Code:
/ 4.0 / 4.0 / DEVDIV_TFS / Dev10 / Releases / RTMRel / ndp / clr / src / BCL / System / Security / Attributes.cs / 1305376 / Attributes.cs
// ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== //[....] using System.Runtime.InteropServices; namespace System.Security { // DynamicSecurityMethodAttribute: // Indicates that calling the target method requires space for a security // object to be allocated on the callers stack. This attribute is only ever // set on certain security methods defined within mscorlib. [AttributeUsage(AttributeTargets.Method, AllowMultiple = true, Inherited = false )] sealed internal class DynamicSecurityMethodAttribute : System.Attribute { } // SuppressUnmanagedCodeSecurityAttribute: // Indicates that the target P/Invoke method(s) should skip the per-call // security checked for unmanaged code permission. [AttributeUsage(AttributeTargets.Method | AttributeTargets.Class | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = true, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class SuppressUnmanagedCodeSecurityAttribute : System.Attribute { } // UnverifiableCodeAttribute: // Indicates that the target module contains unverifiable code. [AttributeUsage(AttributeTargets.Module, AllowMultiple = true, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class UnverifiableCodeAttribute : System.Attribute { } // AllowPartiallyTrustedCallersAttribute: // Indicates that the Assembly is secure and can be used by untrusted // and semitrusted clients // For v.1, this is valid only on Assemblies, but could be expanded to // include Module, Method, class [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class AllowPartiallyTrustedCallersAttribute : System.Attribute { private PartialTrustVisibilityLevel _visibilityLevel; public AllowPartiallyTrustedCallersAttribute () { } public PartialTrustVisibilityLevel PartialTrustVisibilityLevel { get { return _visibilityLevel; } set { _visibilityLevel = value; } } } public enum PartialTrustVisibilityLevel { VisibleToAllHosts = 0, NotVisibleByDefault = 1 } #if !FEATURE_CORECLR [Obsolete("SecurityCriticalScope is only used for .NET 2.0 transparency compatibility.")] public enum SecurityCriticalScope { Explicit = 0, Everything = 0x1 } #endif // FEATURE_CORECLR // SecurityCriticalAttribute // Indicates that the decorated code or assembly performs security critical operations (e.g. Assert, "unsafe", LinkDemand, etc.) // The attribute can be placed on most targets, except on arguments/return values. [AttributeUsage(AttributeTargets.Assembly | AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] sealed public class SecurityCriticalAttribute : System.Attribute { #pragma warning disable 618 // We still use SecurityCriticalScope for v2 compat #if !FEATURE_CORECLR private SecurityCriticalScope _val; #endif // FEATURE_CORECLR public SecurityCriticalAttribute () {} #if !FEATURE_CORECLR public SecurityCriticalAttribute(SecurityCriticalScope scope) { _val = scope; } [Obsolete("SecurityCriticalScope is only used for .NET 2.0 transparency compatibility.")] public SecurityCriticalScope Scope { get { return _val; } } #endif // FEATURE_CORECLR #pragma warning restore 618 } // SecurityTreatAsSafeAttribute: // Indicates that the code may contain violations to the security critical rules (e.g. transitions from // critical to non-public transparent, transparent to non-public critical, etc.), has been audited for // security concerns and is considered security clean. // At assembly-scope, all rule checks will be suppressed within the assembly and for calls made against the assembly. // At type-scope, all rule checks will be suppressed for members within the type and for calls made against the type. // At member level (e.g. field and method) the code will be treated as public - i.e. no rule checks for the members. [AttributeUsage(AttributeTargets.Assembly | AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] [Obsolete("SecurityTreatAsSafe is only used for .NET 2.0 transparency compatibility. Please use the SecuritySafeCriticalAttribute instead.")] sealed public class SecurityTreatAsSafeAttribute : System.Attribute { public SecurityTreatAsSafeAttribute () { } } // SecuritySafeCriticalAttribute: // Indicates that the code may contain violations to the security critical rules (e.g. transitions from // critical to non-public transparent, transparent to non-public critical, etc.), has been audited for // security concerns and is considered security clean. Also indicates that the code is considered SecurityCritical. // The effect of this attribute is as if the code was marked [SecurityCritical][SecurityTreatAsSafe]. // At assembly-scope, all rule checks will be suppressed within the assembly and for calls made against the assembly. // At type-scope, all rule checks will be suppressed for members within the type and for calls made against the type. // At member level (e.g. field and method) the code will be treated as public - i.e. no rule checks for the members. [AttributeUsage(AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] sealed public class SecuritySafeCriticalAttribute : System.Attribute { public SecuritySafeCriticalAttribute () { } } // SecurityTransparentAttribute: // Indicates the assembly contains only transparent code. // Security critical actions will be restricted or converted into less critical actions. For example, // Assert will be restricted, SuppressUnmanagedCode, LinkDemand, unsafe, and unverifiable code will be converted // into Full-Demands. [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false, Inherited = false )] sealed public class SecurityTransparentAttribute : System.Attribute { public SecurityTransparentAttribute () {} } #if !FEATURE_CORECLR public enum SecurityRuleSet : byte { None = 0, Level1 = 1, // v2.0 transparency model Level2 = 2, // v4.0 transparency model } // SecurityRulesAttribute // // Indicates which set of security rules an assembly was authored against, and therefore which set of // rules the runtime should enforce on the assembly. For instance, an assembly marked with // [SecurityRules(SecurityRuleSet.Level1)] will follow the v2.0 transparency rules, where transparent code // can call a LinkDemand by converting it to a full demand, public critical methods are implicitly // treat as safe, and the remainder of the v2.0 rules apply. [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false)] public sealed class SecurityRulesAttribute : Attribute { private SecurityRuleSet m_ruleSet; private bool m_skipVerificationInFullTrust = false; public SecurityRulesAttribute(SecurityRuleSet ruleSet) { m_ruleSet = ruleSet; } // Should fully trusted transparent code skip IL verification public bool SkipVerificationInFullTrust { get { return m_skipVerificationInFullTrust; } set { m_skipVerificationInFullTrust = value; } } public SecurityRuleSet RuleSet { get { return m_ruleSet; } } } #endif // !FEATURE_CORECLR } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== //[....] using System.Runtime.InteropServices; namespace System.Security { // DynamicSecurityMethodAttribute: // Indicates that calling the target method requires space for a security // object to be allocated on the callers stack. This attribute is only ever // set on certain security methods defined within mscorlib. [AttributeUsage(AttributeTargets.Method, AllowMultiple = true, Inherited = false )] sealed internal class DynamicSecurityMethodAttribute : System.Attribute { } // SuppressUnmanagedCodeSecurityAttribute: // Indicates that the target P/Invoke method(s) should skip the per-call // security checked for unmanaged code permission. [AttributeUsage(AttributeTargets.Method | AttributeTargets.Class | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = true, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class SuppressUnmanagedCodeSecurityAttribute : System.Attribute { } // UnverifiableCodeAttribute: // Indicates that the target module contains unverifiable code. [AttributeUsage(AttributeTargets.Module, AllowMultiple = true, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class UnverifiableCodeAttribute : System.Attribute { } // AllowPartiallyTrustedCallersAttribute: // Indicates that the Assembly is secure and can be used by