bf8ede79742 100644
--- a/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs
+++ b/mcs/class/referencesource/mscorlib/system/resources/filebasedresourcegroveler.cs
@@ -51,7 +51,7 @@ namespace System.Resources {
// Don't use Assembly manifest, but grovel on disk for a file.
try
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new System.Security.Permissions.FileIOPermission(System.Security.Permissions.PermissionState.Unrestricted).Assert();
#endif
@@ -79,7 +79,7 @@ namespace System.Resources {
}
finally
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
System.Security.CodeAccessPermission.RevertAssert();
#endif
}
diff --git a/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs b/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs
index e63dd0d3c57..c80ee838d40 100644
--- a/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs
+++ b/mcs/class/referencesource/mscorlib/system/resources/resourcewriter.cs
@@ -350,13 +350,13 @@ namespace System.Resources {
// write to the temp directory (enforced via a Windows ACL). Fall back to a MemoryStream.
Stream dataSection = null; // Either a FileStream or a MemoryStream
String tempFile = null;
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet permSet = new PermissionSet(PermissionState.None);
permSet.AddPermission(new EnvironmentPermission(PermissionState.Unrestricted));
permSet.AddPermission(new FileIOPermission(PermissionState.Unrestricted));
#endif
try {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
permSet.Assert();
#endif
tempFile = Path.GetTempFileName();
@@ -375,7 +375,7 @@ namespace System.Resources {
dataSection = new MemoryStream();
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
PermissionSet.RevertAssert();
#endif
}
diff --git a/mcs/class/referencesource/mscorlib/system/rttype.cs b/mcs/class/referencesource/mscorlib/system/rttype.cs
index d5d396481fa..097e2cfe1ce 100644
--- a/mcs/class/referencesource/mscorlib/system/rttype.cs
+++ b/mcs/class/referencesource/mscorlib/system/rttype.cs
@@ -5329,7 +5329,7 @@ namespace System
throw new MissingMethodException(Environment.GetResourceString("MissingConstructor_Name", FullName));
}
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// If we're creating a delegate, we're about to call a
// constructor taking an integer to represent a target
// method. Since this is very difficult (and expensive)
@@ -5360,7 +5360,7 @@ namespace System
new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand();
#endif // FEATURE_CORECLR
}
-#endif // FEATURE_MONO_CAS
+#endif // MONO_FEATURE_CAS
if (invokeMethod.GetParametersNoCopy().Length == 0)
{
if (args.Length != 0)
diff --git a/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs b/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs
index dd983a383ef..1f1389a3a13 100644
--- a/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs
+++ b/mcs/class/referencesource/mscorlib/system/runtime/interopservices/runtimeenvironment.cs
@@ -110,7 +110,7 @@ namespace System.Runtime.InteropServices {
return null;
#endif
String dir = GetRuntimeDirectoryImpl();
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
new FileIOPermission(FileIOPermissionAccess.PathDiscovery, dir).Demand();
#endif
return dir;
@@ -143,7 +143,7 @@ namespace System.Runtime.InteropServices {
String path = sb.ToString();
#endif
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// Do security check
new FileIOPermission(FileIOPermissionAccess.PathDiscovery, path).Demand();
#endif
diff --git a/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs b/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs
index 0205e307d15..b7b13667dca 100644
--- a/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs
+++ b/mcs/class/referencesource/mscorlib/system/runtime/serialization/formatters/binary/binaryobjectreader.cs
@@ -73,7 +73,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
private BinaryMethodReturn binaryMethodReturn;
private bool bIsCrossAppDomain;
#endif
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
private static FileIOPermission sfileIOPermission = new FileIOPermission(PermissionState.Unrestricted);
#endif
private SerStack ValueFixupStack
@@ -1368,7 +1368,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
if (bSimpleAssembly)
{
try {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
sfileIOPermission.Assert();
#endif
try {
@@ -1379,7 +1379,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
#endif // FEATURE_FUSION
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -1396,14 +1396,14 @@ namespace System.Runtime.Serialization.Formatters.Binary {
else {
try
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
sfileIOPermission.Assert();
#endif
try {
assm = Assembly.Load(assemblyName);
}
finally {
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
CodeAccessPermission.RevertAssert();
#endif
}
@@ -1518,7 +1518,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
if ( !FormatterServices.UnsafeTypeForwardersIsEnabled() && sourceAssembly != destAssembly )
{
// we have a type forward to attribute !
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// we can try to see if the dest assembly has less permissionSet
if (!destAssembly.PermissionSet.IsSubsetOf(sourceAssembly.PermissionSet))
#endif
@@ -1538,7 +1538,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
typeFowardedFromAssembly = Assembly.Load(typeInfo.AssemblyString);
}
catch { }
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
if (typeFowardedFromAssembly != sourceAssembly)
{
// throw security exception
@@ -1548,7 +1548,7 @@ namespace System.Runtime.Serialization.Formatters.Binary {
}
else
{
-#if FEATURE_MONO_CAS
+#if MONO_FEATURE_CAS
// throw security exception
throw new SecurityException() { Demanded = sourceAssembly.PermissionSet };
#endif