// Note: We call a user certificate selection delegate under permission
// assert but the signature of the delegate is unique so it's safe
//
+ #if !DISABLE_CAS_USE
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
+ #endif
private bool AcquireClientCredentials(ref byte[] thumbPrint)
{
GlobalLog.Enter("SecureChannel#" + ValidationHelper.HashString(this) + "::AcquireClientCredentials");
// Note: We call a user certificate selection delegate under permission
// assert but the signature of the delegate is unique so it's safe
//
+ #if !DISABLE_CAS_USE
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
+ #endif
private bool AcquireServerCredentials(ref byte[] thumbPrint)
{
GlobalLog.Enter("SecureChannel#" + ValidationHelper.HashString(this) + "::AcquireServerCredentials");
//SECURITY: The scenario is allowed in semitrust StorePermission is asserted for Chain.Build
// A user callback has unique signature so it is safe to call it under permisison assert.
//
+ #if !DISABLE_CAS_USE
[StorePermission(SecurityAction.Assert, Unrestricted=true)]
+ #endif
internal bool VerifyRemoteCertificate(RemoteCertValidationCallback remoteCertValidationCallback)
{
GlobalLog.Enter("SecureChannel#" + ValidationHelper.HashString(this) + "::VerifyRemoteCertificate");