untrusted // and semitrusted clients // For v.1, this is valid only on Assemblies, but could be expanded to // include Module, Method, class [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false, Inherited = false )] [System.Runtime.InteropServices.ComVisible(true)] sealed public class AllowPartiallyTrustedCallersAttribute : System.Attribute { private PartialTrustVisibilityLevel _visibilityLevel; public AllowPartiallyTrustedCallersAttribute () { } public PartialTrustVisibilityLevel PartialTrustVisibilityLevel { get { return _visibilityLevel; } set { _visibilityLevel = value; } } } public enum PartialTrustVisibilityLevel { VisibleToAllHosts = 0, NotVisibleByDefault = 1 } #if !FEATURE_CORECLR [Obsolete("SecurityCriticalScope is only used for .NET 2.0 transparency compatibility.")] public enum SecurityCriticalScope { Explicit = 0, Everything = 0x1 } #endif // FEATURE_CORECLR // SecurityCriticalAttribute // Indicates that the decorated code or assembly performs security critical operations (e.g. Assert, "unsafe", LinkDemand, etc.) // The attribute can be placed on most targets, except on arguments/return values. [AttributeUsage(AttributeTargets.Assembly | AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] sealed public class SecurityCriticalAttribute : System.Attribute { #pragma warning disable 618 // We still use SecurityCriticalScope for v2 compat #if !FEATURE_CORECLR private SecurityCriticalScope _val; #endif // FEATURE_CORECLR public SecurityCriticalAttribute () {} #if !FEATURE_CORECLR public SecurityCriticalAttribute(SecurityCriticalScope scope) { _val = scope; } [Obsolete("SecurityCriticalScope is only used for .NET 2.0 transparency compatibility.")] public SecurityCriticalScope Scope { get { return _val; } } #endif // FEATURE_CORECLR #pragma warning restore 618 } // SecurityTreatAsSafeAttribute: // Indicates that the code may contain violations to the security critical rules (e.g. transitions from // critical to non-public transparent, transparent to non-public critical, etc.), has been audited for // security concerns and is considered security clean. // At assembly-scope, all rule checks will be suppressed within the assembly and for calls made against the assembly. // At type-scope, all rule checks will be suppressed for members within the type and for calls made against the type. // At member level (e.g. field and method) the code will be treated as public - i.e. no rule checks for the members. [AttributeUsage(AttributeTargets.Assembly | AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] [Obsolete("SecurityTreatAsSafe is only used for .NET 2.0 transparency compatibility. Please use the SecuritySafeCriticalAttribute instead.")] sealed public class SecurityTreatAsSafeAttribute : System.Attribute { public SecurityTreatAsSafeAttribute () { } } // SecuritySafeCriticalAttribute: // Indicates that the code may contain violations to the security critical rules (e.g. transitions from // critical to non-public transparent, transparent to non-public critical, etc.), has been audited for // security concerns and is considered security clean. Also indicates that the code is considered SecurityCritical. // The effect of this attribute is as if the code was marked [SecurityCritical][SecurityTreatAsSafe]. // At assembly-scope, all rule checks will be suppressed within the assembly and for calls made against the assembly. // At type-scope, all rule checks will be suppressed for members within the type and for calls made against the type. // At member level (e.g. field and method) the code will be treated as public - i.e. no rule checks for the members. [AttributeUsage(AttributeTargets.Class | AttributeTargets.Struct | AttributeTargets.Enum | AttributeTargets.Constructor | AttributeTargets.Method | AttributeTargets.Field | AttributeTargets.Interface | AttributeTargets.Delegate, AllowMultiple = false, Inherited = false )] sealed public class SecuritySafeCriticalAttribute : System.Attribute { public SecuritySafeCriticalAttribute () { } } // SecurityTransparentAttribute: // Indicates the assembly contains only transparent code. // Security critical