// Thomas Neidhart (tome@sbox.tugraz.at)
// Sebastien Pouliot (sebastien@ximian.com)
//
-// (C) 2004 Novell (http://www.novell.com)
-//\r
-
-//
-// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
+// Copyright (C) 2004-2005 Novell, Inc (http://www.novell.com)
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
-using System;
+using System.Runtime.InteropServices;
+using System.Security.Permissions;
namespace System.Security.Cryptography {
// Note: This class isn't used by Mono as all algorithms are provided with
// 100% managed implementations.
+#if NET_2_0
+ [ComVisible (true)]
+#endif
public sealed class CryptoAPITransform : ICryptoTransform {
private bool m_disposed;
m_disposed = false;
}
+#if ! NET_2_0
~CryptoAPITransform ()
{
Dispose (false);
}
+#endif
public bool CanReuseTransform {
get { return true; }
}
public IntPtr KeyHandle {
+ [SecurityPermission (SecurityAction.Demand, UnmanagedCode = true)]
get { return IntPtr.Zero; }
}
GC.SuppressFinalize (this); // Finalization is now unnecessary
}
- public void Clear()
+ public void Clear ()
{
Dispose (false);
}
public byte[] TransformFinalBlock (byte[] inputBuffer, int inputOffset, int inputCount)
{
+ // Reset (); should be called here before returning final data
return null;
}
+
+#if NET_2_0
+ [ComVisible (false)]
+ public void Reset ()
+ {
+ }
+#endif
}
}