// Thomas Neidhart (tome@sbox.tugraz.at)
// Sebastien Pouliot (sebastien@ximian.com)
//
-// Copyright (C) 2004 Novell, Inc (http://www.novell.com)
+// Copyright (C) 2004-2005 Novell, Inc (http://www.novell.com)
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
-using System;
+using System.Runtime.InteropServices;
+using System.Security.Permissions;
namespace System.Security.Cryptography {
// Note: This class isn't used by Mono as all algorithms are provided with
// 100% managed implementations.
+ [ComVisible (true)]
public sealed class CryptoAPITransform : ICryptoTransform {
private bool m_disposed;
m_disposed = false;
}
- ~CryptoAPITransform ()
- {
- Dispose (false);
- }
public bool CanReuseTransform {
get { return true; }
}
public IntPtr KeyHandle {
+ [SecurityPermission (SecurityAction.Demand, UnmanagedCode = true)]
get { return IntPtr.Zero; }
}
get { return 0; }
}
+#if NET_4_0
+ public void Dispose ()
+#else
void IDisposable.Dispose ()
+#endif
{
Dispose (true);
GC.SuppressFinalize (this); // Finalization is now unnecessary
return null;
}
-#if NET_2_0
+ [ComVisible (false)]
public void Reset ()
{
}
-#endif
}
}