actions will be restricted or converted into less critical actions. For example, // Assert will be restricted, SuppressUnmanagedCode, LinkDemand, unsafe, and unverifiable code will be converted // into Full-Demands. [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false, Inherited = false )] sealed public class SecurityTransparentAttribute : System.Attribute { public SecurityTransparentAttribute () {} } #if !FEATURE_CORECLR public enum SecurityRuleSet : byte { None = 0, Level1 = 1, // v2.0 transparency model Level2 = 2, // v4.0 transparency model } // SecurityRulesAttribute // // Indicates which set of security rules an assembly was authored against, and therefore which set of // rules the runtime should enforce on the assembly. For instance, an assembly marked with // [SecurityRules(SecurityRuleSet.Level1)] will follow the v2.0 transparency rules, where transparent code // can call a LinkDemand by converting it to a full demand, public critical methods are implicitly // treat as safe, and the remainder of the v2.0 rules apply. [AttributeUsage(AttributeTargets.Assembly, AllowMultiple = false)] public sealed class SecurityRulesAttribute : Attribute { private SecurityRuleSet m_ruleSet; private bool m_skipVerificationInFullTrust = false; public SecurityRulesAttribute(SecurityRuleSet ruleSet) { m_ruleSet = ruleSet; } // Should fully trusted transparent code skip IL verification public bool SkipVerificationInFullTrust { get { return m_skipVerificationInFullTrust; } set { m_skipVerificationInFullTrust = value; } } public SecurityRuleSet RuleSet { get { return m_ruleSet; } } } #endif // !FEATURE_CORECLR } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- DeploymentExceptionMapper.cs
- ReachDocumentSequenceSerializerAsync.cs
- HwndSubclass.cs
- BrowserCapabilitiesCompiler.cs
- SqlServer2KCompatibilityAnnotation.cs
- HebrewCalendar.cs
- XmlFormatExtensionPointAttribute.cs
- DataBoundControlAdapter.cs
- XamlVector3DCollectionSerializer.cs
- HMACRIPEMD160.cs
- TypedElement.cs
- xmlfixedPageInfo.cs
- HttpStreamMessage.cs
- TextWriterEngine.cs
- RelationshipEnd.cs
- EntityDataSource.cs
- XDRSchema.cs
- TextTreeFixupNode.cs
- WebEvents.cs
- HuffModule.cs
- TitleStyle.cs
- OpCodes.cs
- ConfigurationElement.cs
- _HeaderInfoTable.cs
- DataTemplateSelector.cs
- NativeMethods.cs
- ExpressionsCollectionEditor.cs
- XmlSchemaComplexContentRestriction.cs
- UpdateExpressionVisitor.cs
- ExceptionHandler.cs
- NavigatorOutput.cs
- StringCollection.cs
- XamlTypeMapperSchemaContext.cs
- PagesSection.cs
- IsolatedStorageFilePermission.cs
- ArgumentNullException.cs
- CommentEmitter.cs
- GeometryModel3D.cs
- LinqDataSourceContextData.cs
- PlacementWorkspace.cs
- Decimal.cs
- JsonCollectionDataContract.cs
- XmlDataSource.cs
- EmptyControlCollection.cs
- ConfigurationLockCollection.cs
- XmlAtomicValue.cs
- HyperLinkColumn.cs
- HotSpotCollectionEditor.cs
- Error.cs
- ClientSettingsProvider.cs
- SwitchElementsCollection.cs
- XmlDigitalSignatureProcessor.cs
- GenericEnumConverter.cs
- MsmqProcessProtocolHandler.cs
- BitmapFrame.cs
- XmlSchemaDatatype.cs
- BypassElement.cs
- XmlILIndex.cs
- RectAnimation.cs
- RequestResizeEvent.cs
- TextBoxAutoCompleteSourceConverter.cs
- TextOutput.cs
- Int32Animation.cs
- ReferentialConstraint.cs
- _BasicClient.cs
- WindowsUserNameSecurityTokenAuthenticator.cs
- ListBase.cs
- VirtualPathUtility.cs
- TraceShell.cs
- keycontainerpermission.cs
- SqlDataSourceRefreshSchemaForm.cs
- NotifyIcon.cs
- InstallHelper.cs
- VerticalAlignConverter.cs
- AxWrapperGen.cs
- SystemIcons.cs
- EventSourceCreationData.cs
- SessionStateItemCollection.cs
- Int32EqualityComparer.cs
- CapacityStreamGeometryContext.cs
- MonthCalendarDesigner.cs
- DynamicPropertyReader.cs
- ByteBufferPool.cs
- SoapCodeExporter.cs
- EdmConstants.cs
- ParserOptions.cs
- RadioButtonPopupAdapter.cs
- SessionStateContainer.cs
- StringComparer.cs
- bidPrivateBase.cs
- _SafeNetHandles.cs
- EventSetter.cs
- TypeConverter.cs
- MsmqHostedTransportManager.cs
- FrameworkElement.cs
- ToolboxItemAttribute.cs
- PhonemeConverter.cs
- SQLDateTimeStorage.cs
- DiagnosticEventProvider.cs
- Container.cs